www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T17:15:32+00:00 www.secnews.physaphae.fr Network World - Magazine Info Dallas blames hacker for setting off all 156 emergency warning sirens system malfunction.” The 1.6 million people in the city were asked to stop calling 911 because there was no emergency. The normal wait time for a 911 call in Dallas is reportedly 10 seconds, but at one point the 911 system was so clogged with calls that the wait time stretched to six minutes.To read this article in full or to leave a comment, please click here]]> 2017-04-09T07:29:00+00:00 http://www.networkworld.com/article/3188458/security/dallas-blames-hacker-for-setting-off-all-156-emergency-warning-sirens.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355594 False None None None Network World - Magazine Info Startup founded by FireEye alum goes after FireEye SlashNext makes Active Cyber Defense System, a service with a cloud-based learning component that can detect data exfiltration, malware, exploits and social engineering attacks, says the company's founder and CEO Atif Mushtaq.atif mushtaq SlashNext SlashNext CEO Atif Mushtaq: "The system has a low false positive rate."To read this article in full or to leave a comment, please click here]]> 2017-04-09T07:05:00+00:00 http://www.networkworld.com/article/3188604/security/startup-founded-by-fireeye-alum-goes-after-fireeye.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355595 False None None None Network World - Magazine Info The iCloud hackers\' bitcoin ransom looks like a fake claiming they had the stolen login credentials for more than 700 million icloud.com, me.com and mac.com accounts. They demanded increasing ransoms from Apple while threatening to wipe the data from devices connected to the affected accounts if it did not.On Friday, the hackers tweeted that they had been paid US$480,000 in bitcoin. As proof, the group posted a link showing a transaction on Blockchain.info, a popular bitcoin wallet.  To read this article in full or to leave a comment, please click here]]> 2017-04-07T18:33:44+00:00 http://www.networkworld.com/article/3188507/security/the-icloud-hackers-bitcoin-ransom-looks-like-a-fake.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355609 False None None None Network World - Magazine Info WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment released 27 documents that allegedly detail how the CIA customized its malware for Windows systems.The CIA borrowed a few elements from the Carberp financial malware when developing its own hacking tool known as Grasshopper, according to those documents.Carberp gained infamy as a Trojan program that can steal online banking credentials and other financial information from its victims' computers. The malware, which likely came from the criminal underground, was particularly problematic in Russia and other former Soviet states.To read this article in full or to leave a comment, please click here]]> 2017-04-07T12:21:00+00:00 http://www.networkworld.com/article/3188472/security/wikileaks-cia-used-bits-of-carberp-trojan-code-for-malware-deployment.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355611 False None None None Network World - Magazine Info Twitter pulls lawsuit after US government backs down the customs agency was abusing its investigative power. The customs agency has the ability to get private user data from Twitter when investigating cases in areas such as illegal imports, but this case was far from that.The target of the request was the @alt_uscis account, one of a number of "alt" accounts that have sprung up on Twitter since the inauguration of President Donald Trump. The accounts are critical of the new administration and most claim to be run by current or former staff members of government agencies.To read this article in full or to leave a comment, please click here]]> 2017-04-07T11:53:06+00:00 http://www.networkworld.com/article/3188467/social-networking/twitter-pulls-lawsuit-after-us-government-backs-down.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355612 False None None None Network World - Magazine Info IoT malware starts showing destructive behavior  a new malware program dubbed Amnesia that infects digital video recorders through a year-old vulnerability. Amnesia is a variation of an older IoT botnet client called Tsunami, but what makes it interesting is that it attempts to detect whether it's running inside a virtualized environment.To read this article in full or to leave a comment, please click here]]> 2017-04-07T11:37:46+00:00 http://www.networkworld.com/article/3188320/security/iot-malware-starts-showing-destructive-behavior.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355613 False None None None Network World - Magazine Info Samsung\'s squashing of malicious Tizen smart TV bugs is turning messy exposed this week by Israeli researcher Amihai Neiderman, the company is scrambling to patch them.But Samsung still doesn't know many of the bugs that need to be patched. It's also unclear when Tizen devices will get security patches, or if older Tizen devices will even get OS updates to squash the bugs.Beyond Samsung's smart TVs, Tizen is also used in wearables like Gear S3 and handsets like Samsung's Z-series phones, which have sold well in India. Samsung wants to put Tizen in a range of appliances and IoT devices. Tizen also has been forked to be used in Raspberry Pi.To read this article in full or to leave a comment, please click here]]> 2017-04-07T10:49:58+00:00 http://www.networkworld.com/article/3188445/security/samsungs-squashing-of-malicious-tizen-smart-tv-bugs-is-turning-messy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355614 False None None None Network World - Magazine Info US lawmakers demand to know how many residents are under surveillance To read this article in full or to leave a comment, please click here]]> 2017-04-07T10:09:28+00:00 http://www.networkworld.com/article/3188359/security/us-lawmakers-demand-to-know-how-many-residents-are-under-surveillance.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355615 False None None None Network World - Magazine Info DARPA semantic program seeks to glean truth from obfuscation Active Interpretation of Disparate Alternatives (AIDA), looks to develop a “semantic engine” that generates alternative interpretations or meaning of real-world events, situations, and trends based on data obtained from an extensive range of channels. The program aims to create technology capable of aggregating and mapping pieces of information automatically derived from multiple media sources into a common representation or storyline, and then generating and exploring multiple theories about the true nature and implications of events, situations, and trends of interest, DARPA says. +More on Network World: DARPA plan would reinvent not-so-clever machine learning systems+  To read this article in full or to leave a comment, please click here]]> 2017-04-07T09:40:00+00:00 http://www.networkworld.com/article/3188312/security/darpa-semantic-program-seeks-to-glean-truth-from-obfuscation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355616 False None None None Network World - Magazine Info CyberX assesses industrial environments for cyber risks, provides continuous monitoring here to subscribe.  The U.S. Department of Homeland Security (DHS) received reports of 59 cyber incidents at energy facilities in 2016. This is an increase of nearly a third over 2015. Security specialists believe this number is quite conservative, considering that energy companies aren't required to report cyberattacks to DHS.But the actual number of incidents isn't the really concerning part of the story. More worrisome, say federal cybersecurity officials and private security specialists, is that the vast majority of energy industry companies lack the technology and personnel to continuously monitor their operational systems for anomalous activity, which leaves them unable to detect intrusions when they happen. Consequently, they don't even know about incidents to be able to report them.To read this article in full or to leave a comment, please click here]]> 2017-04-07T08:57:00+00:00 http://www.networkworld.com/article/3188391/security/cyberx-assesses-industrial-environments-for-cyber-risks-provides-continuous-monitoring.