www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T22:49:24+00:00 www.secnews.physaphae.fr Network World - Magazine Info Why is incident response automation and orchestration so hot? To read this article in full or to leave a comment, please click here]]> 2017-03-16T07:42:00+00:00 http://www.networkworld.com/article/3181360/security/why-is-ir-automation-and-orchestration-so-hot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339343 False None None None Network World - Magazine Info Cisco security advisory dump finds 20 warnings, 2 critical 18 security bulletins split into nine critical and nine important security updates.To read this article in full or to leave a comment, please click here]]> 2017-03-16T06:55:00+00:00 http://www.networkworld.com/article/3181502/cisco-subnet/cisco-security-advisory-dump-finds-20-warnings-2-critical.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339005 False None None None Network World - Magazine Info Crime ring used Amazon, eBay to sell stolen printer ink said on Wednesday.Sixty-four-year-old Richard Rimbaugh allegedly led the operation for more than 20 years by recruiting people to steal the goods from retail stores across 28 states.Rimbaugh and his "theft crews" allegedly went out each week to steal new merchandise, which also included computer software, Schneiderman said.To read this article in full or to leave a comment, please click here]]> 2017-03-16T06:05:00+00:00 http://www.networkworld.com/article/3181359/internet/crime-ring-used-amazon-ebay-to-sell-stolen-printer-ink.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339006 False None None None Network World - Magazine Info Smackdown: Office 365 vs. G Suite management Why (and how) you should manage Windows 10 PCs like iPhones. | The essentials for Windows 10 installation: Download the Windows 10 Installation Superguide today. ] Admin console UI. Both the Office 365 and G Suite admin consoles are well designed, providing clean separation of management functions and clear settings labels, so you can quickly move to the settings you want and apply them.To read this article in full or to leave a comment, please click here]]> 2017-03-16T06:01:00+00:00 http://www.networkworld.com/article/3181726/leadership-management/smackdown-office-365-vs-g-suite-management.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339007 False Guideline None None Network World - Magazine Info Want good cyber insurance? Read the fine print compromise of more than 1.5 billion Yahoo! accounts, which took down its acquisition value by a reported $350 million – are seeking insurance. And when demand rises, the price tends to do so as well.To read this article in full or to leave a comment, please click here]]> 2017-03-16T05:52:00+00:00 http://www.networkworld.com/article/3181708/security/want-good-cyber-insurance-read-the-fine-print.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339008 False None Yahoo None Network World - Magazine Info Expert: Apple may have deployed unauthorized patch by mistake MBX Systems."They procured the firmware from an unofficial source and didn't follow the official release schedule," he said.The firmware included a potential security vulnerability and Apple reportedly ended its relationship with the supplier, Super Micro Computer, as a result.To read this article in full or to leave a comment, please click here]]> 2017-03-16T05:50:00+00:00 http://www.networkworld.com/article/3180763/data-center/expert-apple-may-have-deployed-unauthorized-patch-by-mistake.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339021 False None None None Network World - Magazine Info Pwnie Express eases security remediation with a risk-assessment tool Pulse service assesses potential vulnerabilities that its sensors detect in customers' networks and issues a grade in each of four categories. This Device Risk Scorecard points out problems, prioritizes them by urgency and tells how to fix them.The scorecard looks at wireless infrastructure configuration, client connection behaviors, network host configuration, and shadow IT and rogue devices and computes a grade for each. Customers can drill down to find what discoveries account for low scores and follow the remediation suggestions to fix the problems.To read this article in full or to leave a comment, please click here]]> 2017-03-16T04:36:00+00:00 http://www.networkworld.com/article/3181357/security/pwnie-express-eases-security-remediation-with-a-risk-assessment-tool.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339022 False None None None Network World - Magazine Info US faces limits in busting Russian agents over Yahoo breach indictment might amount to nothing more than naming and shaming Russia. That's because no one expects the Kremlin to play along with the U.S. indictment. “I can't imagine the Russian government is going to hand over the two FSB officers,” said Jeremiah Grossman, chief of security strategy at SentinelOne. "Even in the most successful investigations, state hackers are still immune from prosecution or retaliation," said Kenneth Geers, a research scientist at security firm Comodo.To read this article in full or to leave a comment, please click here]]> 2017-03-15T18:20:04+00:00 http://www.networkworld.com/article/3181492/security/us-faces-limits-in-busting-russian-agents-over-yahoo-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338019 