www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T23:01:09+00:00 www.secnews.physaphae.fr Network World - Magazine Info Securing risky network ports To read this article in full or to leave a comment, please click here]]> 2017-04-24T04:44:00+00:00 http://www.networkworld.com/article/3191513/network-security/securing-risky-network-ports.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358340 False Guideline None None Network World - Magazine Info New products of the week 4.24.17 Image by AcalvioOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here]]> 2017-04-24T02:46:00+00:00 http://www.networkworld.com/article/3191605/cloud-computing/new-products-of-the-week-4-24-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358353 True None None None Network World - Magazine Info Trump claimed on Earth Day: \'Rigorous science is critical to my administration\' statement began: Our Nation is blessed with abundant natural resources and awe-inspiring beauty. Americans are rightly grateful for these God-given gifts and have an obligation to safeguard them for future generations. My Administration is committed to keeping our air and water clean, to preserving our forests, lakes, and open spaces, and to protecting endangered species.To read this article in full or to leave a comment, please click here]]> 2017-04-23T09:03:00+00:00 http://www.networkworld.com/article/3191209/security/trump-claimed-on-earth-day-rigorous-science-is-critical-to-my-administration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358151 False None None None Network World - Magazine Info There\'s now a tool to test for NSA spyware high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It's designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.To read this article in full or to leave a comment, please click here]]> 2017-04-21T17:47:39+00:00 http://www.networkworld.com/article/3191724/security/theres-now-a-tool-to-test-for-nsa-spyware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358152 False None None None Network World - Magazine Info Phishing attacks using internationalized domains are hard to block To read this article in full or to leave a comment, please click here]]> 2017-04-21T10:11:43+00:00 http://www.networkworld.com/article/3191535/security/phishing-attacks-using-internationalized-domains-are-hard-to-block.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358153 False None None None Network World - Magazine Info DARPA opens massive “Colosseum” to develop radical wireless applications Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here]]> 2017-04-21T09:24:00+00:00 http://www.networkworld.com/article/3191312/mobile-wireless/darpa-opens-massive-colosseum-to-develop-radical-wireless-applications.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358154 False None None None Network World - Magazine Info Forget signatures for malware detection. SparkCognition says AI is 99% effective   here to subscribe.  The notion of detecting malware by looking for malicious file signatures is obsolete. Depending on which source is cited, anywhere from 300,000 to one million new malware files are identified every day.Kaspersky Lab says it finds 323,000 files daily, AV-TEST claims to discover more than 390,000 new malicious programs every day, and Symantec says it uncovers almost a million new threats per day. No matter how you count it, that's a lot of malicious software being unleased into the wild day after day.To read this article in full or to leave a comment, please click here]]> 2017-04-21T08:43:00+00:00 http://www.networkworld.com/article/3191551/security/forget-signatures-for-malware-detection-sparkcognition-says-ai-is-99-effective.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358167 False None None None Network World - Magazine Info IDG Contributor Network: Is your company spending on the right security technologies? To read this article in full or to leave a comment, please click here]]> 2017-04-21T08:02:00+00:00 http://www.networkworld.com/article/3191362/security/is-your-company-spending-on-the-right-security-technologies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358168 False None None None Network World - Magazine Info IDG Contributor Network: Why banks should stay well clear of blockchain To read this article in full or to leave a comment, please click here]]> 2017-04-21T07:14:00+00:00 http://www.networkworld.com/article/3191276/cloud-computing/why-banks-should-stay-well-clear-of-blockchain.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358169 False None None None Network World - Magazine Info Cybersecurity skills shortage threatens the mid-market To read this article in full or to leave a comment, please click here]]> 2017-04-21T06:52:00+00:00 http://www.networkworld.com/article/3191501/security/cybersecurity-skills-shortage-threatens-the-mid-market.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358170 False None None None Network World - Magazine Info What\'s in the fine print of your disaster recovery vendor agreement? Image by ThinkstockDisaster-recovery solutions require several complex, moving parts coordinated between your production site and the recovery site. Service-level agreements are ultimately the most accurate way to determine where responsibility is held for disaster-recovery process and execution. It's important to have SLA documentation around these critical aspects of recovery so that customers have commitments from their vendor. It's also important that a service provider's agreements contain service-credit backed SLAs for additional accountability. When considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises will be reimbursable if not met. Bluelock's Brandon Jeffress reviews what is essential to be in an ironclad SLA.To read this article in full or to leave a comment, please click here]]> 2017-04-21T04:06:00+00:00 http://www.networkworld.com/article/3191589/disaster-recovery/whats-in-the-fine-print-of-your-disaster-recovery-vendor-agreement.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358098 False None None None Network World - Magazine Info Drupal fixes critical access bypass vulnerability To read this article in full or to leave a comment, please click here]]> 2017-04-20T14:09:50+00:00 http://www.networkworld.com/article/3191448/security/drupal-fixes-critical-access-bypass-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357910 False Guideline None None Network World - Magazine Info Hackers use old Stuxnet-related bug to carry out attacks posted research examining the use of exploits, or malicious programs designed to take advantage of certain software flaws. Once an exploit goes to work, it can typically pave the way for other malicious programs to install onto a computer.To read this article in full or to leave a comment, please click here]]> 2017-04-20T13:45:13+00:00 http://www.networkworld.com/article/3191429/security/hackers-use-old-stuxnet-related-bug-to-carry-out-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357911 False None None None Network World - Magazine Info Flaws let attackers hijack multiple Linksys router models two researchers found a total of 10 vulnerabilities that affect not only the EA3500, but two dozen different router models from Linksys' Smart Wi-Fi, WRT and Wireless-AC series. Even though these devices are marketed as consumer products, it's not unusual to find them running in small business and home office environments.To read this article in full or to leave a comment, please click here]]> 2017-04-20T08:12:40+00:00 http://www.networkworld.com/article/3191250/security/flaws-let-attackers-hijack-multiple-linksys-router-models.