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355617 False None None None Network World - Magazine Info The \'new\' McAfee spun out McAfee in a private equity stew. To read this article in full or to leave a comment, please click here]]> 2017-04-07T08:31:00+00:00 http://www.networkworld.com/article/3188390/security/the-new-mcafee.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355618 False None None None Network World - Magazine Info McAfee: Trend indicates 2017 will be bumper year for new malware McAfee Labs Threats Report says that starting at the beginning of 2015, the volume of new threats has fluctuated in a regular pattern, with two to three quarters of growth followed by three quarters of decline. The last three quarters of 2016 showed decline, so the next uptick should have started last quarter.To read this article in full or to leave a comment, please click here]]> 2017-04-07T07:47:00+00:00 http://www.networkworld.com/article/3188331/security/mcafee-trend-indicates-2017-will-be-bumper-year-for-new-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355619 False None None None Network World - Magazine Info Robots: Lots of features, not much security report on home, business and industrial robots released last month by security research firm IOActive, which found that “most” of them lacked what experts generally call “basic security hygiene.”Those included the predictable list: Insecure communication channels, critical information sent in cleartext or with weak encryption, no requirement for user names or passwords for some services, weak authentication in others, and a lack of sufficient authorization to protect critical functions such as software installation or updates.To read this article in full or to leave a comment, please click here]]> 2017-04-07T04:49:00+00:00 http://www.networkworld.com/article/3188349/security/robots-lots-of-features-not-much-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=355532 False None None None Network World - Magazine Info Apache Struts 2 exploit used to install ransomware on servers issued an alert Thursday, saying an attack campaign is compromising Windows servers through a vulnerability tracked as CVE-2017-5638.The flaw is located in the Jakarta Multipart parser in Apache Struts 2 and allows attackers to execute system commands with the privileges of the user running the web server process.This vulnerability was patched on March 6 in Struts versions 2.3.32 and 2.5.10.1. Attackers started exploiting the flaw almost immediately, leaving very little time for server administrators to deploy the update.To read this article in full or to leave a comment, please click here]]> 2017-04-06T13:43:55+00:00 http://www.networkworld.com/article/3188154/security/apache-struts-2-exploit-used-to-install-ransomware-on-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354461 False None None None Network World - Magazine Info US trade lobbying group attacked by suspected Chinese hackers according to security vendor Fidelis Cybersecurity.The NFTC lobbies for open and fair trade and has pledged to work with U.S. President Donald Trump to "find ways to address Chinese policies that frustrate access to their market and undermine fair trade, while at the same time encouraging a positive trend in our trade relationship." Trump will meet with China President Xi Jinping in Florida this week.To read this article in full or to leave a comment, please click here]]> 2017-04-06T10:13:00+00:00 http://www.networkworld.com/article/3187846/security/us-trade-lobbying-group-attacked-by-suspected-chinese-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354462 False None APT 10 None Network World - Magazine Info F-Secure buys Little Flocker to combat macOS ransomware To read this article in full or to leave a comment, please click here]]> 2017-04-06T07:55:42+00:00 http://www.networkworld.com/article/3188058/security/f-secure-buys-little-flocker-to-combat-macos-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354463 False None None None Network World - Magazine Info IDG Contributor Network: Flatbed scanners are latest cyberattack vector researchers say in their paper (PDF).To read this article in full or to leave a comment, please click here]]> 2017-04-06T06:38:00+00:00 http://www.networkworld.com/article/3187754/security/flatbed-scanners-are-latest-cyberattack-vector.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354464 False None None None Network World - Magazine Info Prevent or detect? What to do about vulnerabilities Advanced Persistent Security said that trying to protect against every threat is not cost efficient.Shifting the mentality of those defenders who came to age in the world of preventative protection has been slow going. As a result, some security programs are failing, "Not because the bad guys got in, but because they got out," Winkler said.To read this article in full or to leave a comment, please click here]]> 2017-04-06T05:18:00+00:00 http://www.networkworld.com/article/3187971/techology-business/prevent-or-detect-what-to-do-about-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354130 False None None None Network World - Magazine Info Trust issues: Know the limits of SSL certificates Google stopped trusting Symantec after discovering the CA had mis-issued thousands of certificates over several years, and researchers found that phishing sites were using PayPal-labeled certificates issued by Linux Foundation's Let's Encrypt CA. Even with these missteps, the CAs play a critical role in establishing trust on the internet.To read this article in full or to leave a comment, please click here]]> 2017-04-06T05:16:00+00:00 http://www.networkworld.com/article/3188086/internet/trust-issues-know-the-limits-of-ssl-certificates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354131 False None None None Network World - Magazine Info What enterprises can learn in the aftermath of a phishing attack Image by John Singleton Copley/National Gallery of ArtSpearphishing is a top attack vector used by cyber adversaries today. Consists of fraudulent emails that appear to be legitimate which target specific organizations, groups, or individuals to gain access to information systems. Targeted spear phishing also leverages social engineering which includes research about specific targets of interest. Organizations rely on email connectivity with the outside to function and thus is an entry into a potential target's environment that bypasses many of the legacy security stack.To read this article in full or to leave a comment, please click here]]> 2017-04-06T05:10:00+00:00 http://www.networkworld.com/article/3188034/security/what-enterprises-can-learn-in-the-aftermath-of-a-phishing-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=354132 False None None None Network World - Magazine Info US says laptop ban may expand to more airports ban, which affects ten airports, all of which are in Muslim-majority countries. Passengers flying to the U.S. are barred from bringing any electronic devices larger than a smartphone into a plane's cabin, and must instead check them in as baggage.    To read this article in full or to leave a comment, please click here]]> 2017-04-05T18:09:07+00:00 http://www.networkworld.com/article/3188012/security/us-says-laptop-ban-may-expand-to-more-airports.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353545 False None None None Network World - Magazine Info Cisco issues variety of security warnings on wireless gear Cisco expands wireless reach with access points, management software+To read this article in full or to leave a comment, please click here]]> 2017-04-05T15:16:00+00:00 http://www.networkworld.com/article/3188008/security/cisco-issues-variety-of-security-warnings-on-wireless-gear.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353546 False None None None Network World - Magazine Info Critical Xen hypervisor flaw endangers virtualized environments The new vulnerability affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.To read this article in full or to leave a comment, please click here]]> 2017-04-05T09:34:04+00:00 http://www.networkworld.com/article/3187778/security/critical-xen-hypervisor-flaw-endangers-virtualized-environments.