False None Yahoo None Network World - Magazine Info Inside the Russian hack of Yahoo: How they did it To read this article in full or to leave a comment, please click here]]> 2017-03-15T15:37:00+00:00 http://www.networkworld.com/article/3181484/hacking/inside-the-russian-hack-of-yahoo-how-they-did-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338020 False None Yahoo None Network World - Magazine Info \'Don\'t be this guy\' posted the above photo to Facebook a few hours ago, along with this admonishment: Soooo..... this just happened. Trooper Paul Copponi just stopped this vehicle on the Massachusetts Turnpike in Weston. How little regard do you have to have for the lives and safety of your fellow citizens, not to mention your own life and safety, to do this?To read this article in full or to leave a comment, please click here]]> 2017-03-15T12:17:00+00:00 http://www.networkworld.com/article/3181318/data-center/don-t-be-this-guy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338022 False None None None Network World - Magazine Info Microsoft fixes record number of flaws, some publicly known 17 security bulletins covering 135 vulnerabilities in its own products and one separate bulletin for Flash Player, which has its security patches distributed through Windows Update. Nine bulletins are rated critical and nine are rated as important.The affected products include Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Exchange, Skype for Business, Microsoft Lync, and Silverlight.To read this article in full or to leave a comment, please click here]]> 2017-03-15T11:31:44+00:00 http://www.networkworld.com/article/3181281/security/microsoft-fixes-record-number-of-flaws-some-publicly-known.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338036 False None None None Network World - Magazine Info Appeals court rules Americans have no legal recourse if hacked by foreign governments To read this article in full or to leave a comment, please click here]]> 2017-03-15T09:29:00+00:00 http://www.networkworld.com/article/3181326/internet/appeals-court-rules-americans-have-no-legal-recourse-if-hacked-by-foreign-governments.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338037 False None None None Network World - Magazine Info Four charged, including Russian gov\'t agents, for massive Yahoo hack hackers had managed to steal personal data on more than 500 million users during an attack in late 2014. The stolen data included names, email addresses, telephone numbers and hashed passwords. Blame for the attack was put on a "state-sponsored" group.On Wednesday, the FBI said that group was the Russian Federal Security Service, the FSB, and it identified agents Dmitry Dokuchaev and Igor Sushchin as leaders of the attack.To read this article in full or to leave a comment, please click here]]> 2017-03-15T09:07:14+00:00 http://www.networkworld.com/article/3181308/legal/four-charged-including-russian-govt-agents-for-massive-yahoo-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338038 False Guideline Yahoo None Network World - Magazine Info PII of 33,698,126 Americans leaked online determined that the breach came from NetProspex, a service provided by Dun & Bradstreet, which ironically was named as a 2017 world's most ethical company.To read this article in full or to leave a comment, please click here]]> 2017-03-15T09:00:00+00:00 http://www.networkworld.com/article/3181325/security/pii-of-33-698-126-americans-leaked-online.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338039 False None None None Network World - Magazine Info Malicious uploads allowed hijacking of WhatsApp and Telegram accounts To read this article in full or to leave a comment, please click here]]> 2017-03-15T06:05:12+00:00 http://www.networkworld.com/article/3180960/security/malicious-uploads-allowed-hijacking-of-whatsapp-and-telegram-accounts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337696 False None None None Network World - Magazine Info Twitter accounts hacked, Twitter Counter steps forward as culprit To read this article in full or to leave a comment, please click here]]> 2017-03-15T05:30:29+00:00 http://www.networkworld.com/article/3180956/hacking/twitter-accounts-hacked-twitter-counter-steps-forward-as-culprit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337697 False None None None Network World - Magazine Info Hire a DDoS service to take down your enemies DNS service provider Dyn last fall, anyone and everyone is in the crosshairs. The idea of using unprotected IoT devices as a way to bombard networks is gaining momentum.The advent of DDoS-for-hire services means that even the least tech-savvy individual can exact  revenge on some website. Step on up to the counter and purchase a stresser that can systemically take down a company.To read this article in full or to leave a comment, please click here]]> 2017-03-15T05:08:00+00:00 http://www.networkworld.com/article/3181266/security/hire-a-ddos-service-to-take-down-your-enemies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337698 False None None None Network World - Magazine Info Court blocks American from suing Ethiopia for infecting his computer ruled Tuesday that foreign states are immune from suit in a U.S. court unless an exception to the Foreign Sovereign