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357912 False None None None Network World - Magazine Info Bose accused of spying on users, illegal wiretapping via Bose Connect app Bose Connect app, which enables users to remotely control their Bose headphones, and violating their privacy rights by selling the information about what they listen to without permission. Furthermore, Kyle Zak accused Bose of illegal wiretapping.The lawsuit claims the app also has a data miner called Segment.io. Segment, the company behind the data miner, advertises, “Collect all of your customer data and send it anywhere.”To read this article in full or to leave a comment, please click here]]> 2017-04-20T07:09:00+00:00 http://www.networkworld.com/article/3191291/security/bose-accused-of-spying-on-users-illegal-wiretapping-via-bose-connect-app.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357913 False None None None Network World - Magazine Info IDG Contributor Network: Finding and protecting the crown jewels The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here]]> 2017-04-20T05:57:00+00:00 http://www.networkworld.com/article/3190991/cloud-computing/finding-and-protecting-the-crown-jewels.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357818 False None None None Network World - Magazine Info Don\'t get bit by zombie cloud data To read this article in full or to leave a comment, please click here]]> 2017-04-20T04:23:00+00:00 http://www.networkworld.com/article/3191174/security/dont-get-bit-by-zombie-cloud-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357819 False None None None Network World - Magazine Info Are we ready to bid the SIEM farewell? To read this article in full or to leave a comment, please click here]]> 2017-04-20T04:18:00+00:00 http://www.networkworld.com/article/3191245/network-security/are-we-ready-to-bid-the-siem-farewell.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357820 False None None None Network World - Magazine Info Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) software could let an unauthenticated, remote attacker cause a denial of service (DoS) attack.+More on Network World: Cisco certifications target business professionals eyeing software roles+To read this article in full or to leave a comment, please click here]]> 2017-04-19T14:04:00+00:00 http://www.networkworld.com/article/3191185/security/cisco-issues-7-high-priority-security-advisories-firepower-ios-and-asa-issues-among-them.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357619 False None None None Network World - Magazine Info Humans are (still) the weakest cybersecurity link BakerHostetler Theodore Kobus, BakerHostetler's Privacy and Data Protection team.To read this article in full or to leave a comment, please click here]]> 2017-04-19T13:10:00+00:00 http://www.networkworld.com/article/3191129/security/humans-are-still-the-weakest-cybersecurity-link.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357620 False Guideline None None Network World - Magazine Info A vigilante hacker may have built a computer worm to protect the IoT Hajime, has infected tens of thousands of easy-to-hack products such as DVRs, internet cameras, and routers. However, the program so far hasn't done anything malicious.Instead, the worm has been preventing a notorious malware known as Mirai from infecting the same devices. It's also been carrying a message written from its developer.To read this article in full or to leave a comment, please click here]]> 2017-04-19T12:16:17+00:00 http://www.networkworld.com/article/3191059/security/a-vigilante-hacker-may-have-built-a-computer-worm-to-protect-the-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357621 False None None None Network World - Magazine Info 5 ways to keep virtual assistants from sharing your company\'s secrets Spiceworks' October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here]]> 2017-04-19T09:54:00+00:00 http://www.networkworld.com/article/3190961/security/5-ways-to-keep-virtual-assistants-from-sharing-your-companys-secrets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357622 False None None None Network World - Magazine Info DHS warns on immigration spoofing scam DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here]]> 2017-04-19T09:05:00+00:00 http://www.networkworld.com/article/3190959/security/dhs-warns-on-immigration-spoofing-scam.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357635 False None None None Network World - Magazine Info Surveys show high hopes, deep concerns about IoT BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here]]> 2017-04-19T08:17:55+00:00 http://www.networkworld.com/article/3191039/internet-of-things/surveys-show-high-hopes-deep-concerns-about-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357636 False Guideline None None Network World - Magazine Info Bypass Microsoft\'s update block for Windows 7, 8.1 PCs running Kaby Lake, Ryzen Microsoft blocked Windows updates to Windows 7 and 8.1 PCs powered by new CPUs, one unhappy user found a way around the block so devices with next-generation processors can continue to get security updates for the older operating systems.Microsoft warned users several times that they needed to jump on the Windows 10 bandwagon. That didn't go over very well, so Microsoft extended Windows 7 and 8.1 support on some Skylake-powered devices.To read this article in full or to leave a comment, please click here]]> 2017-04-19T06:39:00+00:00 http://www.networkworld.com/article/3190832/security/bypass-microsofts-update-block-for-windows-7-8-1-pcs-with-kaby-lake-ryzen.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357637 False None None None Network World - Magazine Info Blockchain: \'Overhyped\' buzzword or real-deal enterprise solution? how best to deploy the distributed ledger technology, IT vendors are beginning to test it in their products -- in some cases, as a reaction to  customer inquiries rather than a proactive move."It's a very hot topic right now," said Zulfikar Ramzan, CTO of RSA Security, a subsidiary of the Dell EMC Infrastructure Solutions Group. "We are definitely getting a lot of inbound inquiries around blockchain and its implication within enterprise environments. I think it's driven largely by the fact that when there's a new technology out there, to some degree people want to be buzzword compliant with the latest and greatest."To read this article in full or to leave a comment, please click here]]> 2017-04-19T05:46:00+00:00 http://www.networkworld.com/article/3190909/storage/for-enterprises-blockchain-isn-t-necessarily-a-good-fit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357463 False None None None Network World - Magazine Info Cybersecurity companies to watch CBInsights came up with a list of startups with early-to mid-stage high-momentum that have pioneering technology with the potential to transform cybersecurity. They split the companies into the following categories: Quantum Encryption, Predictive Intelligence, Deception Security, Autonomous Systems, IoT Security, Mobile Security, Automobile Security, Critical Infrastructure Security, and Cyber Insurance.CB Insights created a Company Mosaic, which uses data to track private company health, using signals including recency of financing, total raised, and investor quality. We've gathered this data via our machine learning technology (dubbed The Cruncher) as well as via several thousand direct submissions from firms and  individual professionals.To read this article in full or to leave a comment, please click here]]> 2017-04-19T05:44:00+00:00 http://www.networkworld.com/article/3190881/security/cybersecurity-companies-to-watch.