www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T03:23:57+00:00 www.secnews.physaphae.fr Network World - Magazine Info RIP Raimund Genes, Trend Micro CTO Raimund Genes I learned this past Saturday that my good friend and Trend Micro CTO, Raimund Genes, passed away suddenly last week. Raimund was only 54.If you were lucky enough to cross paths with Raimund, you probably share my profound sorrow at his passing. For those who never had the pleasure of a meeting, allow me to provide a few thoughts about him: I first met Raimund at an industry event where he was supposed to go through a PowerPoint presentation with me. Upon shaking my hand, he said something like, “Let's skip the formalities of a canned presentation, go to the bar, get a drink, and just talk.” We did have a drink at the bar that day, but what I remember most was an hour of insightful and entertaining banter. He was both informal and informative simultaneously, and we immediately connected. One of the things that I love about my job is that I get to speak to some of the smartest cybersecurity people-professionals, researchers, technology vendors, legislators, etc.-on a regular basis. Out of this exceptional population, however, some people stand out. I call these folks my “beacons” in that I'm more engaged when I speak with them and I always feel like I learned something when the conversation ends. Raimund was one of my beacons. Raimund used his knowledge, charisma and humor when delivering a presentation, and I found him to be one of the best presenters around. He entertained and educated at the same time, a rare gift. Heck, even his slides were often part of his overall shtick. Raimund could be jet lagged and the last presenter of the day, and he still always seemed to wow any audience.     Raimund didn't have the public visibility of people like Dmitri Alperovitch (Crowdstrike), Eugene Kaspersky (Kaspersky Lab) or Kevin Mandiant (FireEye), but boy did he know his stuff! Off the top of his head, he could tell you about the latest security breaches, new strains of malware, recently developed exploit kits, or hacker banter on the dark web. He was continually working on something with law enforcement organizations such as the FBI or Interpol so he couldn't always share details, but even his high-level cybercrime descriptions could make the hair on your neck stand up.  Raimund was a true citizen of the world. It seemed like every time I saw him, he had just flown in from a trip that included a worldwide tour. This gave him a broad perspective on cybersecurity issues and strategies and a gift for sharing these experiences. He taught me about cybersecurity education in Korea, cybercrime in Brazil and regulations in Europe. For example, last October he educated a group of American cybersecurity analysts on impending requirements around GDPR. Since this visit, many of his predications have come true, and his recommendations were always sound. In spite of his knowledge, CTO position and global schedule, Raimund was completely down to earth and a straight shooter. As money and hyperbole flowed into the cybersecurity technology market, Raimund wasn't afraid to call BS. He would always tell you what he thought and why without any hint of industry or organizational spin. And Raimund didn't take himself too seriously. He could talk about polymorphic malware in one sentence and then leave you laughing with a joke in the next. Raimund was the whole package-extremely smart, charming, energetic, fun and engaging-which is why you couldn't help but like him, appreciate his knowledge and enjoy his company. He was a great ambassador for the cybersecurity professional diaspora. To read t]]> 2017-03-28T12:36:00+00:00 http://www.networkworld.com/article/3185399/security/rip-raimund-genes-trend-micro-cto.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348143 False None None None Network World - Magazine Info 9 biggest information security threats through 2019 To read this article in full or to leave a comment, please click here]]> 2017-03-28T12:33:00+00:00 http://www.networkworld.com/article/3185870/security/9-biggest-information-security-threats-through-2019.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348144 False None None None Network World - Magazine Info The insecurities list: 10 ways to improve cybersecurity To read this article in full or to leave a comment, please click here]]> 2017-03-28T10:56:00+00:00 http://www.networkworld.com/article/3185391/security/the-insecurities-list-10-ways-to-improve-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348145 False None None None Network World - Magazine Info LastPass is scrambling to fix another serious vulnerability the LastPass flaws patched last week, the new issue was discovered and reported to LastPass by Tavis Ormandy, a researcher with Google's Project Zero team. The researcher revealed the vulnerability's existence in a message on Twitter, but didn't publish any technical details about it that could allow attackers to exploit it.To read this article in full or to leave a comment, please click here]]> 2017-03-28T09:49:56+00:00 http://www.networkworld.com/article/3185727/security/lastpass-is-scrambling-to-fix-another-serious-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348146 False None LastPass None Network World - Magazine Info Malware infection rate of smartphones is soaring – Android devices often the target Mobile Threat Intelligence Report gathered from devices on which Nokia NetGuard Endpoint Security is deployed in Europe, North America, Asia Pacific and the Middle East.+More on Network World:  Cisco Talos warns of Apple iOS and MacOS X.509 certificate flaw+To read this article in full or to leave a comment, please click here]]> 2017-03-28T09:06:00+00:00 http://www.networkworld.com/article/3185766/security/malware-infection-rate-of-smartphones-is-soaring-android-devices-often-the-target.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348147 False None None None Network World - Magazine Info Study finds devices are not wiped properly To read this article in full or to leave a comment, please click here]]> 2017-03-28T08:56:00+00:00 http://www.networkworld.com/article/3185560/security/study-finds-devices-are-not-wiped-properly.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348148 False None None None Network World - Magazine Info People may have been wrongly imprisoned due to faulty ankle bracelet tracking devices To read this article in full or to leave a comment, please click here]]> 2017-03-28T08:22:00+00:00 http://www.networkworld.com/article/3185458/security/people-may-have-been-wrongly-imprisoned-due-to-faulty-ankle-bracelet-tracking-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348149 False None None None Network World - Magazine Info Ignore that call from “Apple” about an iCloud breach Apple says no such breach occurred, and security researchers, like Troy Hunt of HaveIBeenPwned.com, say the group trying to extort Apple likely has reused credentials from other sites' password leaks. (We recommend turning on two-factor authentication at iCloud regardless.)To read this article in full or to leave a comment, please click here]]> 2017-03-28T04:51:00+00:00 http://www.networkworld.com/article/3185429/security/ignore-that-call-from-apple-about-an-icloud-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=347807 False None None None Network World - Magazine Info How to respond to device and software backdoors inserted or left by vendors IHS forecasting an influx of 30.7 billion IoT devices by 2020 and 75.4 billion by 2025, additional products that could house vendor backdoors will flood the enterprise, multiplying the risks of these kinds of security holes.To read this article in full or to leave a comment, please click here]]> 2017-03-28T04:47:00+00:00 http://www.networkworld.com/article/3185472/security/how-to-respond-to-device-and-software-backdoors-inserted-or-left-by-vendors.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=347808 False None None None Network World - Magazine Info IDG Contributor Network: What enterprises should take away from the CIA leak WikiLeaks Vault 7 leak.To me, three key takeaways are that leaks can happen to any organization, figuring out what entity carried out an attack is difficult to do, and we're in an era when nation-state weapons end up in the hands of criminals. Collectively, these development make practicing information security more complex than ever. Now, let's explore each one in more detail.To read this article in full or to leave a comment, please click here]]> 2017-03-28T04:15:00+00:00 http://www.networkworld.com/article/3184794/security/what-enterprises-should-take-away-from-the-cia-leak.