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353547 False None None None Network World - Magazine Info Is it crazy to be afraid of password managers? Stop using password manager browser extensions + That's why password managers exist. They're designed to let you enter a single, secure password in one place and then generate new, strong passwords for every application where you need one.To read this article in full or to leave a comment, please click here]]> 2017-04-05T07:41:00+00:00 http://www.networkworld.com/article/3187794/security/is-it-crazy-to-be-afraid-of-password-managers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353548 False None None None Network World - Magazine Info IDG Contributor Network: The evolution of data center segmentation MORE ON NETWORK WORLD: Understanding Software-Defined Networking Micro-segmentation as a concept has been around for several years. It has recently become more mainstream with organizations now dedicating budgets and personnel to micro-segmentation projects. Micro-segmentation itself is really an evolution in network security. While many of the concepts (i.e. private VLANs) have been around for years, the implementation and use of these has evolved with micro-segmentation.   To read this article in full or to leave a comment, please click here]]> 2017-04-05T06:36:00+00:00 http://www.networkworld.com/article/3187029/data-center/the-evolution-of-data-center-segmentation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353561 False None None None Network World - Magazine Info After Congress revokes Internet privacy rules, downloads double of VPN-equipped Opera browser Opera debuted a VPN -- virtual private network -- a year ago, and finalized the feature in September. A VPN disguises the actual IP address of the user, effectively anonymizing the browsing, and encrypts the data transmitted to and from sites, creating a secure "tunnel" to the destination.By using a VPN, U.S. users block their Internet service providers (ISPs) from recording their online activity.To read this article in full or to leave a comment, please click here]]> 2017-04-05T06:34:00+00:00 http://www.networkworld.com/article/3187750/internet/after-congress-revokes-internet-privacy-rules-downloads-double-of-vpn-equipped-opera-browser.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353562 False None None None Network World - Magazine Info IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions Cybercrime Riding Tax Season Tides: Trending Spam and Dark Web Findings” issued today.+More on Network World: IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017+To read this article in full or to leave a comment, please click here]]> 2017-04-05T06:25:00+00:00 http://www.networkworld.com/article/3187718/security/ibm-tax-related-spam-up-6-000-since-dec-darkweb-tactics-net-billions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353563 False Guideline None None Network World - Magazine Info What home products are most susceptible to cyber burglars? picking the lock, now a burglar could go through cyberspace to unlatch the door.Just like the lock on your front door to keep out burglars, you should protect your high-tech devices from cyber threats. Start by choosing different passwords for your internet router and each of your smart devices. It is also important to use multi-factor authentication as an added protection to prevent a hacker who guesses your password from breaking into your home. You should regularly install manufacturer updates to make sure you are running the most current security system in your home.To read this article in full or to leave a comment, please click here]]> 2017-04-05T06:23:00+00:00 http://www.networkworld.com/article/3187772/security/what-home-products-are-most-susceptible-to-cyber-burglars.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353564 False None None None Network World - Magazine Info FAQ: What just happened to online privacy? To read this article in full or to leave a comment, please click here]]> 2017-04-05T06:19:00+00:00 http://www.networkworld.com/article/3187735/security/faq-what-just-happened-to-online-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353565 False None None None Network World - Magazine Info Security Sessions: Realistic ways to lock down IoT 2017-04-05T06:00:00+00:00 http://www.networkworld.com/video/75499/security-sessions-realistic-ways-to-lock-down-iot#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353566 False None None None Network World - Magazine Info IDG Contributor Network: Hacking for the greater good Jason's last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries' main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here]]> 2017-04-05T03:45:00+00:00 http://www.networkworld.com/article/3187610/security/hacking-for-the-greater-good.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353272 False None None None Network World - Magazine Info Facebook appeal over New York search warrants fails To read this article in full or to leave a comment, please click here]]> 2017-04-05T00:23:09+00:00 http://www.networkworld.com/article/3187729/internet/facebook-appeal-over-new-york-search-warrants-fails.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353038 False None None None Network World - Magazine Info Chinese hackers go after third-party IT suppliers to steal data joint report.That's because these suppliers often have direct access to their client's networks. APT10 has been found stealing intellectual property as part of a global cyberespionage campaign that ramped up last year, PwC said on Monday.To read this article in full or to leave a comment, please click here]]> 2017-04-04T13:39:28+00:00 http://www.networkworld.com/article/3187359/security/chinese-hackers-go-after-third-party-it-suppliers-to-steal-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352635 False None APT 10 None Network World - Magazine Info IT leaders share how they quell cybersecurity attacks To read this article in full or to leave a comment, please click here]]> 2017-04-04T13:12:00+00:00 http://www.networkworld.com/article/3187707/security/it-leaders-share-how-they-quell-cybersecurity-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352636 False Guideline None None Network World - Magazine Info Apple fixes wireless-based remote code execution flaw in iOS one of several flaws found by Google Project Zero researcher Gal Beniamini in the firmware of Broadcom Wi-Fi chips. Some of these vulnerabilities also affect Android devices and have been patched as part of Android's April security bulletin.To read this article in full or to leave a comment, please click here]]> 2017-04-04T11:56:02+00:00 http://www.networkworld.com/article/3187373/security/apple-fixes-wireless-based-remote-code-execution-flaw-in-ios.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352637 False None None None Network World - Magazine Info Politicians\' web browsing history targeted after privacy vote Congress voted to allow broadband providers to sell customers' personal information without their permission.It's unclear if those efforts will succeed, however. Even though Congress scrapped the FCC's ISP privacy rules last week, the Telecommunications Act still prohibits telecom providers from selling personally identifiable information in many cases. To read this article in full or to leave a comment, please click here]]> 2017-04-04T10:17:21+00:00 http://www.networkworld.com/article/3187611/security/politicians-web-browsing-history-targeted-after-privacy-vote.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352638 False None None None Network World - Magazine Info A free decryption tool is now available for all Bart ransomware versions appeared back in June and stood out because it locked victims' files inside ZIP archives encrypted with AES (Advanced Encryption Standard). Unlike other ransomware programs that used RSA public-key cryptography and relied on a command-and-control server to generate key pairs, Bart was able to encrypt files even in the absence of an internet connection.To read this article in full or to leave a comment, please click here]]> 2017-04-04T09:36:56+00:00 http://www.networkworld.com/article/3187514/security/a-free-decryption-tool-is-now-available-for-all-bart-ransomware-versions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352651 False None None None Network World - Magazine Info Privacy rollback can cause headaches for corporate security pros congressional action started a few weeks ago to roll back privacy regulations governing ISPs, Gerchow says has seen a dramatic increase in the use of Tor for accessing his company's services, meaning security analysts have to check out whether the encrypted, anonymized traffic coming through Tor is from a legitimate user.To read this article in full or to leave a comment, please click here]]> 2017-04-04T09:32:00+00:00 http://www.networkworld.com/article/3187605/security/privacy-rollback-can-cause-headaches-for-corporate-security-pros.