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357464 False None None None Network World - Magazine Info Oracle fixes Struts and Shadow Brokers exploits in huge patch release have used it in widespread attacks since then.Oracle uses Apache Struts 2 in several of its products, which is why Tuesday's critical patch update (CPU) fixed 25 instances of the vulnerability in Oracle Communications, Retail and Financial Services applications, as well as in the MySQL Enterprise Monitor, Oracle WebCenter Sites, Oracle WebLogic Server and the Siebel E-Billing app.To read this article in full or to leave a comment, please click here]]> 2017-04-19T05:37:09+00:00 http://www.networkworld.com/article/3190876/security/oracle-fixes-struts-and-shadow-brokers-exploits-in-huge-patch-release.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357465 False None None None Network World - Magazine Info Trump\'s cybersecurity mystery: 90 days in, where\'s the plan? a pledge: a plan to counter cyberattacks against the U.S. within 90 days of taking office.On Wednesday, President Trump marks his 90th day in office with no sign of a report or indication that one is on the way. That's a surprise, given the recent string of successful, high-profile cyberattacks against the federal government.To read this article in full or to leave a comment, please click here]]> 2017-04-18T15:47:55+00:00 http://www.networkworld.com/article/3190735/government/trumps-cybersecurity-mystery-90-days-in-wheres-the-plan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357312 False None None None Network World - Magazine Info Experts contend Microsoft canceled Feb. updates to patch NSA exploits To read this article in full or to leave a comment, please click here]]> 2017-04-18T13:19:00+00:00 http://www.networkworld.com/article/3190753/windows/experts-contend-microsoft-canceled-feb-updates-to-patch-nsa-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357313 False None None None Network World - Magazine Info At $175, this ransomware service is a boon to cybercriminals blog post on Tuesday.  Karmen is what experts call ransomware-as-a-service -- a particularly worrisome trend. Amateur hackers with little technical know-how can buy access to them, and in return, they'll receive a whole suite of web-based tools to develop their own ransomware attacks.To read this article in full or to leave a comment, please click here]]> 2017-04-18T12:29:51+00:00 http://www.networkworld.com/article/3190848/security/at-175-this-ransomware-service-is-a-boon-to-cybercriminals.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357314 False None None None Network World - Magazine Info IDG Contributor Network: We\'re all responsible for combating fake news What fake news means for IT-and how IT security can help fight it + The truth is, every day, in every possible way, we get bombarded with fake information. It doesn't matter how old we are, how smart we are, whether we're at home or at work. The world is full of falsity, whether it's phishing, fake news or some weirdo trying to learn more about us when we're playing a video game.To read this article in full or to leave a comment, please click here]]> 2017-04-18T11:11:00+00:00 http://www.networkworld.com/article/3190258/security/were-all-responsible-for-combating-fake-news.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357315 False None None None Network World - Magazine Info Mobile, security tools among education tech favorites Jamf Pro as our device management solution for our 1:1 iPad program district-wide. As a result, we are driving student success with iPads and meeting their individual needs via personalized learning - something we weren't able to previously do,” says Lyons, technology service director for the School District of La Crosse.To read this article in full or to leave a comment, please click here]]> 2017-04-18T09:18:00+00:00 http://www.networkworld.com/article/3190346/security/mobile-security-tools-among-education-tech-favorites.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357328 False None None None Network World - Magazine Info Cybersecurity remains an elusive business priority To read this article in full or to leave a comment, please click here]]> 2017-04-18T08:33:00+00:00 http://www.networkworld.com/article/3190593/security/cybersecurity-remains-an-elusive-business-priority.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357329 False None None None Network World - Magazine Info Meanwhile in China: Surveillance required on public Wi-Fi unauthorized VPN use. Last month, we learned that if you want toilet paper at one UNESCO World Heritage Site in China, then you must submit to facial recognition in order to be issued a strip of toilet paper. This time, we are looking at China requiring surveillance technology on public Wi-Fi and Chinese loan startups determining credit-worthiness by the model of smartphones used and if the battery runs low.To read this article in full or to leave a comment, please click here]]> 2017-04-18T08:06:00+00:00 http://www.networkworld.com/article/3190704/security/meanwhile-in-china-surveillance-required-on-public-wi-fi.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357330 False None Heritage None Network World - Magazine Info How to prevent your mobile app from getting hacked Image by Steve Traynor/IDGThe average user has around 26 to 55 applications downloaded to his smartphone device. Most likely, you have entertainment and gaming apps, a banking app, a few social media apps, fitness apps, and eCommerce apps to shop at your favorite stores.To read this article in full or to leave a comment, please click here]]> 2017-04-18T05:26:00+00:00 http://www.networkworld.com/article/3190631/security/how-to-prevent-your-mobile-app-from-getting-hacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357225 False None None None Network World - Magazine Info How to protect against cross-site request forgery attacks To read this article in full or to leave a comment, please click here]]> 2017-04-18T03:45:00+00:00 http://www.networkworld.com/article/3190444/security/how-to-protect-against-cross-site-request-forgery-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357226 False None None None Network World - Magazine Info \'Find My iPhone\' foils pickpocket who swiped 100 devices: police a story on the website of a Boston television station: A New York man was arrested at the Coachella music festival in Southern California after he was found with more than 100 stolen cellphones, according to Indio police.During the concert festival on Friday, several people noticed their phones were missing and immediately activated the "Find My Phone" feature on their mobile devices.To read this article in full or to leave a comment, please click here]]> 2017-04-17T12:44:00+00:00 http://www.networkworld.com/article/3190464/smartphones/find-my-iphone-foils-pickpocket-who-swiped-100-devices-police.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357110 False None None None Network World - Magazine Info IoT malware clashes in a botnet territory battle BackConnect, a provider of services to protect against distributed denial-of-service (DDoS) attacks.Security researchers have dubbed the rival IoT malware Hajime, and since it was discovered more than six months ago, it's been spreading unabated and creating a botnet. Webb estimates it's infected about 100,000 devices across the globe.    To read this article in full or to leave a comment, please click here]]> 2017-04-17T11:55:00+00:00 http://www.networkworld.com/article/3190178/security/iot-malware-clashes-in-a-botnet-territory-battle.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357111 False None None None Network World - Magazine Info Virtual assistants hear everything, so watch what you say. I\'m not kidding ad designed to trigger Google Home to advertise the Whopper. The ad featured a Burger King employee saying, “OK, Google. What is the Whopper burger?” The Google Home device would then read the Wikipedia definition of a Whopper. The trigger stopped working a few hours after the ad launched.To read this article in full or to leave a comment, please click here]]> 2017-04-17T11:38:00+00:00 http://www.networkworld.com/article/3190176/security/virtual-assistants-hear-everything-so-watch-what-you-say-i-m-not-kidding.