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=347809 False None None None Network World - Magazine Info Cisco Talos warns of Apple iOS and MacOS X.509 certificate flaw X.509 security certificates are widely used and integral to many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure web browsing protocol.+More on Network World: 5 burning questions with new IETF Chair and Cisco Fellow Alissa Cooper+“For most people, securely connecting to a website seems as simple as checking to make sure the little padlock in the address bar is present. However, in the background there are many different steps that are taken to ensure you are safely and securely connecting to the websites that claim they are who they are. This process includes certificate validation, or making sure that the servers that users are connecting to present “identification” showing they are legitimate. This helps to protect users from fraudulent servers that might otherwise steal sensitive information,” Talos wrote.To read this article in full or to leave a comment, please click here]]> 2017-03-27T14:24:00+00:00 http://www.networkworld.com/article/3185407/security/cisco-talos-warns-of-apple-ios-and-macos-x-509-certificate-flaw.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346810 False None None None Network World - Magazine Info Cisco announces cornucopia of product updates at Enterprise Connect Enterprise Connect, gets underway this week in Orlando, Florida. The show has become the place for vendors to show off the latest and greatest, and the week started off with Cisco announcing some new products and updates to existing ones. Cisco's collaboration business has been on quite a roll of late, as it has released a number of new solutions, including the game-changing Spark Board, which was unveiled earlier this year. To read this article in full or to leave a comment, please click here]]> 2017-03-27T13:01:00+00:00 http://www.networkworld.com/article/3185306/collaboration/cisco-announces-cornucopia-of-product-updates-at-enterprise-connect.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346811 False None None None Network World - Magazine Info Carnegie Mellon hacking contest aims to get IT security talent started young picoCTF online hacking contest beginning on March 31 and ending April 14, but only U.S. students in grades 6-12 are eligible for some $30K in prizes. CMU says about 30,000 people have partaken in picoCTF, a game in which participants must reverse engineer, hack, decrypt and do whatever it takes to solve a challenge.To read this article in full or to leave a comment, please click here]]> 2017-03-27T12:49:00+00:00 http://www.networkworld.com/article/3184737/security/carnegie-mellon-hacking-contest-aims-to-get-it-security-talent-started-young.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346812 False None None None Network World - Magazine Info Apple iOS 10.3 packs 20-plus new features & is available now Bob Brown/NetworkWorld ios 10.3 Bob Brown/NetworkWorld Not to be overlooked in iOS 10.3, even though it works behind the scenes, is support for the Apple File System (APFS) that the company introduced last year at its Worldwide Developers Conference. APFS is designed to work better with flash storage and has improved encryption support.To read this article in full or to leave a comment, please click here]]> 2017-03-27T11:00:00+00:00 http://www.networkworld.com/article/3184799/ios/apple-ios-103-packs-20-plus-new-features-is-available-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346813 False None None None Network World - Magazine Info Organizations need strategic and proactive threat intelligence programs To read this article in full or to leave a comment, please click here]]> 2017-03-27T08:42:00+00:00 http://www.networkworld.com/article/3185209/security/toward-strategic-and-proactive-threat-intelligence-programs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346826 False None None None Network World - Magazine Info Microsoft\'s Docs.com is sharing dangerously sensitive personal files and information Microsoft's Docs.com to store personal documents, stop reading this and make sure you aren't inadvertently leaking your private information to the world.Microsoft sets any documents uploaded to the document sharing site as public by default-though it appears that many users aren't aware of it. That means anyone can search Docs.com for sensitive personal information that wasn't manually set private. PCWorld found social security numbers, health insurance ID numbers, bank records, job applications, personal contact details, legal correspondence, and drivers license numbers with just a few minutes of searching.To read this article in full or to leave a comment, please click here]]> 2017-03-27T07:31:00+00:00 http://www.networkworld.com/article/3184936/cloud-computing/microsofts-docscom-is-sharing-dangerously-sensitive-personal-files-and-information.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346827 False None None None Network World - Magazine Info Fortinet CISO on securing critical infrastructure: \'We can no longer bring a knife to a gunfight\' To read this article in full or to leave a comment, please click here]]> 2017-03-27T07:21:00+00:00 http://www.networkworld.com/article/3184935/security/fortinet-ciso-on-securing-critical-infrastructure-we-can-no-longer-bring-a-knife-to-a-gunfight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346828 False Guideline None None Network World - Magazine Info Hitachi reveals new AI for real-time identity detection and tracking Hitachi announced it has developed a new image analysis system that uses artificial intelligence (AI) for real-time people tracking and detection. The AI can detect an individual in real time by combining over 100 external characteristics and then track that person using wide-area security and surveillance systems.Systems that capture facial images and color of clothing have previously been deployed in public areas, but according to Hitachi, it is difficult for security staff to find and track a person based on an eyewitness account or poor surveillance camera footage.To read this article in full or to leave a comment, please click here]]> 2017-03-27T07:17:00+00:00 http://www.networkworld.com/article/3184345/security/hitachi-reveals-new-ai-for-real-time-identity-detection-and-tracking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346829 False None None None Network World - Magazine Info SDN solves a lot of network problems, but security isn\'t one of them Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here]]> 2017-03-27T06:03:00+00:00 http://www.networkworld.com/article/3184933/software-defined-networking/sdn-solves-a-lot-of-network-problems-but-security-isnt-one-of-them.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346830 False None None None Network World - Magazine Info New products of the week 3.27.17 Image by Array NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetCrunch Tools 2.0adremImage by adremTo read this article in full or to leave a comment, please click here]]> 2017-03-27T02:39:00+00:00 http://www.networkworld.com/article/3184784/mobile-wireless/new-products-of-the-week-3-27-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346519 True None None None Network World - Magazine Info UK official wants police access to WhatsApp messages according to reports.“We need to make sure that organizations like WhatsApp, and there are plenty of others like that, don't provide a secret place for terrorists to communicate with each other,” Home Secretary Amber Rudd said on BBC One's Andrew Marr Show on Sunday.To read this article in full or to leave a comment, please click here]]> 2017-03-26T21:02:17+00:00 http://www.networkworld.com/article/3184911/internet/uk-official-wants-police-access-to-whatsapp-messages.