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352652 False None None None Network World - Magazine Info Kaspersky Lab reveals \'direct link\' between banking heist hackers and North Korea banking heist hackers and North Korea.While Lazarus is a notorious cyber-espionage and sabotage group, a subgroup of Lazarus, called Bluenoroff by Kaspersky researchers, focuses only on financial attacks with the goal of “invisible theft without leaving a trace.”The group has four main types of targets: financial institutions, casinos, companies involved in the development of financial trade software and crypto-currency businesses.To read this article in full or to leave a comment, please click here]]> 2017-04-04T08:22:00+00:00 http://www.networkworld.com/article/3187548/security/kaspersky-lab-reveals-direct-link-between-banking-heist-hackers-and-north-korea.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352653 False Medical APT 38 None Network World - Magazine Info IDG Contributor Network: Knowing when a trusted insider becomes a threat To read this article in full or to leave a comment, please click here]]> 2017-04-04T08:15:00+00:00 http://www.networkworld.com/article/3186658/analytics/knowing-when-a-trusted-insider-becomes-a-threat.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352654 False None None None Network World - Magazine Info How to rescue your PC from ransomware Locky making the rounds-encrypting its victims' files, and then refusing to unlock them unless you pay up-ransomware is a serious headache. But not all ransomware is so difficult.You can remove many ransomware viruses without losing your files, but with some variants that isn't the case. In the past I've discussed general steps for removing malware and viruses, but you need to apply some specific tips and tricks for ransomware. The process varies and depends on the type of invader. Some procedures involve a simple virus scan, while others require offline scans and advanced recovery of your files. I categorize ransomware into three varieties: scareware, lock-screen viruses, and the really nasty stuff.To read this article in full or to leave a comment, please click here]]> 2017-04-04T05:00:00+00:00 http://www.networkworld.com/article/3187495/security/how-to-rescue-your-pc-from-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351880 False None None None Network World - Magazine Info Here\'s where to buy the Bitcoins to pay a ransom To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:58:00+00:00 http://www.networkworld.com/article/3187494/security/dont-pay-ransoms-but-if-you-must-heres-where-to-buy-the-bitcoins.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351881 False None None None Network World - Magazine Info Old attack code is new weapon for Russian hackers To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:56:00+00:00 http://www.networkworld.com/article/3187493/security/old-attack-code-is-new-weapon-for-russian-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351882 False None None None Network World - Magazine Info After political Twitter bot revelation, are companies at risk? subject of Twitter bots has made headlines since federal investigations into Russia's interference with the presidential election unearthed evidence that the Kremlin used chatbots, particularly on Twitter, to seed fake news stories in order to confuse discussions and taint certain candidates, especially Democratic candidate Hillary Clinton.To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:55:00+00:00 http://www.networkworld.com/article/3187492/social-networking/after-political-twitter-bot-revelation-are-companies-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351883 False None None None Network World - Magazine Info What makes a good application pen test? Metrics To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:53:00+00:00 http://www.networkworld.com/article/3187491/security/what-makes-a-good-application-pen-test-metrics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351896 False None None None Network World - Magazine Info 5 ways data classification can prevent an insurance data breach Image by Yohan CreemersInsurance firms collect and process large amounts of policyholder data including personally identifiable information (PII) and protected health information (PHI), as well as sensitive employee and company information that must be protected. Confidential data is the core of the business, and companies that collect and analyze it more effectively have a competitive advantage. And with the cost of file sharing and synchronization technology decreasing, actuaries are able to analyze and share data in real time. However, this also increases the number of unnecessary copies of sensitive business and consumer data.To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:52:00+00:00 http://www.networkworld.com/article/3187490/security/5-ways-data-classification-can-prevent-an-insurance-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351897 False None None None Network World - Magazine Info McAfee on its own as independent security vendor TPG is making a $1.1 billion equity investment in McAfee in return for 51% ownership, giving it the cash it needs to buy companies for their technology so it can be incorporated faster into McAfee platforms than if developed via R&D.That's a different strategy than is used by Intel in its chip business. “Identifying what it takes to run a semiconductor company is quite different from running a cybersecurity company in a rapidly changing threat landscape,” says Intel Security's CTO Steve Grobman.To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:45:00+00:00 http://www.networkworld.com/article/3187442/security/mcafee-on-its-own-as-independent-security-vendor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351898 False None None None Network World - Magazine Info IDG Contributor Network: 5 biggest cybersecurity questions answered the latest ISP changes, where the U.S. government allows providers to not only track, but sell your browsing history without your consent. To read this article in full or to leave a comment, please click here]]> 2017-04-04T04:00:00+00:00 http://www.networkworld.com/article/3186924/security/5-biggest-cybersecurity-questions-answered.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351899 False None None None Network World - Magazine Info Intel divests McAfee after rough marriage, will now secure hardware lawsuit last year from John McAfee, after whom the company is named.The chip maker has divested its majority holdings in McAfee to investment firm TPG for US$3.1 billion.McAfee will now again become a standalone security company, but Intel will retain a minority 49 percent stake. The chip maker will focus internal operations on hardware-level security.For Intel, dumping majority ownership in McAfee amounts to a loss. It spent $7.68 billion to acquire McAfee in 2010, which was a head-scratcher at the time. Intel's McAfee acquisition will stand as one of the company's worst acquisitions.To read this article in full or to leave a comment, please click here]]> 2017-04-03T21:05:03+00:00 http://www.networkworld.com/article/3187434/security/intel-divests-mcafee-after-rough-marriage-will-now-secure-hardware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351698 False None None None Network World - Magazine Info Notorious iOS spyware has an Android sibling known to develop smartphone surveillance products.Fortunately, the spyware never hit the mainstream. It was installed less than three dozen times on victim devices, most of which were located in Israel, according to Google. Other victim devices resided in Georgia, Mexico and Turkey, among other countries.To read this article in full or to leave a comment, please click here]]> 2017-04-03T17:56:21+00:00 http://www.networkworld.com/article/3187465/security/notorious-ios-spyware-has-an-android-sibling.