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357112 False None None None Network World - Magazine Info Facebook yanks video of cold-blooded murder, responds to \'horrific crime\' To read this article in full or to leave a comment, please click here]]> 2017-04-17T07:46:00+00:00 http://www.networkworld.com/article/3190365/security/facebook-yanks-video-of-cold-blooded-murder-responds-to-horrific-crime.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357113 False None None None Network World - Magazine Info Cyber-sleuth boots 15 cheaters from today\'s Boston Marathon a story posted Saturday in Runner's World.To read this article in full or to leave a comment, please click here]]> 2017-04-17T07:08:00+00:00 http://www.networkworld.com/article/3190168/internet/cyber-sleuth-boots-15-cheaters-from-today-s-boston-marathon.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357126 False None None None Network World - Magazine Info Cybercrime-from inside an Ohio prison local news reports that blew up over the internet last week, at least five prisoners built a pair of working PC out of parts scavenged from e-waste as part of a program designed to teach computer skills by having inmates break down end-of-life computers and recycle the parts. The inmates smuggled the PCs to a training room, hid them in the ceiling and then ran wiring to connect to the prison network.To read this article in full or to leave a comment, please click here]]> 2017-04-17T06:19:00+00:00 http://www.networkworld.com/article/3190273/security/cybercrimefrom-inside-an-ohio-prison.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357127 False None None None Network World - Magazine Info The rising security risk of the citizen developer shadow IT has spread beyond smartphones, tablets, and cloud services and is rapidly extending into the domain of the enterprise developer.The trend could create profound risks for enterprise security teams if these shadow, or citizen, developers, aren't reined.To read this article in full or to leave a comment, please click here]]> 2017-04-17T04:24:00+00:00 http://www.networkworld.com/article/3190043/application-development/the-rising-security-risk-of-the-citizen-developer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357019 False None None None Network World - Magazine Info What it takes to be a security consultant To read this article in full or to leave a comment, please click here]]> 2017-04-17T04:21:00+00:00 http://www.networkworld.com/article/3190245/careers/what-it-takes-to-be-a-security-consultant.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357020 False None None None Network World - Magazine Info 5 must-have security tools Montgomery County.To read this article in full or to leave a comment, please click here]]> 2017-04-17T03:00:00+00:00 http://www.networkworld.com/article/3189304/security/5-must-have-security-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357021 False None None None Network World - Magazine Info 31 tech pros share favorite IT products Image by Vicki Lyons, Prakash Kota, Julie Ulrich and David LeDouxEvery year we ask IT pros to share their favorite enterprise products, and every year we learn what it takes to win them over - including gear that saves time and money, bolsters security, and streamlines digital transformations. Read on to learn what 31 tech pros like best, in their own words.To read this article in full or to leave a comment, please click here]]> 2017-04-17T03:00:00+00:00 http://www.networkworld.com/article/3187092/security/31-tech-pros-share-favorite-it-products.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357022 False None None None Network World - Magazine Info New products of the week 4.17.17 Image by A10Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here]]> 2017-04-17T02:00:00+00:00 http://www.networkworld.com/article/3190011/security/new-products-of-the-week-4-17-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356922 True None None None Network World - Magazine Info Microsoft: Past patches address leaked NSA exploits high-profile leak of suspected U.S. National Security Agency spying tools, meaning customers should be protected if they've kept their software up-to-date.Friday's leak caused concern in the security community. The spying tools include about 20 exploits designed to hack into old versions of Windows, such as Windows XP and Windows Server 2008.To read this article in full or to leave a comment, please click here]]> 2017-04-15T11:08:30+00:00 http://www.networkworld.com/article/3190156/security/microsoft-past-patches-address-leaked-nsa-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356811 False None None None Network World - Magazine Info Leaked NSA exploits plant a bull\'s-eye on Windows Server leaked the files online, setting off worries that cybercriminals will incorporate them in their own hacks.  “This leak basically puts nation-state tools into the hands of anyone who wants them,” said Matthew Hickey, the director of security provider Hacker House.He's been among the researchers looking over the files and has found they contain about 20 different Windows-based exploits -- four of which appear to leverage previously unknown software vulnerabilities.To read this article in full or to leave a comment, please click here]]> 2017-04-14T17:50:00+00:00 http://www.networkworld.com/article/3189959/security/leaked-nsa-exploits-plant-a-bulls-eye-on-windows-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356812 False None None None Network World - Magazine Info Microsoft begins denying updates to some Windows 7 users revealed in January 2016, when the company said making Windows 7 and Windows 8.1 run on the latest processors was "challenging." Microsoft then ruled that Windows 10 would be the only supported edition on seventh-generation and later CPUs and simultaneously dictated a substantial shortening of support of both editions.To read this article in full or to leave a comment, please click here]]> 2017-04-14T13:47:00+00:00 http://www.networkworld.com/article/3190060/computers/microsoft-begins-denying-updates-to-some-windows-7-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356813 False None None None Network World - Magazine Info New NSA leak may expose its bank spying, Windows exploits mysterious group has been releasing hacking tools allegedly taken from the NSA, and security researchers say they actually work.Friday's leak includes an archive describing the internal architecture at EastNets, a Dubai-based anti-money laundering company that also offers services related to SWIFT, the financial banking network.To read this article in full or to leave a comment, please click here]]> 2017-04-14T11:56:00+00:00 http://www.networkworld.com/article/3190116/security/new-nsa-leak-may-expose-its-bank-spying-windows-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356814 False None None None Network World - Magazine Info Samsung taps DOD tech veteran to head enterprise push Terry Halvorsen served as chief information officer at the Pentagon from 2015 until this year. Before that, he served as deputy commander of the Navy Cyber Forces and deputy commander of the Naval Network Warfare Command.At Samsung, he will be an executive vice president and global enterprise advisor to J.K. Shin, president of Samsung's Mobile Communications division.Samsung said it wants Halvorsen to help expand its business in the corporate, government, and regulated industries space, where there are higher demands on security.To read this article in full or to leave a comment, please click here]]> 2017-04-14T10:17:25+00:00 http://www.networkworld.com/article/3190110/smartphones/samsung-taps-dod-tech-veteran-to-head-enterprise-push.