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345984 False None None None Network World - Magazine Info Microsoft axed Docs.com search option after private files were shared publicly Docs.com, Microsoft's site which is described as “showcase and discover Microsoft Word, Excel, PowerPoint, OneNote, Sway and PDF document for free,” came under fire over the weekend as Twitter users started complaining that users of the site had inadvertently shared private and sensitive information with the world.The site had a search functionality which would allow anyone to search through millions of files. When some users had uploaded private information, they had not changed the permissions from the default setting to share content publicly. Yet after people started tweeting screenshots of sensitive information, Microsoft quietly removed the search functionality on Saturday.To read this article in full or to leave a comment, please click here]]> 2017-03-26T08:42:00+00:00 http://www.networkworld.com/article/3184907/security/microsoft-axed-docs-com-search-option-after-private-files-were-shared-publicly.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345985 False None None None Network World - Magazine Info CIA, WikiLeaks and Doctor Who? 2017-03-24T14:55:00+00:00 http://www.networkworld.com/video/76035/cia-wikileaks-and-doctor-who#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345999 False None None None Network World - Magazine Info Consultant urges never pay ransomware demands To read this article in full or to leave a comment, please click here]]> 2017-03-24T14:40:00+00:00 http://www.networkworld.com/article/3184783/security/consultant-urges-never-pay-ransomware-demands.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345987 False None None None Network World - Magazine Info Apple: Macs and iPhones are safe from newly revealed CIA exploits describe several “implants” that the CIA can install in the low-level extensible firmware interface (EFI) of Mac laptop and desktop computers. These EFI rootkits allow the agency's macOS spying malware to persist even after the OS is reinstalled.To read this article in full or to leave a comment, please click here]]> 2017-03-24T11:58:31+00:00 http://www.networkworld.com/article/3184772/security/apple-macs-and-iphones-are-safe-from-newly-revealed-cia-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346001 False None None None Network World - Magazine Info IDG Contributor Network: 7 best practices for securing your cloud service The tricky, personal politics of cloud security + When leveraging cloud services, enterprises need to evaluate several key factors, including:To read this article in full or to leave a comment, please click here]]> 2017-03-24T11:36:00+00:00 http://www.networkworld.com/article/3184623/cloud-security/7-best-practices-for-securing-your-cloud-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346002 False None None None Network World - Magazine Info Google Play faces cat and mouse game with sneaky Android malware new report from Google.To read this article in full or to leave a comment, please click here]]> 2017-03-24T11:16:26+00:00 http://www.networkworld.com/article/3184416/security/google-play-faces-cat-and-mouse-game-with-sneaky-android-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346003 False None None None Network World - Magazine Info How to set up two-factor authentication for your Apple ID and iCloud account millions of stolen iCloud credentials are demanding Apple pay a ransom or they'll release them-and ZDNet obtained a sample set of credentials and determined they're real.But guess what? Using two-factor authentication should protect you completely. It's easy to set up, so take a minute and do it now.To read this article in full or to leave a comment, please click here]]> 2017-03-24T10:48:00+00:00 http://www.networkworld.com/article/3184826/ios/how-to-set-up-two-factor-authentication-for-your-apple-id-and-icloud-account.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346004 False None None None Network World - Magazine Info To punish Symantec, Google may distrust a third of the web\'s SSL certificates To read this article in full or to leave a comment, please click here]]> 2017-03-24T10:32:40+00:00 http://www.networkworld.com/article/3184656/security/to-punish-symantec-google-may-distrust-a-third-of-the-webs-ssl-certificates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346005 False None None None Network World - Magazine Info Review: Canary Flex security camera lives up to its name touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canary camera was also somewhat large – a cylindrical tower that took up some significant space on your desk, cabinet or shelf.The latest camera the company sent me is the Canary Flex, a much smaller unit meant to be more flexible (hence the name) in terms of placement, but also in power options. Like the Arlo Pro camera, the Canary Flex is powered by an internal battery (it's charged via USB cable and power adapter). This means you can move the Flex to a location inside or outside your home where there's no power outlet. The Flex comes with wall mounting screws and a 360-degree magnetic stand so you can position the camera in different spots. Additional accessories, such as a plant mount or twist mount (pictured below), offer even more location choices.To read this article in full or to leave a comment, please click here]]> 2017-03-24T06:01:00+00:00 http://www.networkworld.com/article/3183582/consumer-electronics/review-canary-flex-security-camera-lives-up-to-its-name.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345544 False None None None Network World - Magazine Info Bitcoin rise fuels social media scams according to a report released this week."The same characteristics that make Bitcoin attractive to people who want to make money distributing ransomware make it attractive to scammers," said Philip Tully, senior data scientist at security vendor ZeroFox, which published the report.To read this article in full or to leave a comment, please click here]]> 2017-03-24T05:22:00+00:00 http://www.networkworld.com/article/3184691/security/bitcoin-rise-fuels-social-media-scams.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345545 False None None None Network World - Magazine Info Blockchain can help secure medical devices, improve patient privacy ransomware and use as payment for illegal items on the Dark Web, Partners' Deputy CISO Esmond Kane told the SecureWorld audience this week in Boston.On the other hand, the decentralized, encrypted public ledger could have a wealth of applications in healthcare, Kane says. These include streamlining the resolution of insurance claims, management of internet of things medical devices and providing granular privacy settings for personal medical data.To read this article in full or to leave a comment, please click here]]> 2017-03-24T04:44:00+00:00 http://www.networkworld.com/article/3184614/security/blockchain-can-help-secure-medical-devices-improve-patient-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345546 False None None None Network World - Magazine Info Complete security deception includes detection and incident response To read this article in full or to leave a comment, please click here]]> 2017-03-24T03:45:00+00:00 http://www.networkworld.com/article/3184413/security/complete-security-deception-includes-detection-and-incident-response.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=345547 False None None None Network World - Magazine Info FBI director floats international framework on access to encrypted data comments at the University of Texas at Austin, when trying to address a key concern facing U.S. tech firms in the encryption debate: the fear that providing government access to their products might dampen their business abroad.To read this article in full or to leave a comment, please click here]]> 2017-03-23T15:21:39+00:00 http://www.networkworld.com/article/3184334/security/fbi-director-floats-international-framework-on-access-to-encrypted-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344522 False None None None Network World - Magazine Info Leaked iCloud credentials obtained from third parties, Apple says To read this article in full or to leave a comment, please click here]]> 2017-03-23T13:52:10+00:00 http://www.networkworld.com/article/3184471/security/leaked-icloud-credentials-obtained-from-third-parties-apple-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344523 False None None None Network World - Magazine Info If incident response automation is hot, threat detection automation is sizzling Network World article Jon Oltsik noted that Incident Response (IR) automation is becoming a very hot topic in the info security world. Oltsik called out multiple factors driving demand for IR automation and orchestration, including the manual nature of IR work, the cyber skills shortage and the difficulty of coordinating activity between SecOps and DevOps.To read this article in full or to leave a comment, please click here]]> 2017-03-23T12:42:00+00:00 http://www.networkworld.com/article/3184468/security/if-incident-response-automation-is-hot-threat-detection-automation-is-sizzling.