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351699 False None None None Network World - Magazine Info Banking hackers left a clue that may link them to North Korea $81 million theft from Bangladesh's central bank through the SWIFT transaction software.However, hackers working for the group recently made a mistake: They failed to wipe the logs from a server the group had hacked in Europe, security firm Kaspersky Lab said on Monday.To read this article in full or to leave a comment, please click here]]> 2017-04-03T16:33:01+00:00 http://www.networkworld.com/article/3187391/security/banking-hackers-left-a-clue-that-may-link-them-to-north-korea.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351700 False Medical APT 38 None Network World - Magazine Info SaferVPN says it takes the risk out of using public Wi-Fi connections   here to subscribe.  Bring-your-own-device (BYOD) has become a fairly standard practice in most businesses today. Who among us hasn't pulled out their cell phone to do a quick check of company email while killing time in a restaurant or a checkout line? The prevalence of public Wi-Fi makes it so easy to connect and tend to a little business while on the go.Many people look at public Wi-Fi as a convenience, or even as a requirement, when choosing where to spend time and money. Look in the window of any coffee shop today and count how many people are engaged with a laptop, tablet or mobile phone. How many of them would still be there if the shop didn't provide free Wi-Fi?To read this article in full or to leave a comment, please click here]]> 2017-04-03T13:18:00+00:00 http://www.networkworld.com/article/3186492/security/safervpn-says-it-takes-the-risk-out-of-using-public-wi-fi-connections.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351701 False None None None Network World - Magazine Info March 2017: The month in hacks and breaches failed to properly configure their Rsync backups, wrote CSO's Steve Ragan.Later that week, WikiLeaks released a trove of information on the CIA's hacking tools, including descriptions of how the agency targeted iPhones, Android phones, Samsung smart TVs, and routers.To read this article in full or to leave a comment, please click here]]> 2017-04-03T12:42:00+00:00 http://www.networkworld.com/article/3187116/security/march-2017-the-month-in-hacks-and-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351714 False None None None Network World - Magazine Info Beyond Trust: privilege, vulnerability management available through Azure Azure Marketplace.These new services give Beyond Trust customers a third option for how they deploy PAM and VM. Before they could extend a local instance of Beyond Trust's security to the Azure cloud via software connectors or deploy it within the cloud using software agents deployed on virtual machines there.To read this article in full or to leave a comment, please click here]]> 2017-04-03T12:27:00+00:00 http://www.networkworld.com/article/3187096/security/beyond-trust-privilege-vulnerability-management-available-through-azure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351715 False None None None Network World - Magazine Info UEFI flaws can be exploited to install highly persistent ransomware To read this article in full or to leave a comment, please click here]]> 2017-04-03T11:19:57+00:00 http://www.networkworld.com/article/3187179/security/uefi-flaws-can-be-exploited-to-install-highly-persistent-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351716 False None None None Network World - Magazine Info Micro-segmentation projects span enterprise organizations To read this article in full or to leave a comment, please click here]]> 2017-04-03T09:44:00+00:00 http://www.networkworld.com/article/3187176/security/micro-segmentation-projects-span-enterprise-organizations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351717 False None None None Network World - Magazine Info Android now the world\'s most popular operating system StatCounter reported that, for the first time ever, Android topped the worldwide OS internet usage market share. In March, looking at combined usage across desktop, laptop, tablet and mobile, Android usage hit 37.93 percent. That was enough to narrowly overtake Windows' 37.91 percent.statcounter operating systems worldwide StatCounter “This is a milestone in technology history and the end of an era,” said StatCounter CEO Aodhan Cullen. “It marks the end of Microsoft's leadership worldwide of the OS market, which it has held since the 1980s. It also represents a major breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago.”To read this article in full or to leave a comment, please click here]]> 2017-04-03T07:15:00+00:00 http://www.networkworld.com/article/3187011/mobile-wireless/android-is-now-the-worlds-most-popular-operating-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351718 False Guideline None None Network World - Magazine Info Email security appears grounded as attacks continue to take flight To read this article in full or to leave a comment, please click here]]> 2017-04-03T06:39:00+00:00 http://www.networkworld.com/article/3187166/security/email-security-appears-grounded-as-attacks-continue-to-take-flight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351719 False None None None Network World - Magazine Info Top 5 email security best practices to prevent malware distribution Image by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don't understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it's often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.To read this article in full or to leave a comment, please click here]]> 2017-04-03T06:37:00+00:00 http://www.networkworld.com/article/3187165/security/top-5-email-security-best-practices-to-prevent-malware-distribution.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351720 False None None None Network World - Magazine Info Encryption critical for protecting mobile device data To read this article in full or to leave a comment, please click here]]> 2017-04-03T06:04:00+00:00 http://www.networkworld.com/article/3187091/security/encryption-critical-for-protecting-mobile-device-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351721 False None None None Network World - Magazine Info IDG Contributor Network: Information security in an insecure world To read this article in full or to leave a comment, please click here]]> 2017-04-03T04:05:00+00:00 http://www.networkworld.com/article/3186694/security/information-security-in-an-insecure-world.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351422 False Guideline None None Network World - Magazine Info Securing the smart home Mirai botnet compromised webcams and other Internet-connected things. Then in February, VIZIO agreed to pay a $2.2 million fine to the FTC for collecting the viewing histories of 11 million smart TV users without their knowledge or consent.To read this article in full or to leave a comment, please click here]]> 2017-04-03T03:09:00+00:00 http://www.networkworld.com/article/3186228/security/securing-the-smart-home.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351423 False None None None Network World - Magazine Info New products of the week 4.3.17 Image by MicroStrategyOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here]]> 2017-04-03T02:23:00+00:00 http://www.networkworld.com/article/3186861/security/new-products-of-the-week-4-3-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351221 True None None None Network World - Magazine Info WikiLeaks\' Assange gets relief from left victory in Ecuador To read this article in full or to leave a comment, please click here]]> 2017-04-03T01:49:07+00:00 http://www.networkworld.com/article/3186518/internet/wikileaks-assange-gets-relief-from-left-victory-in-ecuador.