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356827 False None None None Network World - Magazine Info SOAPA services opportunities abound SOAPA.    When speaking or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s. Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP. This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency and profitability.To read this article in full or to leave a comment, please click here]]> 2017-04-14T08:39:00+00:00 http://www.networkworld.com/article/3190020/security/soapa-services-opportunities-abound.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356828 False None None None Network World - Magazine Info How will future cars stay up-to-date? Make them open like a PC Bruce Perens, a leading open source advocate.  “And I would like to guide it in a somewhat different direction.”His fear is that consumers who buy next-generation cars will face obstacles to modifying or repairing them -- like purchasing a smartphone, only far more expensive, with manufacturers in sole control over the tech upgrades.To read this article in full or to leave a comment, please click here]]> 2017-04-14T05:59:29+00:00 http://www.networkworld.com/article/3189983/car-tech/how-will-future-cars-stay-up-to-date-make-them-open-like-a-pc.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356829 False Guideline None None Network World - Magazine Info Cisco runs out two “critical” security warnings for IOS, Apache Struts (again) IOS vulnerability is in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software which could let an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges, Cisco stated.+More on Network World: Cisco targets digital business transformation with new certifications+To read this article in full or to leave a comment, please click here]]> 2017-04-13T19:57:00+00:00 http://www.networkworld.com/article/3189951/security/cisco-runs-out-two-critical-security-warnings-for-ios-apache-struts-again.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356592 False None None None Network World - Magazine Info Unpatched vulnerability exposes Magento online shops to hacking To read this article in full or to leave a comment, please click here]]> 2017-04-13T14:15:00+00:00 http://www.networkworld.com/article/3189563/security/unpatched-vulnerability-exposes-magento-online-shops-to-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356593 False None None None Network World - Magazine Info Security researcher blasts Tizen: \'May be the worst code I\'ve ever seen\' struggles with Tizen, the open-source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming.Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here]]> 2017-04-13T11:36:00+00:00 http://www.networkworld.com/article/3189568/security/security-researcher-blasts-tizen-may-be-the-worst-code-ive-ever-seen.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356832 False None None None Network World - Magazine Info 14% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert P11U2 from APC offers guaranteed surge protection. Connect and protect up to 11 electronics, and conveniently charge your mobile devices via 2 additional USB ports. Installation is convenient and easy with a 180-degree rotating power cord and right-angle plug. Lastly, three LED indicators inform you if there is any overload, unit, or wall wiring issues. The P11U2 averages 4.5 out of 5 stars from over 1,500 people on Amazon (read reviews), where its typical list price of $34.99 is discounted 14% to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here]]> 2017-04-13T10:31:00+00:00 http://www.networkworld.com/article/3189760/backup-recovery/14-off-apc-11-outlet-surge-protector-with-usb-charging-ports-and-surgearrest-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356594 False None None None Network World - Magazine Info Travelers enlists Symantec to advise cyber insurance customers Hackers wanted after firm gets $21.25M funding from Microsoft, HPE+To read this article in full or to leave a comment, please click here]]> 2017-04-13T09:41:00+00:00 http://www.networkworld.com/article/3189777/security/travelers-enlists-symantec-to-advise-cyber-insurance-customers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356595 False None None None Network World - Magazine Info How secure is your supply chain? Blockchain firms like Skuchain have developed ways to secure supply chain information to improve tracking. Other firms like CNL Software and Esri focus on improving the security process at key facilities like ports and warehouses. And firms such as Fleetmatics, Shaw Tracking and Optical Lock are working on securing the “moving supply chain” of trucks, railways, ships and planes. Whether your supply chain includes service providers, software services or goods, there are important risks to be mitigated.To read this article in full or to leave a comment, please click here]]> 2017-04-13T07:30:00+00:00 http://www.networkworld.com/article/3189754/security/how-secure-is-your-supply-chain.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356608 False None None None Network World - Magazine Info IDG Contributor Network: Can Google\'s Key Transparency make encrypted email ubiquitous? ProtonMail-a secure email system with end-to-end encryption-have reported record signup numbers in recent months. This parallels the increasing adoption and provision of encrypted instant messaging services such as Signal, Telegram, iMessage and WhatsApp. As someone who works in security, I applaud this; more people communicating via encrypted messaging can only be a good thing.+ Also on Network World: Enterprise encryption adoption up, but the devil's in the details + However, there is a big problem with encrypted email, which is that it mostly sucks. The problem lies in the open nature of email itself. Unlike proprietary messaging systems like WhatsApp, email is based on open-standards. Anyone can run their own email server, and you can send an email to anyone in the world just by knowing their email address using any software you like.To read this article in full or to leave a comment, please click here]]> 2017-04-13T03:30:00+00:00 http://www.networkworld.com/article/3188804/security/can-googles-key-transparency-make-encrypted-email-ubiquitous.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356530 False None None None Network World - Magazine Info Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE 6 vulnerabilities to watch for on the factory floor+To read this article in full or to leave a comment, please click here]]> 2017-04-12T13:24:00+00:00 http://www.networkworld.com/article/3189667/security/synack-hackers-wanted-after-firm-gets-21-25m-funding-from-microsoft-hpe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356329 False None None None Network World - Magazine Info Shadow Brokers dump contained Solaris hacking tools Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here]]> 2017-04-12T13:03:00+00:00 http://www.networkworld.com/article/3189650/security/shadow-brokers-dump-contained-solaris-hacking-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356330 False None None None Network World - Magazine Info Major zero-day flaw found in Microsoft Word FireEye also noted similar malicious .rtf files in its own alert. Both firms say the flaws are within Microsoft's Object Linking and Embedding (OLE) technology and affects all versions of Office, including Office 2016 for Windows 10.To read this article in full or to leave a comment, please click here]]> 2017-04-12T12:05:00+00:00 http://www.networkworld.com/article/3189556/security/major-zero-day-flaw-found-in-microsoft-word.