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344524 False None None None Network World - Magazine Info Newly leaked documents show low-level CIA Mac and iPhone hacks the documents, dated Nov. 29, 2012, is a manual from the CIA's Information Operations Center on the use of a technology codenamed Sonic Screwdriver. It is described as "a mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting." Sonic Screwdriver allows the CIA to modify the firmware of an Apple Thunderbolt-to-Ethernet adapter so that it forces a Macbook to boot from an USB stick or DVD disc even when its boot options are password protected.To read this article in full or to leave a comment, please click here]]> 2017-03-23T11:24:00+00:00 http://www.networkworld.com/article/3184430/security/wikileaks-documents-show-cias-mac-and-iphone-compromises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344525 False None None None Network World - Magazine Info Senate votes to kill FCC\'s broadband privacy rules resolution of disapproval would roll back Federal Communications Commission rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details with third parties. The FCC approved the regulations just five months ago.To read this article in full or to leave a comment, please click here]]> 2017-03-23T10:13:30+00:00 http://www.networkworld.com/article/3184406/security/senate-votes-to-kill-fccs-broadband-privacy-rules.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344538 False None None None Network World - Magazine Info Snowden\'s ex-boss offers tips on stopping insider threats insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the U.S. National Security Agency. Recalling the day he learned Snowden had been behind the NSA leaks back in June 2013, Bay said he received texts about the breaking news while in a leadership meeting at a church. The first text said "Sorry man, looks like your worst nightmare came true."To read this article in full or to leave a comment, please click here]]> 2017-03-23T10:10:00+00:00 http://www.networkworld.com/article/3183277/security/snowdens-ex-boss-offers-tips-on-stopping-insider-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344539 False Guideline None None Network World - Magazine Info Now WikiLeaks threatens to disclose software vulnerabilities WikiLeaks leader Julian Assange promised that the site would work with the affected tech companies to give them exclusive access to the technical details of those exploits and would not go public with the exploits and back doors. However, it wasn't until this week that WikiLeaks got in contact with the listed tech companies, such as Microsoft, Apple and Google, according to Motherboard, the tech site run by Vice. Citing unnamed sources familiar with the matter, Motherboard said WikiLeaks has made demands on the initial contact with firms but didn't share any of the alleged CIA codes. To read this article in full or to leave a comment, please click here]]> 2017-03-23T08:25:00+00:00 http://www.networkworld.com/article/3183577/security/now-wikileaks-threatens-to-disclose-software-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344540 False Guideline None None Network World - Magazine Info FTC warns on “Can you hear me now” robocall: Hang up! FTC says it has received hundreds of complaints on the calls which could end up being part of a scam to get your money. +More on Network World: U.S. Marshals warn against dual phone scams+ The Better Business Bureau described the scam earlier this year: “By replying 'yes,'  'sure,' or other agreeable response, the scammer records the call and uses that sound bite to authorize unwanted charges to the scammers benefit. “It seems like an innocent question, but it can cause undue financial burdens and stress. The scam caller may already have your financial information, which is how they authorize a payment and, if you dispute a charge, the scammer has doctored the recording to make it seems as though you agreed to it.”To read this article in full or to leave a comment, please click here]]> 2017-03-23T08:05:00+00:00 http://www.networkworld.com/article/3183579/security/ftc-bbb-warns-on-can-you-hear-me-now-robocall-hang-up.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344541 False None None None Network World - Magazine Info Cisco security researcher: Ransomware crowd big on customer service SecureWorld Boston this week. Antoniewicz, sporting a RUN DNS t-shirt reflecting his position with the Cisco Umbrella (formerly OpenDNS) team, dove into the topic of ransomware variants like Cerber as part of a broader talk on “An Anatomy of an Attack” and the elaborate ecosystem behind cyberattacks. To read this article in full or to leave a comment, please click here]]> 2017-03-23T08:03:00+00:00 http://www.networkworld.com/article/3184108/cisco-subnet/cisco-security-researcher-ransomware-crowd-big-on-customer-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344542 False None None None Network World - Magazine Info How to stop insider threats Image by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a significant risk for employers whose data was misappropriated, resulting in potential data breaches that can trigger regulatory actions or legal actions, as well as a variety of other consequences. Most employers are not adequately prepared to deal with the aftermath of employee data theft and many do not take the steps necessary to mitigate these risks before they occur.To read this article in full or to leave a comment, please click here]]> 2017-03-23T06:09:00+00:00 http://www.networkworld.com/article/3184118/security/how-to-stop-insider-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344264 False None None None Network World - Magazine Info Experts: US needs a federal CISO Netskope.The job of a federal CISO is very new -- it was only created last year and filled in September with the appointment of retired brigadier general Gregory Touhill. He was previously the deputy assistant secretary for cybersecurity and communications at the Department of Homeland Security.To read this article in full or to leave a comment, please click here]]> 2017-03-23T06:06:00+00:00 http://www.networkworld.com/article/3184156/security/experts-us-needs-a-federal-ciso.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344265 False Guideline None None Network World - Magazine Info Look before you leap: 4 hard truths about IoT not great.To read this article in full or to leave a comment, please click here]]> 2017-03-23T05:00:02+00:00 http://www.networkworld.com/article/3184083/internet-of-things/look-before-you-leap-4-hard-truths-about-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344266 False None None None Network World - Magazine Info LastPass fixes serious password leak vulnerabilities a description in the Google Project Zero bug tracker, the vulnerability could have given attackers access to internal commands inside the LastPass extension. Those are the commands used by the extension to copy passwords or fill in web forms using information stored in the user's secure vault.To read this article in full or to leave a comment, please click here]]> 2017-03-22T14:21:49+00:00 http://www.networkworld.com/article/3184149/security/lastpass-fixes-serious-password-leak-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343307 False None LastPass None Network World - Magazine Info iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices purported hackers. "But whether they have that many ... who knows?"There's another reason for not panicking, Bailey said: People can quickly make their accounts more secure, assuming the criminals have only collected, not actually compromised the iCloud accounts by changing millions of passwords.To read this article in full or to leave a comment, please click here]]> 2017-03-22T13:27:00+00:00 http://www.networkworld.com/article/3183600/macs/iphone-mac-owners-how-to-stymie-hackers-extorting-apple-threatening-to-wipe-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343308 False None None None Network World - Magazine Info Cisco: IOS security update includes denial of service and code execution warnings “High” that could lead to denial of service attacks or allow an invader to execute arbitrary code on an particular system.The warnings – which include Cisco's DHCP client, L2TP, Zero Touch Provisioning, HTTP server and Web user interface -- are part of what Cisco says are a twice-yearly bundle of IOS security advisories it issues to keep those users up-to-date on current IOS security issues.To read this article in full or to leave a comment, please click here]]> 2017-03-22T12:32:00+00:00 http://www.networkworld.com/article/3184204/security/cisco-ios-security-update-includes-denial-of-service-and-code-execution-warnings.