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351222 False None None None Network World - Magazine Info Government domain seizure notice on Kodi TV was April Fools\' prank grabbed by the Wayback Machine. It featured logos of the Department of Justice, National Intellectual Property Rights and Homeland Security Investigations above the following message: This domain name has been seized by ICE - Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court under the authority of 18 U.S.C 981 and 2323.Willful copyright infringement is a federal crime that carries penalties for first time offenders of up to five years in federal prison, a $250,000 fine forfeiture and restitution (17 U.S.C 506, 18 U.S.C 2319). Intentionally and knowingly trafficking in counterfeit goods is a federal crime that carries penalties for first time offenders of up to ten years in federal prison, a $2,000,000 fine, forfeiture and restitution (18 U.S.C 2320)To read this article in full or to leave a comment, please click here]]> 2017-04-02T08:49:00+00:00 http://www.networkworld.com/article/3186514/security/government-domain-seizure-notice-on-kodi-tv-was-april-fools-prank.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350757 False None None None Network World - Magazine Info Latest WikiLeaks dump exposes CIA methods to mask malware Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year.The files do appear to show “obfuscation techniques” that can hide CIA-developed malicious coding from detection, said Jake Williams, a security researcher at Rendition InfoSec, who has been examining the files.Every hacker, from the government-sponsored ones to amateurs, will use their own obfuscation techniques when developing malware, he said.To read this article in full or to leave a comment, please click here]]> 2017-03-31T14:30:00+00:00 http://www.networkworld.com/article/3187005/security/latest-wikileaks-dump-exposes-cia-methods-to-mask-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350758 False None None None Network World - Magazine Info Google\'s Android hacking contest fails to attract exploits the original contest announcement in September.To read this article in full or to leave a comment, please click here]]> 2017-03-31T11:32:38+00:00 http://www.networkworld.com/article/3186932/security/googles-android-hacking-contest-fails-to-attract-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350759 False None None None Network World - Magazine Info Russian hacking goes far beyond 2016 pro-Trump effort To read this article in full or to leave a comment, please click here]]> 2017-03-31T10:57:00+00:00 http://www.networkworld.com/article/3186911/security/russian-hacking-goes-far-beyond-2016-pro-trump-effort.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350760 False None None None Network World - Magazine Info Privacy activist wants to unveil lawmakers\' browser histories approved a resolution that would toss out significant online privacy protections, one Internet user decided to do something about it.Adam McElhaney, who calls himself a privacy activist and net neutrality advocate, created a website and a GoFundMe page to raise money to buy the internet histories of the legislators who backed the resolution so he can make them available and easily searchable.To read this article in full or to leave a comment, please click here]]> 2017-03-31T05:28:00+00:00 http://www.networkworld.com/article/3186909/internet/privacy-activist-wants-to-unveil-lawmakers-browser-histories.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350463 False None None None Network World - Magazine Info In mining user data, US ISPs must weigh cash vs. privacy privacy rule repeal is almost certain, will they sell their customers' data to marketers, or will they keep it private?The U.S. broadband industry is telling consumers not to worry. Verizon, for instance, said that it remains committed to protecting users' privacy.What that exactly means is unclear, and some in the industry are skeptical.Major broadband providers will be enticed to monetize their customers' data in ad-heavy ways, said Dane Jasper, CEO of Sonic, a small ISP in California.To read this article in full or to leave a comment, please click here]]> 2017-03-31T05:19:00+00:00 http://www.networkworld.com/article/3186819/internet/in-mining-user-data-us-isps-must-weigh-cash-vs-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350464 False None None None Network World - Magazine Info After Amazon outage, HealthExpense worries about cloud lock-in Health Expense."It has to do with the data we're collecting," said company CSO Ken Lee. "We are definitely bound by HIPAA compliance, and we hold all the personal health information and financial information."To read this article in full or to leave a comment, please click here]]> 2017-03-31T05:15:00+00:00 http://www.networkworld.com/article/3186906/cloud-computing/after-amazon-outage-healthexpense-worries-about-cloud-lock-in.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350465 False None None None Network World - Magazine Info Non-malware attacks grow – there are tools for IT security to fight back with polled by Carbon Black say they've noted an uptick in these attacks just since the beginning of the year, and aren't confident that traditional anti-virus software can deal with them.+More on Network World: IBM says cybercriminals are starting to grab unstructured data, spam has rebloomed 400% and ransomware has just gone nuts+To read this article in full or to leave a comment, please click here]]> 2017-03-31T05:13:00+00:00 http://www.networkworld.com/article/3186497/security/non-malware-attacks-grow-there-are-tools-for-it-security-to-fight-back-with.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=350466 False None None None Network World - Magazine Info Cisco issues urgent reboot warning for bug in ASA and Firepower appliances CSCva03607.+More on Network World: IBM on the state of network security: AbysmalTo read this article in full or to leave a comment, please click here]]> 2017-03-30T19:16:00+00:00 http://www.networkworld.com/article/3186772/security/cisco-issues-urgent-reboot-warning-for-bug-in-asa-and-firepower-appliances.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349864 False None None None Network World - Magazine Info Senator: Russia used \'thousands\' of internet trolls during US election Senate hearing on Russian election hacking. The Russian government used "thousands of paid internet trolls" and bots to spread disinformation on social media.To read this article in full or to leave a comment, please click here]]> 2017-03-30T12:56:04+00:00 http://www.networkworld.com/article/3186635/security/senator-russia-used-thousands-of-internet-trolls-during-us-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349865 False Guideline None None Network World - Magazine Info 10 practical privacy tips for the post-privacy internet U.S. Congress sold you out. If you had any browsing dignity, you don't now. Too bad you couldn't pay the legislators as much as the data wolves.You should have been doing these things all along, but now it's time to decide just how much dignity you have. Most of you won't bother. This isn't for you. Click away, and go surf.For those remaining, take these privacy tips seriously.1. Educate yourself about cookies and clean them out regularly For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don't find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we're not surprised because it's from Google-the company whose very life depends on knowing information about you.To read this article in full or to leave a comment, please click here]]> 2017-03-30T11:54:00+00:00 http://www.networkworld.com/article/3186732/internet/10-practical-privacy-tips-for-the-post-privacy-internet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349866 False None None None Network World - Magazine Info IBM technology creates smart wingman for self-driving cars IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here]]> 2017-03-30T11:37:00+00:00 http://www.networkworld.com/article/3186630/analytics/ibm-technology-creates-smart-wingman-for-self-driving-cars.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349867 False None None None Network World - Magazine Info SS8\'s time machine is designed to automate the hunt for compromises   here to subscribe.  