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356331 False None None None Network World - Magazine Info Microsoft Word exploit linked to cyberspying in Ukraine conflict hackers are using to craft malicious Microsoft Word documents.On Wednesday, FireEye said it uncovered one attack that weaponized a Russian military training manual. Once opened, the malicious document will deliver FinSpy, a surveillance software that's been marketed to governments.To read this article in full or to leave a comment, please click here]]> 2017-04-12T11:02:53+00:00 http://www.networkworld.com/article/3189631/security/microsoft-word-exploit-linked-to-cyberspying-in-ukraine-conflict.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356332 False None None None Network World - Magazine Info 6 vulnerabilities to watch for on the factory floor FireEye iSIGHT Intelligence Sean McBride The problems are as far ranging as hard-coded passwords that are publicly available to vulnerabilities in Windows operating systems that are no longer supported but are necessary to run the aging gear, says Sean McBride, attack-synthesis lead analyst at FireEye iSIGHT Intelligence and author of “What About the Plant Floor? Six subversive concerns for industrial environments.”To read this article in full or to leave a comment, please click here]]> 2017-04-12T11:01:00+00:00 http://www.networkworld.com/article/3189528/security/6-vulnerabilities-to-watch-for-on-the-factory-floor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356345 False Guideline None None Network World - Magazine Info Researchers developing autonomous robot surveillance Convolutional-Features Analysis and Control for Mobile Visual Scene Perception,” researchers want to develop a surveillance method that could do more than any surveillance to date, as it would “operate autonomously and robustly under unknown, and possibly disconnected, topologies.”To read this article in full or to leave a comment, please click here]]> 2017-04-12T09:17:00+00:00 http://www.networkworld.com/article/3189464/security/researchers-developing-autonomous-robot-surveillance-many-eyes-with-one-mind.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356346 False None None None Network World - Magazine Info Face-off: Cisco vs. Fortinet for enterprise firewalls IT Central Station community.One reviewer, a manager of engineering at a retailer, says Cisco's ASA is “a solid, stable and consistent firewall platform,” but there's room for improvement when the enterprise needs to manage multiple firewalls from a central point. “Cisco's answer is Cisco Security Manager (CSM). Unfortunately, this is a suite of applications that is in much need of an overhaul. It is riddled with bugs and lacks the intuitive experience found in competing vendor offerings.”To read this article in full or to leave a comment, please click here]]> 2017-04-12T07:21:00+00:00 http://www.networkworld.com/article/3189176/security/face-off-cisco-vs-fortinet-for-enterprise-firewalls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356347 False None None None Network World - Magazine Info Microsoft fixes 45 flaws, including three actively exploited vulnerabilities has been actively exploited by attackers since January to infect computers with malware. Over the past few days this vulnerability, tracked as CVE-2017-0199, has seen widespread exploitation.To read this article in full or to leave a comment, please click here]]> 2017-04-12T06:42:38+00:00 http://www.networkworld.com/article/3189346/security/microsoft-fixes-45-flaws-including-three-actively-exploited-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356348 False None None None Network World - Magazine Info Hacked Dallas sirens get extra encryption to fend off future attacks outdoor warning sirens hacked early Saturday.The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.To read this article in full or to leave a comment, please click here]]> 2017-04-12T06:29:00+00:00 http://www.networkworld.com/article/3188839/security/hacked-dallas-sirens-get-extra-encryption-to-fend-off-future-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356349 False None None None Network World - Magazine Info Can AI and ML slay the healthcare ransomware dragon? healthcare organizations are prime – and relatively easy – targets for ransomware attacks. So it is no surprise that those attacks have become rampant in the past several years. The term “low-hanging fruit” is frequently invoked.But according to at least one report, and some experts, it doesn't have to be that way. ICIT – the Institute for Critical Infrastructure Technology – contends in a recent whitepaper that the power of artificial intelligence and machine learning (AI/ML) can “crush the health sector's ransomware pandemic.”To read this article in full or to leave a comment, please click here]]> 2017-04-12T06:19:00+00:00 http://www.networkworld.com/article/3188932/application-security/can-ai-and-ml-slay-the-healthcare-ransomware-dragon.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356350 False Guideline None None Network World - Magazine Info Detecting insider threats is easier than you think To read this article in full or to leave a comment, please click here]]> 2017-04-12T03:20:00+00:00 http://www.networkworld.com/article/3189143/security/detecting-insider-threats-is-easier-than-you-think.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356351 False None None None Network World - Magazine Info Privacy and the common man (or the FBI director) 2017-04-11T21:00:00+00:00 http://www.networkworld.com/video/76775/privacy-and-the-common-man-or-the-fbi-director#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356352 False None None None Network World - Magazine Info Fortinet upgrades for better cloud, SD-WAN protection DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+To read this article in full or to leave a comment, please click here]]> 2017-04-11T14:30:00+00:00 http://www.networkworld.com/article/3189172/security/fortinet-upgrades-for-better-cloud-sd-wan-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356092 False None None None Network World - Magazine Info Microsoft kicks security bulletins to the curb in favor of security update guide claimed customers wanted back in November 2016. Bulletins were supposed to bite the dust starting in January 2017, but it appears as if they did starting in April 2017. This new era for patching Microsoft is great, if you really like clicking again and again. If not, I suppose that is too bad, so sad.The release notes are slightly more informative than the Microsoft Security Response Center post about the April patches. The latter simply stated, “Today we released security updates to provide additional protections against malicious attackers.” Microsoft recommends turning on automatic updates, but probably not to stop the upcoming migraine for the click-fest you will have to endure to find out about the security updates.To read this article in full or to leave a comment, please click here]]> 2017-04-11T12:33:00+00:00 http://www.networkworld.com/article/3189168/security/microsoft-kicks-security-bulletins-to-the-curb-in-favor-of-security-update-guide.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356093 False None None None Network World - Magazine Info What it takes to become a chief information security officer (CISO) download Career Tracker: What it takes to be a chief information security officer CSO Jeff Foltz did not set out to be an information security professional. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset. His degree in psychology and philosophy would also prove more useful in his CISO job than one might think.To read this article in full or to leave a comment, please click here]]> 2017-04-11T10:30:00+00:00 http://www.networkworld.com/article/3189032/security/what-it-takes-to-become-a-chief-information-security-officer-ciso.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356094 False None None None Network World - Magazine Info DNS record will help prevent unauthorized SSL certificates To read this article in full or to leave a comment, please click here]]> 2017-04-11T08:58:39+00:00 http://www.networkworld.com/article/3188819/security/dns-record-will-help-prevent-unauthorized-ssl-certificates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356095 False None None None Network World - Magazine Info IDG Contributor Network: 7 steps to avoid getting hooked by phishing scams Anti-Phishing Working Group (APWG).+ Also on Network World: 25% to 30% of users struggle with identifying phishing threats, study says + Phishing attacks usually come in the form of a fake email that appears to be from a legitimate source, such as your bank, employer or a website you use frequently. The idea is to get you to hand over the keys to your accounts by prompting you to type your login details and password into a fake website front. Victims click the link in an email and get taken to a website that looks just like the real thing, but in reality, it has been created to steal information.To read this article in full or to leave a comment, please click here]]> 2017-04-11T08:24:00+00:00 http://www.networkworld.com/article/3189044/security/7-steps-to-avoid-getting-hooked-by-phishing-scams.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356108 False None None None Network World - Magazine Info People, process and technology challenges with security operations To read this article in full or to leave a comment, please click here]]> 2017-04-11T07:38:00+00:00 http://www.networkworld.com/article/3188863/security/people-process-and-technology-challenges-with-security-operations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356109 False None None None Network World - Magazine Info Dridex gang uses unpatched Microsoft Word exploit to target millions was revealed Friday by security researchers from antivirus vendor McAfee, but targeted attacks using it have been happening since January. After McAfee's limited public disclosure, researchers from FireEye confirmed having tracked the attacks for several weeks as well.The exploit takes advantage of a logic bug in the Windows Object Linking and Embedding (OLE) feature of Microsoft Office. It allows attackers to embed malicious code inside of Microsoft Word documents, with the code automatically executed when those files are opened.To read this article in full or to leave a comment, please click here]]> 2017-04-11T06:37:28+00:00 http://www.networkworld.com/article/3188872/security/dridex-gang-uses-unpatched-microsoft-word-exploit-to-target-millions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356110 False None None None Network World - Magazine Info IDG Contributor Network: When phone systems attack unintentional 911 TDoS attacks when some malicious JavaScript code was published on a web page. The code, once loaded on a smartphone browser, would cause some devices to automatically dial 911 repeatedly without user intervention and without the user's knowledge. To read this article in full or to leave a comment, please click here]]> 2017-04-11T03:30:00+00:00 http://www.networkworld.com/article/3188435/uc-voip/when-phone-systems-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356005 False None None None Network World - Magazine Info US dismantles Kelihos botnet after Russian hacker\'s arrest To read this article in full or to leave a comment, please click here]]> 2017-04-10T15:33:02+00:00 http://www.networkworld.com/article/3188904/security/us-dismantles-kelihos-botnet-after-russian-hackers-arrest.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355900 False None None None Network World - Magazine Info Latest Shadow Brokers exploit dump poses little threat the Shadow Brokers group unlocked Saturday to contain previously unknown and unpatched exploits -- known in the industry as zero-days. That was not the case.As researchers started to analyze the exploits inside, it became clear that while some of them were technically interesting, the large majority were for old and publicly known vulnerabilities. Some appeared to have actually been sourced from public information and affect software versions that are several years old.To read this article in full or to leave a comment, please click here]]> 2017-04-10T13:42:52+00:00 http://www.networkworld.com/article/3188805/security/latest-shadow-brokers-exploit-dump-poses-little-threat.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355901 False None None None Network World - Magazine Info DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification this month detail a new program called System Security Integrated Through Hardware and Firmware (SSITH) that has as one of its major goals to develop new integrated circuit architectures that lack the current software-accessible points of criminal entry, yet retain the computational functions and high-performance the integrated circuits were designed to deliver. Another goal of the program is the development of design tools that would become widely available so that hardware-anchored security would eventually become a standard feature of integrated circuit in both Defense Department and commercial electronic systems, DARPA stated.To read this article in full or to leave a comment, please click here]]> 2017-04-10T11:32:00+00:00 http://www.networkworld.com/article/3188632/security/darpa-to-eliminate-patch-and-pray-by-baking-chips-with-cybersecurity-fortification.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355902 False None None None Network World - Magazine Info Suspected CIA spying tools linked to hacks in 16 countries exposed by WikiLeaks have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.The tools share “close similarities” with the tactics from an espionage team called Longhorn, Symantec said in a Monday post. Longhorn has been active since at least 2011, using Trojan programs and previously unknown software vulnerabilities to hack targets.To read this article in full or to leave a comment, please click here]]> 2017-04-10T10:36:43+00:00 http://www.networkworld.com/article/3188712/security/suspected-cia-spying-tools-linked-to-hacks-in-16-countries.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355903 False None None None Network World - Magazine Info Anthem to data breach victims: Maybe the damages are your own darned fault according to a blog by Chad Mandell, an attorney at LeClairRyan.To read this article in full or to leave a comment, please click here]]> 2017-04-10T10:24:00+00:00 http://www.networkworld.com/article/3187522/security/anthem-to-data-breach-victims-maybe-the-damages-are-your-own-darned-fault.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355916 False None None None Network World - Magazine Info Cisco\'s first big developers conference to zero in on IoT, cloud DevNet Create developers' conference in San Francisco for what turned out to be the same week in May as Google's wildly popular I/O event in Mountain View (that coy old Google didn't reveal its show dates until late January). So Cisco wound up bumping its new event to the following week “to make sure we don't take audience away from Google I/O. Okay okay - maybe it's the other way around…” quipped Susie Wee, VP & CTO of Cisco DevNet Innovations in a recent blogpost.To read this article in full or to leave a comment, please click here]]> 2017-04-10T10:06:00+00:00 http://www.networkworld.com/article/3188388/cisco-subnet/ciscos-first-big-developers-conference-to-zero-in-on-iot-cloud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355917 False None None None Network World - Magazine Info Email-based attacks exploit unpatched vulnerability in Microsoft Word blog post.To read this article in full or to leave a comment, please click here]]> 2017-04-10T07:26:18+00:00 http://www.networkworld.com/article/3187796/security/email-based-attacks-exploit-unpatched-vulnerability-in-microsoft-word.