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343309 False Guideline None None Network World - Magazine Info Google cites progress in Android security, but patching issues linger potentially harmful application," such as spyware, a Trojan, or other malicious software.That figure was even lower, at 0.05 percent, for Android phones that downloaded apps exclusively from the Google Play store.The internet giant revealed the figures in a new report detailing its efforts to making the Android OS secure. Thanks to better app review systems, the company is detecting and cracking down on more malware.To read this article in full or to leave a comment, please click here]]> 2017-03-22T12:08:52+00:00 http://www.networkworld.com/article/3184031/security/google-cites-progress-in-android-security-but-patching-issues-linger.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343310 False None None None Network World - Magazine Info Know your encryption workarounds: a paper the paper's abstract: The widespread use of encryption has triggered a new step in many criminal investigations: the encryption workaround. We define an encryption workaround as any lawful government effort to reveal an unencrypted version of a target's data that has been concealed by encryption. This essay provides an overview of encryption workarounds. It begins with a taxonomy of the different ways investigators might try to bypass encryption schemes. We classify six kinds of workarounds: find the key, guess the key, compel the key, exploit a flaw in the encryption software, access plaintext while the device is in use, and locate another plaintext copy. For each approach, we consider the practical, technological, and legal hurdles raised by its use.To read this article in full or to leave a comment, please click here]]> 2017-03-22T11:24:00+00:00 http://www.networkworld.com/article/3184144/security/know-your-encryption-workarounds-a-paper.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343323 False None None None Network World - Magazine Info Hackers threaten to wipe millions of Apple devices, demand ransom To read this article in full or to leave a comment, please click here]]> 2017-03-22T09:43:37+00:00 http://www.networkworld.com/article/3184064/security/hackers-threaten-to-wipe-millions-of-apple-devices-demand-ransom.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343324 False None None None Network World - Magazine Info Cisco closes AppDynamics deal, increases software weight Has Cisco broken out of the network hardware box?+To read this article in full or to leave a comment, please click here]]> 2017-03-22T09:42:00+00:00 http://www.networkworld.com/article/3184027/analytics/cisco-closes-appdynamics-deal-increases-software-weight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343325 False None None None Network World - Magazine Info Facial recognition in public restroom required if you want toilet paper To read this article in full or to leave a comment, please click here]]> 2017-03-22T09:06:00+00:00 http://www.networkworld.com/article/3183436/security/facial-recognition-in-public-restroom-required-if-you-want-toilet-paper.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343326 False None None None Network World - Magazine Info US lawmakers question police use of facial recognition tech  containing more than 400 million photographs, many of them from the drivers' licenses of people who have never committed a crime. The photos of more than half of U.S adults are contained in a series of FBI and state databases, according to one study released in October.To read this article in full or to leave a comment, please click here]]> 2017-03-22T08:33:00+00:00 http://www.networkworld.com/article/3183431/security/us-lawmakers-question-police-use-of-facial-recognition-tech.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343327 False None None None Network World - Magazine Info Stop using password manager browser extensions LostPass at ShmooCon, and in that time, many more bugs have been found in password managers. The most severe of which are in browser-based password managers extensions such as LastPass. Tavis Ormandy yesterday demonstrated a remote code execution on the latest LastPass version. This isn't the first extremely severe bug he's found in LastPass, either; there've been so many extremely severe bugs in LastPass it would be tedious to list them out. But LastPass isn't alone: Keeper, Dashlane and even 1Password have had severe vulnerabilities that allowed attackers to steal all of the passwords in a user's account without their knowledge.To read this article in full or to leave a comment, please click here]]> 2017-03-22T07:15:00+00:00 http://www.networkworld.com/article/3183675/security/stop-using-password-manager-browser-extensions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343328 False None LastPass None Network World - Magazine Info Double Agent attack can turn antivirus into malware a Cybellum blog. All the vendors were notified more than 90 days ago, which is the standard length of time for responsibly disclosing vulnerabilities and giving vendors time to fix them.To read this article in full or to leave a comment, please click here]]> 2017-03-22T07:13:00+00:00 http://www.networkworld.com/article/3183587/security/double-agent-attack-can-turn-antivirus-into-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343329 False None None None Network World - Magazine Info Security Sessions: Where is VC security funding going? 2017-03-22T06:00:00+00:00 http://www.networkworld.com/video/75498/security-sessions-where-is-vc-security-funding-going#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=342950 False None None None Network World - Magazine Info 10 greatest inside security risks Image by ThinkstockLast year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access, says Sam Elliott, director of security product management at Bomgar. Elliott warns that these 10 employees could be your greatest internal security threat.To read this article in full or to leave a comment, please click here]]> 2017-03-22T04:53:00+00:00 http://www.networkworld.com/article/3183928/security/these-10-people-may-be-your-greatest-inside-security-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=342937 False None None None Network World - Magazine Info Critical infrastructure: Off the web, out of danger? used that term just three months ago, saying such an attack would be aimed either at the electrical grid or the financial sector.To read this article in full or to leave a comment, please click here]]> 2017-03-22T04:51:00+00:00 http://www.networkworld.com/article/3183927/security/critical-infrastructure-off-the-web-out-of-danger.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=342938 False None None None Network World - Magazine Info IDG Contributor Network: Protect your unstructured data with user behavior analytics exposure of its hacking tools via WikiLeaks. It's ironic that the CIA's hacking guides have been hacked, but it just goes to show how difficult it can be to prevent.Carelessly handled unstructured data is an easy target, and it can prove very valuable for hackers. Since unstructured data may not be monitored, attacks and successful exfiltrations often go unnoticed for long periods.To read this article in full or to leave a comment, please click here]]> 2017-03-21T21:01:00+00:00 http://www.networkworld.com/article/3182910/security/protect-your-unstructured-data-with-user-behavior-analytics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341989 False None None None Network World - Magazine Info What it takes to become an IT security engineer download What it takes to become an IT security engineer | PDF download CSO Online Getting started After being laid off in 2008 from his first IT job in tech support and systems administration, friends encouraged Copeland to use his networking talents to get a certification that would boost his career. He studied for three months and earned his Cisco Certified Network Associate (CCNA) certification in routing and switching. “CCNA was the biggest