When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there's no rule to put in the firewall. An attacker's damage can be done long before the rule is created.To read this article in full or to leave a comment, please click here]]> 2017-03-30T10:59:00+00:00 http://www.networkworld.com/article/3186629/security/ss8s-time-machine-is-designed-to-automate-the-hunt-for-compromises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349880 False None None None Network World - Magazine Info Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server To read this article in full or to leave a comment, please click here]]> 2017-03-30T07:47:33+00:00 http://www.networkworld.com/article/3186744/security/millions-of-websites-affected-by-unpatched-flaw-in-microsoft-iis-6-web-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349881 False None None None Network World - Magazine Info IP theft: Declining, or just more stealthy? “the greatest transfer of wealth in human history.”To read this article in full or to leave a comment, please click here]]> 2017-03-30T05:36:00+00:00 http://www.networkworld.com/article/3186591/security/ip-theft-declining-or-just-more-stealthy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349460 False None None None Network World - Magazine Info Open-source developers targeted in sophisticated malware attack To read this article in full or to leave a comment, please click here]]> 2017-03-30T04:20:54+00:00 http://www.networkworld.com/article/3186560/security/open-source-developers-targeted-in-sophisticated-malware-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349461 False None None None Network World - Magazine Info VMware patches critical virtual machine escape flaws The patches fix four vulnerabilities that affect VMware ESXi, VMware Workstation Pro and Player and VMware Fusion.Two of the vulnerabilities, tracked as CVE-2017-4902 and CVE-2017-4903 in the Common Vulnerabilities and Exposures database, were exploited by a team from Chinese internet security firm Qihoo 360 as part of an attack demonstrated two weeks ago at Pwn2Own.The team's exploit chain started with a compromise of Microsoft Edge, moved to the Windows kernel, and then exploited the two flaws to escape from a virtual machine and execute code on the host operating system. The researchers were awarded $105,000 for their feat.To read this article in full or to leave a comment, please click here]]> 2017-03-30T02:53:29+00:00 http://www.networkworld.com/article/3186553/security/vmware-patches-critical-virtual-machine-escape-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349462 False None None None Network World - Magazine Info Trump extends Obama executive order on cyberattacks Executive Order 13694 was introduced on April 1, 2015, and was due to expire on Saturday, but the president sent a letter to Congress on Wednesday evening informing it of his plans to keep it active."Significant malicious cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States, continue to pose an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States," Trump wrote in the letter. "Therefore, I have determined that it is necessary to continue the national emergency declared in Executive Order 13694 with respect to significant malicious cyber-enabled activities."To read this article in full or to leave a comment, please click here]]> 2017-03-29T18:18:53+00:00 http://www.networkworld.com/article/3186431/government/trump-extends-obama-executive-order-on-cyberattacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349010 False None None None Network World - Magazine Info Extreme swallows Brocade\'s data center networking business for $55M Arris International and now the data center networking business to Extreme.+More on Network World: When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper +To read this article in full or to leave a comment, please click here]]> 2017-03-29T15:18:00+00:00 http://www.networkworld.com/article/3186487/lan-wan/extreme-swallows-brocades-data-center-networking-business-for-55m.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349011 False None None None Network World - Magazine Info How to fend off cyberattacks and data breaches research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing). And while distributed denial of service, or DDoS, attacks are still a leading form of cyber warfare, ransomware and malware attacks, targeting users of smartphones and internet of things (IoT) devices, as well as PCs and systems running on Macs and Linux, are also a big threat to small businesses.To read this article in full or to leave a comment, please click here]]> 2017-03-29T14:18:00+00:00 http://www.networkworld.com/article/3186468/malware-cybercrime/how-to-fend-off-cyberattacks-and-data-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349012 False Guideline None None Network World - Magazine Info Congress to US citizens: Want online privacy? Pay up! vote to repeal U.S. restrictions on broadband providers doesn't mean that online privacy is dead. Consumers will just have to pay for it.The coming repeal, which President Trump is expected to sign into law, paves a clearer path for broadband providers to sell customers' internet browsing history and other online data, without their consent.Privacy advocates are worried. Imagine corporate giants snooping on your internet activities, and then bombarding your PC, phone and TV with targeted ads.However, the privacy rule rollback might have an opposite effect too. Expect broadband providers and other internet services to emerge offering online privacy protections -- but at a price.To read this article in full or to leave a comment, please click here]]> 2017-03-29T14:15:00+00:00 http://www.networkworld.com/article/3186504/internet/congress-to-us-citizens-want-online-privacy-pay-up.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349013 False None None None Network World - Magazine Info Trojan source code leak poised to spur new online banking attacks To read this article in full or to leave a comment, please click here]]> 2017-03-29T10:26:25+00:00 http://www.networkworld.com/article/3186179/security/trojan-source-code-leak-poised-to-spur-new-online-banking-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349026 False None None None Network World - Magazine Info What it takes to become an information assurance analyst download What it takes to become an information assurance analyst CSO Online Getting serious about security While still a senior systems administrator for the Centers for Disease Control, Holloway kicked into overdrive, spending his evenings and weekends researching cybersecurity online. “I watched YouTube videos, joined webinars, things like that,” Holloway says. He spent four months studying for and earning his CompTIA Security+ certification, and attended a five-day Certified Ethical Hacker Bootcamp course that helped him get his CEH certification six months later. “I also built my own virtual lab - taking some of the free cyber tools available online, like BackTrack and Kali Linux, and practiced pen testing,” he adds.To read this article in full or to leave a comment, please click here]]> 2017-03-29T09:27:00+00:00 http://www.networkworld.com/article/3186213/careers/what-it-takes-to-become-an-information-assurance-analyst.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349027 False None None None Network World - Magazine Info IBM on the state of network security: Abysmal IBM Security's 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan project showed up in underground forums, aspiring to sell some licenses as he worked on completing the development of all its modules. The actor promised to deliver future capabilities, such as a Socket Secure (SOCKS) proxy and hidden virtual network computing alongside technical support and free bug fixes. The malware was named Nuclear Bot, or NukeBot, at the time. IBM wrote it has yet to see NukeBot/Micro Bot active in the wild, analyses performed by X-Force and other vendors found that it has the potential to rise in 2017 and bring back commercial Trojan sales in the underground. In 2015, Healthcare was the most attacked industry with Financial Services falling to third, however, attackers in 2016 refocused back on Financial Services. IBM did note that while the healthcare industry continued to be beleaguered by a high number of incidents, attackers hit on smaller targets resulting in a lower number of leaked records. In 2016, only 12 million records were compromised in healthcare - keeping it out of the top 5 most-breached industries. For perspective, nearly 100 million healthcare records were compromised in 2015 resulting in an 88% drop in 2016, IBM stated.To read this article in full or to leave a comment, please click here]]> 2017-03-29T08:35:00+00:00 http://www.networkworld.com/article/3185813/security/ibm-on-the-state-of-network-security-abysmal.