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355918 False None None None Network World - Magazine Info Spain arrests accused Russian spammer at US request news reports from Agence France-Presse and other news outlets, which said Levashov's wife, Maria Levachova, was told his arrest was connected to Trump's election.To read this article in full or to leave a comment, please click here]]> 2017-04-10T07:24:00+00:00 http://www.networkworld.com/article/3188658/security/spain-arrests-supposed-russian-computer-scientist-at-us-request.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355919 False None None None Network World - Magazine Info Ticked at President Trump, Shadow Brokers dump password for NSA hacking tools open letter to President Donald Trump, the group asked, “Respectfully, what the f**k are you doing?” In broken English, they accused the president of “abandoning 'your base,' 'the movement,' and the peoples who getting you elected.”After a “quick review” of the tools unlocked with the password, Edward Snowden noted that “it's nowhere near the full library, but there's still so much here that NSA should be able to instantly identify where this set came from and how they lost it. If they can't, it's a scandal.”To read this article in full or to leave a comment, please click here]]> 2017-04-10T07:19:00+00:00 http://www.networkworld.com/article/3188517/security/ticked-at-president-trump-shadow-brokers-dump-password-for-nsa-hacking-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355920 False None None None Network World - Magazine Info How to improve Dynamic Lock in Windows 10 Creators Update Build 15031 of the Windows 10 Insider Preview on February 8, 2017, it added a new OS feature for Bluetooth-equipped devices. It's called Dynamic Lock, and lets you control access to your PCs based on how close they - and your Bluetooth-paired phones - are to them. That is, if the phone you've paired with your PC (it works for laptops, notebooks, tablets and desktops) is not found within radio range of your PC, Windows 10 turns off the screen and locks the PC after 30 seconds have elapsed. Thus, Dynamic Lock makes a dandy new security feature in Creators Update, one that most business users (or their IT departments) will find worth turning on and using.To read this article in full or to leave a comment, please click here]]> 2017-04-10T06:44:00+00:00 http://www.networkworld.com/article/3188711/windows/how-to-improve-dynamic-lock-in-windows-10-creators-update.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355921 False None None None Network World - Magazine Info Predictive analytics can stop ransomware dead in its tracks To read this article in full or to leave a comment, please click here]]> 2017-04-10T06:22:00+00:00 http://www.networkworld.com/article/3188541/big-data-business-intelligence/predictive-analytics-can-stop-ransomware-dead-in-its-tracks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355922 False None None None Network World - Magazine Info How to deal with the bot crisis on Twitter now widely known that Twitter bots -- many with zero followers -- promoted fake news stories. Often, the goal was to stir up dissension among voters, influence political viewpoints, and (more importantly) generate revenue when people viewed banner ads. Some would argue these bots helped elect President Trump or at least influenced people on social media to vote one way or another.To read this article in full or to leave a comment, please click here]]> 2017-04-10T06:19:00+00:00 http://www.networkworld.com/article/3188628/security/how-to-deal-with-the-bot-crisis-on-twitter.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355923 False None None None Network World - Magazine Info IDG Contributor Network: Authentic8 wants to protect users from bad websites Authentic8 wants to limit those impacts by reducing the blast area of bad content.RELATED: Machine learning offers new hope against cyber attacks Authentic8, the vendor that created the secure, virtual browser Silo, today announced that its browser will enable organizations to selectively redirect particular URLs for safe rendering within an isolated browser. The idea of this approach is that rather than trying to block any suspect content, organizations can let it through, secure in the knowledge that it can do no widespread harm. Authentic8 was founded by the team from Postini (an email security product acquired by Google).To read this article in full or to leave a comment, please click here]]> 2017-04-10T06:00:00+00:00 http://www.networkworld.com/article/3187969/security/authentic8-wants-to-protect-users-from-bad-websites.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355924 False None None None Network World - Magazine Info The IoT of bricks: Someone is bricking insecure IoT devices BrickerBot. It finds IoT devices with dubious security and simply bricks/disables them.Insecure dishwashers, teapots, refrigerators, security cameras-all become part of vast botnets. The botnets can do many things, and we've seen them become the armies behind the largest internet attacks in history. How to cleanse these devices has become the crux of many cries, including numerous ones in this space.To read this article in full or to leave a comment, please click here]]> 2017-04-10T03:45:00+00:00 http://www.networkworld.com/article/3188358/internet-of-things/the-iot-of-bricks-someone-is-bricking-insecure-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355769 False None None None Network World - Magazine Info Fight firewall sprawl with AlgoSec, Tufin, Skybox suites To read this article in full or to leave a comment, please click here]]> 2017-04-10T03:32:00+00:00 http://www.networkworld.com/article/3187775/security/fight-firewall-sprawl-with-algosec-tufin-skybox-suites.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355770 False None None None Network World - Magazine Info New products of the week 4.10.17 Image by Illusive NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.VM Backup version 7altaroImage by altaroTo read this article in full or to leave a comment, please click here]]> 2017-04-10T03:05:00+00:00 http://www.networkworld.com/article/3188397/videoconferencing/new-products-of-the-week-4-10-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355771 True None None None Network World - Magazine Info Angry Shadow Brokers release password for suspected NSA hacking tools group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here]]> 2017-04-09T23:19:48+00:00 http://www.networkworld.com/article/3188440/security/angry-shadow-brokers-release-password-for-suspected-nsa-hacking-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355707 False None None None Network World - Magazine Info Arista gets important win over Cisco in patent battle according to a post on Arista's site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista's redesigned products do not infringe the '592, '145, or '537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here]]> 2017-04-09T15:04:00+00:00 http://www.networkworld.com/article/3188605/cisco-subnet/arista-gets-important-win-over-cisco-in-patent-battle.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355593 False None None None