helper [for my security career path],” says Copeland. “It's one of the hardest network certifications in the industry.” Also, he notes, “because it ties networking for firewalls and VPN, it has security components to it.” He also scoured daily posts on Reddit, the news aggregation and discussion website, to learn as much as he could about network and IT security, and to keep up with the latest threats.To read this article in full or to leave a comment, please click here]]> 2017-03-21T13:41:00+00:00 http://www.networkworld.com/article/3183113/careers/what-it-takes-to-become-an-it-security-engineer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341990 False None FedEx None Network World - Magazine Info IDG Contributor Network: Acoustic attack lets hackers control smartphone sensor University of Michigan and University of South Carolina in a paper.Accelerometers measure changes of speed in a device, and they are used industrially to sense vibration for machinery health. In a smartphone, the accelerometer sensor can be used to detect screen orientation, for example.To read this article in full or to leave a comment, please click here]]> 2017-03-21T11:58:00+00:00 http://www.networkworld.com/article/3183529/security/acoustic-attack-lets-hackers-control-smartphone-sensor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341991 False None None None Network World - Magazine Info UK follows US ban of electronic devices in cabins on some flights said on Tuesday. The U.K. said it was in "close contact" with the U.S. since the country announced its own ban on Monday.  However, the U.K. made no mention of any specific risk, only that it faces "evolving" terrorism threats. To read this article in full or to leave a comment, please click here]]> 2017-03-21T11:20:16+00:00 http://www.networkworld.com/article/3183293/security/uk-follows-us-ban-of-electronic-devices-in-cabins-on-some-flights.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341992 False None None None Network World - Magazine Info Flaws in Moodle CMS put thousands of e-learning websites at risk released updates for the still supported branches of the platform: 3.2.2, 3.1.5, 3.0.9 and 2.7.19. The release notes mentioned that "a number of security related issues were resolved," but didn't provide any additional details about their nature or impact.To read this article in full or to leave a comment, please click here]]> 2017-03-21T10:39:08+00:00 http://www.networkworld.com/article/3183555/security/flaws-in-moodle-cms-put-thousands-of-e-learning-websites-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=342005 False None None None Network World - Magazine Info Cloud security still a work in progress The top 12 cloud security threats + So, how's cloud security going at this point? ESG research indicates it is still a work in progress. As part of a recent survey, cybersecurity professionals were presented with a series of statements about cloud security and asked whether they agreed or disagreed with each one. Here are some of the results:To read this article in full or to leave a comment, please click here]]> 2017-03-21T07:45:00+00:00 http://www.networkworld.com/article/3183546/security/cloud-security-still-a-work-in-progress.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=342006 False None None None Network World - Magazine Info IDG Contributor Network: Blockchain the perfect data protection tool for banks using mainframes RELATED: Inside Bank of America's IT transformation Blockchain first entered the public's (OK, the techie public's) awareness in the orbit of Bitcoin, as a means of securing that controversial digital currency's code against someone who decided to break into the right server and add a couple zeroes to their account. But Bitcoin haters need not close this tab in disgust just yet, as blockchain has come into its own as a reliable security measure for more than just black market storefronts.To read this article in full or to leave a comment, please click here]]> 2017-03-21T07:45:00+00:00 http://www.networkworld.com/article/3183127/security/blockchain-the-perfect-data-protection-tool-for-banks-using-mainframes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=342007 False None None None Network World - Magazine Info Mozilla beats rivals, patches Firefox\'s Pwn2Own bug tweeted the Zero Day Initiative (ZDI) Monday. ZDI, the bug brokerage run by Trend Micro, sponsored Pwn2Own.[ To comment on this story, visit Computerworld's Facebook page. ] Mozilla released Firefox 52.0.1 on Friday, March 17, with a patch for the integer overflow bug that Chaitin Security Research Lab leveraged in an exploit at Pwn2Own on Thursday, March 16. The Beijing-based group was awarded $30,000 by ZDI for the exploit, which combined the Firefox bug with one in the Windows kernel.To read this article in full or to leave a comment, please click here]]> 2017-03-21T05:00:00+00:00 http://www.networkworld.com/article/3183485/security/mozilla-beats-rivals-patches-firefoxs-pwn2own-bug.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341703 False None None None Network World - Magazine Info What to consider in developing BYOD policy Image by ThinkstockIn today's work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the inevitable, companies should develop and implement a BYOD policy that protects the company and balances productivity with security. Brandon N. Robinson Partner, Balch & Bingham LLP - Privacy and Data Security Practice, provides some tips.To read this article in full or to leave a comment, please click here]]> 2017-03-21T04:56:00+00:00 http://www.networkworld.com/article/3183465/mobile-security/what-to-consider-in-developing-byod-policy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341704 False None None None Network World - Magazine Info US bans electronics larger than smartphones in cabins on certain flights To read this article in full or to leave a comment, please click here]]> 2017-03-21T04:53:54+00:00 http://www.networkworld.com/article/3183445/security/us-bans-electronics-larger-than-smartphones-in-cabins-on-certain-flights.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341705 False None None None Network World - Magazine Info Can you imagine Mars with Saturn-like rings? said Purdue University scientists David Minton and Andrew Hesselbrock developed a model that suggests debris that was pushed into space from an asteroid or other body slamming into Mars around 4.3 billion years ago alternates between becoming a planetary ring and clumping together to form a moon.More on Network World: Elon Musk's next great adventure: Colonizing Mars+To read this article in full or to leave a comment, please click here]]> 2017-03-20T13:25:00+00:00 http://www.networkworld.com/article/3182990/security/can-you-imagine-mars-with-saturn-like-rings.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341113 False None None None Network World - Magazine Info Russia will strike US elections again, FBI warns congressional hearing on Russia's suspected efforts to meddle with last year's presidential election. Allegedly, cyberspies from the country hacked several high-profile Democratic groups and people, in an effort to tilt the outcome in President Donald Trump's favor.To read this article in full or to leave a comment, please click here]]> 2017-03-20T12:50:45+00:00 http://www.networkworld.com/article/3182881/security/russia-will-strike-us-elections-again-fbi-warns.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341114 False None None None Network World - Magazine Info Pwn2Own hacking contest ends with two virtual machine escapes To read this article in full or to leave a comment, please click here]]> 2017-03-20T12:08:03+00:00 http://www.networkworld.com/article/3182811/security/pwn2own-hacking-contest-ends-with-two-virtual-machine-escapes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341115 False None None None Network World - Magazine Info Cisco issues critical warning after CIA WikiLeaks dump bares IOS security weakness triggered the company to release a critical warning for its Catalyst networking customers.