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349028 False None Yahoo None Network World - Magazine Info Invisibility, teleportation among top superpowers that IT pros want "Right back at you vendors: OUR independent study of YOUR independent research")But I figured you'd want to know what superpowers your peers desire, since I'm sure that's a discussion you and your colleagues have had at some point or another (my superpower would be to dodge vendor survey pitches).To read this article in full or to leave a comment, please click here]]> 2017-03-29T08:02:00+00:00 http://www.networkworld.com/article/3186171/backup-recovery/invisibility-teleportation-among-top-superpowers-that-it-pros-want.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349029 False None None None Network World - Magazine Info Updating Apple iOS will protect you from this fake ransomware attack Lookout said, “Each time he tapped 'OK' he would be prompted to tap 'OK' again, effectively putting the browser into an infinite loop of dialog prompts that prevented him from using the browser.”To read this article in full or to leave a comment, please click here]]> 2017-03-29T07:38:00+00:00 http://www.networkworld.com/article/3186229/security/updating-apple-ios-will-protect-you-from-this-fake-ransomware-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349030 False None None None Network World - Magazine Info Privacy advocates plan to fight Congress\' repeal of ISP privacy rules voted 215 to 205 to strike down ISP privacy regulations approved by the Federal Communications Commission only months ago. House's passage of a resolution of disapproval followed a Senate vote to pass the same resolution days earlier. President Donald Trump is expected to sign the Republican-pushed bill. But Senator Ed Markey, a Massachusetts Democrat, said he will introduce new legislation to require the FCC to pass new ISP privacy rules.To read this article in full or to leave a comment, please click here]]> 2017-03-29T07:05:43+00:00 http://www.networkworld.com/article/3185807/security/privacy-advocates-plan-to-fight-congress-repeal-of-isp-privacy-rules.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349031 False None None None Network World - Magazine Info Scammers scare iPhone users into paying to unlock not-really-locked Safari Monday post to Lookout's blog, exploited a bug in how Safari displayed JavaScript pop-ups. When the browser reached a malicious site implanted with the attack code, the browser went into an endless loop of dialogs that refused to close no matter who many times "OK" was tapped. The result: Safari was unusable.To read this article in full or to leave a comment, please click here]]> 2017-03-29T06:06:00+00:00 http://www.networkworld.com/article/3185742/ios/scammers-scare-iphone-users-into-paying-to-unlock-not-really-locked-safari.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349032 False None None None Network World - Magazine Info 10 things you need to know about the security risks of wearables add thousands of steps to a Fitbit. (Scroll down to read Fitbit's response to the research results.)To read this article in full or to leave a comment, please click here]]> 2017-03-29T06:01:00+00:00 http://www.networkworld.com/article/3185740/security/10-things-you-need-to-know-about-the-security-risks-of-wearables.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349033 False None None None Network World - Magazine Info AI will transform information security, but it won\'t happen overnight Machine learning, the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human. These algorithms draw inferences without being explicitly programmed to do so. The idea is the more data you collect, the smarter the machine becomes.To read this article in full or to leave a comment, please click here]]> 2017-03-29T05:53:00+00:00 http://www.networkworld.com/article/3185805/application-development/ai-will-transform-information-security-but-it-won-t-happen-overnight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348769 False None None None Network World - Magazine Info Feds to battle cybersecurity with analytics To read this article in full or to leave a comment, please click here]]> 2017-03-29T05:52:00+00:00 http://www.networkworld.com/article/3185912/malware-cybercrime/feds-to-battle-cybersecurity-with-analytics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348770 False None None None Network World - Magazine Info Expert: NY breach report highlights third-party risk in a statement released last week. "The total annual number of reported security breaches increased by 60% and the number of exposed personal records tripled."According to the report, the stolen data consisted overwhelmingly of Social Security numbers and financial account information, and hacking was the leading cause of the breaches. The 1,300 breaches involved the private data of 1.6 million state residents, and 81 percent of the breaches involved the loss of Social Security numbers or financial information.To read this article in full or to leave a comment, please click here]]> 2017-03-29T05:51:00+00:00 http://www.networkworld.com/article/3185911/security/expert-ny-breach-report-highlights-third-party-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348771 False Guideline None None Network World - Magazine Info IDG Contributor Network: How to bring true interoperability to the Internet of Things RELATED: 8 tips for building a cost-effective IoT sensor network But the diversity and innovation that excites many IoT fans is a big challenge not just for manufacturers and developers, but also (and most importantly) consumers. Which technology options should be used when designing or deploying IoT devices? How do they keep up with updated or new operating systems? What about new software and connectivity technologies coming up? Those are just some of today's challenges.To read this article in full or to leave a comment, please click here]]> 2017-03-29T04:30:00+00:00 http://www.networkworld.com/article/3183538/internet-of-things/how-to-bring-true-interoperability-to-the-internet-of-things.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348772 False None None None Network World - Magazine Info IDG Contributor Network: Smyte wants to get biblical on all those bad online actors Smyte.Smyte's reason for being is to smite (see what I did there?) bad online actors. Its SaaS software is already used by a number of peer-to-peer marketplaces and social apps to combat spam, scam, online harassment and credit card fraud. In other words, Smyte fights pretty much everything social media has, alas, come to be known for. Smyte is a graduate of Y Combinator's Winter 2015 program.To read this article in full or to leave a comment, please click here]]> 2017-03-28T20:12:00+00:00 http://www.networkworld.com/article/3183571/security/smyte-wants-to-get-biblical-on-all-those-bad-online-actors.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348127 False None None None Network World - Magazine Info US House votes to undo broadband privacy rules passed last year. The rules had yet to come into effect.They require broadband carriers to first obtain opt-in approval from customers before using and sharing their sensitive personal information, such as web browsing history, geo-location data and what applications they've used.To read this article in full or to leave a comment, please click here]]> 2017-03-28T16:09:19+00:00 http://www.networkworld.com/article/3185877/privacy/us-house-votes-to-undo-broadband-privacy-rules.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348128 False None None None Network World - Magazine Info FBI warns of attacks on anonymous FTP servers To read this article in full or to leave a comment, please click here]]> 2017-03-28T13:41:00+00:00 http://www.networkworld.com/article/3185873/security/fbi-warns-of-attacks-on-anonymous-ftp-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348130 False None None None