+More on Cisco Security on Network World: Cisco security advisory dump finds 20 warnings, 2 critical+The vulnerability -- which could let an attacker cause a reload of an affected device or remotely execute code and take over a device -- impacts more than 300 models of Cisco Catalyst switches from the model 2350-48TD-S Switch to the Cisco SM-X Layer 2/3 EtherSwitch Service Module.To read this article in full or to leave a comment, please click here]]> 2017-03-20T09:07:00+00:00 http://www.networkworld.com/article/3182871/security/cisco-issues-critical-warning-after-cia-wikileaks-dump-bares-ios-security-weakness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341116 False None None None Network World - Magazine Info Pwn2Own 2017: Your stuff as mincemeat Pwn2Own 2017 hacking competition, sponsored by Trend Micro, and occasionally grouped together, then performed essentially zero-day exploits (at least by the rules, heretofore unknown) on your favorite stuff, such as Windows, MacOS and Linux. Smoldering pits in the screen were left, as teams collected cash prizes and creds. RELATED: How San Diego fights off 500,000 cyberattacks a day For giggles and grins, a Type 2 Hypervisor, VMWare Workstation was also left for shrapnel, one of the first times a hypervisor has been penetrated by a virtual machine in this way. It wasn't a cascade effect, but rather a shot across the bow. I suspect there are more ways to penetrate a foundational hypervisor, too, but they haven't been seen in captivity to my knowledge. To read this article in full or to leave a comment, please click here]]> 2017-03-20T08:52:00+00:00 http://www.networkworld.com/article/3182825/security/pwn2own-2017-your-stuff-as-mincemeat.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341129 False None None None Network World - Magazine Info FBI looks into Russian hack of US election, possible Trump involvement To read this article in full or to leave a comment, please click here]]> 2017-03-20T08:36:00+00:00 http://www.networkworld.com/article/3182865/security/fbi-looks-into-russian-hack-of-us-election-possible-trump-involvement.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=341130 False None None None Network World - Magazine Info FBI arrested man for allegedly sending seizure-causing GIF to reporter To read this article in full or to leave a comment, please click here]]> 2017-03-20T06:50:00+00:00 http://www.networkworld.com/article/3182696/security/fbi-arrested-man-for-allegedly-sending-seizure-causing-gif-to-reporter.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340774 False None None None Network World - Magazine Info Possibly the worst mass invasion of internet privacy ever local cops were reportedly stymied on how to catch the thief. Until, that is, they came up with a novel idea: Hoping to find out how the fraudster got the picture, Edina Police Detective David Lindman applied for a search warrant to obtain the names, email addresses, account information and IP addresses of everyone in the entire town of 50,000 who had searched for any variation of the victim's name between Dec. 1, 2016, and Jan. 7, 2017. To read this article in full or to leave a comment, please click here]]> 2017-03-20T06:21:00+00:00 http://www.networkworld.com/article/3182693/security/possibly-the-worst-mass-invasion-of-internet-privacy-ever.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340775 False None None None Network World - Magazine Info Credit-card breach hits another restaurant chain a report posted Thursday on KrebsOnSecurity, a reliable site written by reporter Brian Krebs. Krebs said he learned about the case from anti-fraud teams at multiple financial institutions investigating "a great deal of fraud on cards used at a handful of high-end restaurants around the country."To read this article in full or to leave a comment, please click here]]> 2017-03-20T06:02:00+00:00 http://www.networkworld.com/article/3182390/security/credit-card-breach-hits-another-restaurant-chain.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340776 False None None None Network World - Magazine Info How much is a bug worth? blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here]]> 2017-03-20T05:45:00+00:00 http://www.networkworld.com/article/3182692/security/how-much-is-a-bug-worth.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340777 False None None None Network World - Magazine Info 6 of the most effective social engineering techniques Proofpoint's 2016 Human Factor Report.These successful social engineering methods often use phishing and malware. But deceptive information assailants have more tools and approaches to draw on than these.That's why CSO covers six of the most effective social engineering techniques that attackers use both on and off the internet, providing insights into how each one works, what it accomplishes, and the technologies, methods, and policies for detecting and responding to social saboteurs and keeping them at bay.To read this article in full or to leave a comment, please click here]]> 2017-03-20T05:43:00+00:00 http://www.networkworld.com/article/3182714/security/6-of-the-most-effective-social-engineering-techniques.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340790 False None None None Network World - Magazine Info Ultimate guide to strategic tech partners Microsoft acquired LinkedIn, Oracle acquired NetSuite, Broadcom acquired Brocade, HPE is buying Nimble Storage, and Dell acquired EMC.To read this article in full or to leave a comment, please click here]]> 2017-03-20T03:38:00+00:00 http://www.networkworld.com/article/3180697/network-management/ultimate-guide-to-strategic-tech-partners.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340791 False None None None Network World - Magazine Info New products of the week 3.20.17 Image by SolarWindsOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Asavie Industrial IoT Accelerator KitasavieImage by asavieTo read this article in full or to leave a comment, please click here]]> 2017-03-20T02:44:00+00:00 http://www.networkworld.com/article/3181994/data-center/new-products-of-the-week-3-20-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340592 True None None None Network World - Magazine Info Cebit showcases security after Snowden To read this article in full or to leave a comment, please click here]]> 2017-03-19T23:00:02+00:00 http://www.networkworld.com/article/3182329/security/cebit-showcases-security-after-snowden.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340231 False None None None Network World - Magazine Info McDonald\'s India asks users to update app after data leak report Facebook and Twitter over the weekend that its website and app do not store any sensitive financial data of users.The operation did not admit or deny that there had been a breach, but urged users to update the online ordering app as a precautionary measure. “The website and app has always been safe to use, and we update security measure on regular basis,” according to the post.To read this article in full or to leave a comment, please click here]]> 2017-03-19T22:20:56+00:00 http://www.networkworld.com/article/3182378/security/mcdonalds-india-asks-users-to-update-app-after-data-leak-report.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340232 False None None None Network World - Magazine Info iPhone 8 Rumor Rollup: Gentler curves and facial recognition security an event later this month or early in April regarding some new iPads and maybe some low-end iPhones. But we won't be distracted: On to the iPhone 8 rumors! KINDER, GENTLER CURVES The word is that Apple and Samsung are going to hogging up most of the shiny, energy-efficient OLED displays being pumped out this year, leaving poor Huawei and others on the outs. And after all that, it turns out that Apple's OLED displays on its anticipated 5.8-inch iPhone 8 will have a “gentler” curved screen than that found on the rival Samsung Galaxy S7 (and likely, the S8). To read this article in full or to leave a comment, please click here]]> 2017-03-19T14:07:00+00:00 http://www.networkworld.com/article/3181811/ios/iphone-8-rumor-rollup-gentler-curves-and-facial-recognition-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340233 False None None None Network World - Magazine Info BlackBerry readies a more secure version of the Samsung Galaxy S7 To read this article in full or to leave a comment, please click here]]> 2017-03-19T10:58:22+00:00 http://www.networkworld.com/article/3182494/security/blackberry-readies-a-more-secure-version-of-the-samsung-galaxy-s7.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340234 False None None None Network World - Magazine Info Star Trek-themed Kirk ransomware has Spock decryptor, demands ransom be paid in Monero Jakub Kroustek, doesn't want the ransom to be paid in bitcoin; Bleeping Computer said it “may be the first ransomware to utilize Monero as the ransom payment of choice.”It is not known how the ransomware is being distributed, but researchers know that Kirk ransomware masquerades as the Low Orbital Ion Cannon network stress tool; LOIC was once favored for denial of service attacks. The fake version sports the LOIC slogan, “When harpoons, air strikes and nukes fail,” and claims to be initializing once executed.To read this article in full or to leave a comment, please click here]]> 2017-03-19T08:40:00+00:00 http://www.networkworld.com/article/3182415/security/star-trek-themed-kirk-ransomware-has-spock-decryptor-demands-ransom-be-paid-in-monero.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340247 False None None None Network World - Magazine Info Some HTTPS inspection tools might weaken security an advisory after a recent survey showed that HTTPS inspection products don't mirror the security attributes of the original connections between clients and servers.HTTPS inspection checks the encrypted traffic coming from an HTTPS site to make sure it doesn't contain threats or malware. It's performed by intercepting a client's connection to an HTTPS server, establishing the connection on the client's behalf and then re-encrypting the traffic sent to the client with a different, locally generated certificate. Products that do this essentially act as man-in-the-middle proxies.To read this article in full or to leave a comment, please click here]]> 2017-03-17T15:14:28+00:00 http://www.networkworld.com/article/3182428/security/some-https-inspection-tools-might-weaken-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340248 False None None None Network World - Magazine Info A cybersecurity risk assessment is a critical part of M&A due diligence   here to subscribe.  As of mid-February, the plan for Verizon Communications to acquire a majority of Yahoo's web assets is still on, despite the announcement of Yahoo having suffered two massive breaches of customer data in 2013 and 2014. The sale price, however, has been discounted by $350 million, and Verizon and Altaba Inc. have agreed to share any ongoing legal responsibilities related to the breaches. Altaba is the entity that will own the portion of Yahoo that Verizon is not acquiring.To read this article in full or to leave a comment, please click here]]> 2017-03-17T11:12:00+00:00 http://www.networkworld.com/article/3182139/security/a-cybersecurity-risk-assessment-is-a-critical-part-of-manda-due-diligence.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340249 False None Yahoo None Network World - Magazine Info String of fileless malware attacks possibly tied to single hacker group a blog post. "Based on our findings, a single group of threat actors is responsible for many of the most sophisticated attacks on financial institutions, government organizations, and enterprises over the past few months."To read this article in full or to leave a comment, please click here]]> 2017-03-17T10:54:00+00:00 http://www.networkworld.com/article/3182132/security/string-of-fileless-malware-attacks-possibly-tied-to-single-hacker-group.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340250 False None None None Network World - Magazine Info DARPA wants to cultivate the ultimate transistor of the future DARPA plan would reinvent not-so-clever machine learning systems+“The same basic transistor types have been dominant since their invention and we have been engineering the heck out of them for 50 years,” said Dan Green, a program manager in DARPA's Microsystems Technology Office (MTO) and the overseer of the forthcoming Dynamic Range-enhanced Electronics and Materials (DREaM) program. “We've gotten a lot out of that approach, but the focus on so few types of transistor technologies and just a few semiconductor materials also has fundamentally limited us in the RF world.”To read this article in full or to leave a comment, please click here]]> 2017-03-17T09:21:00+00:00 http://www.networkworld.com/article/3182191/security/darpa-wants-to-cultivate-the-ultimate-transistor-of-the-future.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=340251 False None None None Network World - Magazine Info Ask.com serves as a conduit for malware - again The first one was discovered by security vendor Red Canary, and the second was caught by Carbon Black, whose researchers just wrote about it in their company blog.To read this article in full or to leave a comment, please click here]]> 2017-03-17T06:09:00+00:00 http://www.networkworld.com/article/3181902/security/ask-com-serves-as-a-conduit-for-malware-again.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339891 False None None None Network World - Magazine Info Cobol plays major role in U.S. government breaches the researchers found that a 1% increase in the share of new IT development spending is associated with a 5% decrease in security breaches."In other words, federal agencies that spend more in maintenance of legacy systems experience more frequent security incidents, a result that contradicts a widespread notion that legacy systems are more secure," the paper found. The research paper was written by Min-Seok Pang, an assistant professor of management information systems at Temple University, and Huseyin Tanriverdi, an associate professor in the Information, Risk and Operations Department at the University of Texas at Austin.To read this article in full or to leave a comment, please click here]]> 2017-03-17T05:54:00+00:00 http://www.networkworld.com/article/3182127/security/cobol-plays-major-role-in-us-government-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339892 False None None None Network World - Magazine Info Do you have an incident response plan in place? To read this article in full or to leave a comment, please click here]]> 2017-03-17T05:46:00+00:00 http://www.networkworld.com/article/3181988/security/do-you-have-an-incident-response-plan-in-place.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339893 False Guideline None None Network World - Magazine Info Experts divided on value of Cyber National Guard To read this article in full or to leave a comment, please click here]]> 2017-03-17T05:43:00+00:00 http://www.networkworld.com/article/3182090/leadership-management/experts-divided-on-value-of-cyber-national-guard.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339894 False Guideline None None Network World - Magazine Info Yahoo breach exposes the drawbacks of state-sponsored hacking To read this article in full or to leave a comment, please click here]]> 2017-03-16T17:57:45+00:00 http://www.networkworld.com/article/3181791/security/yahoo-breach-exposes-the-drawbacks-of-state-sponsored-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339326 False None Yahoo None Network World - Magazine Info Unpatched vulnerability puts Ubiquiti networking products at risk To read this article in full or to leave a comment, please click here]]> 2017-03-16T13:18:50+00:00 http://www.networkworld.com/article/3181829/security/unpatched-vulnerability-puts-ubiquiti-networking-products-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339327 False None None None Network World - Magazine Info IDG Contributor Network: Smarter authentication makes mobile experiences more secure, user friendly To read this article in full or to leave a comment, please click here]]> 2017-03-16T11:48:00+00:00 http://www.networkworld.com/article/3181710/mobile-wireless/smarter-authentication-makes-mobile-experiences-more-secure-user-friendly.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339328 False None None None Network World - Magazine Info Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own To read this article in full or to leave a comment, please click here]]> 2017-03-16T10:18:14+00:00 http://www.networkworld.com/article/3181286/security/adobe-reader-edge-safari-and-ubuntu-fall-during-first-day-at-pwn2own.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339329 False None None None Network World - Magazine Info DARPA plan would reinvent not-so-clever machine learning systems new program called Lifelong Learning Machines (L2M) which has as its primary goal to develop next-generation machine learning technologies that can learn from new situations and apply that learning to become better and more reliable than current constrained systems.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here]]> 2017-03-16T09:03:00+00:00 http://www.networkworld.com/article/3181343/security/darpa-plan-would-reinvent-not-so-clever-machine-learning-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339342 False None None None