Immunities Act (FSIA) applies.The person, who is referred to in court documents by the pseudonym Kidane, was born in Ethiopia and lived there for 30 years before seeking asylum in the U.S. He lives in Maryland.To read this article in full or to leave a comment, please click here]]> 2017-03-15T00:51:39+00:00 http://www.networkworld.com/article/3181224/security/court-blocks-american-from-suing-ethiopia-for-infecting-his-computer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337466 False None None None Network World - Magazine Info Apple downplays importance of CIA\'s iPhone hacking capabilities To read this article in full or to leave a comment, please click here]]> 2017-03-14T15:49:00+00:00 http://www.networkworld.com/article/3181009/security/apple-downplays-importance-cias-iphone-hacking-capabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337091 False None None None Network World - Magazine Info Microsoft stays security bulletins\' termination bulletins' last stand was originally scheduled for January, with a replacement process ready to step in Feb. 14. Rather than a set of bulletins, Microsoft was to provide a searchable database of support documents dubbed the "Security Updates Guide" or SUG.But just hours before February's security updates were to be released, Microsoft announced that it was postponing the entire collection to March 14, citing "a last-minute issue" that might impact some customers. The Redmond, Wash. company never spelled out exactly what led it to decide on the unprecedented delay.To read this article in full or to leave a comment, please click here]]> 2017-03-14T13:37:00+00:00 http://www.networkworld.com/article/3180619/security/microsoft-stays-security-bulletins-termination.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337092 False None None None Network World - Magazine Info Thieves steal Petya ransomware then use it for free the SecureList blog by researchers at Kaspersky Lab.+More on Network World: DARPA fortifies early warning system for power-grid cyber assault+To read this article in full or to leave a comment, please click here]]> 2017-03-14T12:57:00+00:00 http://www.networkworld.com/article/3180702/security/thieves-steal-petya-ransomware-then-use-it-for-free.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337093 False None None None Network World - Magazine Info DOJ: No, we won\'t say how much the FBI paid to hack terrorist\'s iPhone found a way to access the device without Apple's help. Although the FBI acknowledged it had paid an outside group to crack the iPhone, it refused to identify the firm or how much it paid.To read this article in full or to leave a comment, please click here]]> 2017-03-14T12:10:00+00:00 http://www.networkworld.com/article/3180514/security/doj-no-we-wont-say-how-much-the-fbi-paid-to-hack-terrorists-iphone.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337094 False None None None Network World - Magazine Info Microsoft releases 18 security bulletins, 9 rated critical, many bugs disclosed/exploited 18 security bulletins split into nine critical and nine important security updates.Rated criticalMS17-006 patches 12 security issues in Internet Explorer. One of three information disclosure flaws has been publicly disclosed but is not being exploited, one of the three memory corruption bugs has been publicly disclosed but is not being exploited, and one of them has not been publicly disclosed but is being exploited. Both of the browser spoofing vulnerabilities have been publicly disclosed as has the Internet Explorer elevation of privilege flaw. The patch also addresses a scripting engine information disclosure bug and two scripting engine memory corruption flaws.To read this article in full or to leave a comment, please click here]]> 2017-03-14T11:36:00+00:00 http://www.networkworld.com/article/3180616/security/microsoft-released-18-security-bulletins-9-rated-critical-many-bugs-disclosedexploited.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337107 False None None None Network World - Magazine Info DARPA fortifies early warning system for power-grid cyber assault Cisco's Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here]]> 2017-03-14T11:28:00+00:00 http://www.networkworld.com/article/3180780/security/darpa-fortifies-early-warning-system-for-power-grid-cyber-assault.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337108 False None None None Network World - Magazine Info Hackers use dangerous Petya ransomware in targeted attacks according to security researchers from antivirus vendor Kaspersky Lab.The Trojan uses programmatic methods to trick Petya to use a different encryption key than the one its original creators have embedded inside its code. This ensures that only the PetrWrap attackers can restore the affected computers to their previous state.To read this article in full or to leave a comment, please click here]]> 2017-03-14T11:06:38+00:00 http://www.networkworld.com/article/3180774/security/hackers-use-dangerous-petya-ransomware-in-targeted-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337109 False None None None Network World - Magazine Info The NSA\'s foreign surveillance: 5 things to know Section 702 of the Foreign Intelligence Surveillance Act (FISA).U.S. residents who communicate with foreign targets of the NSA surveillance have their data swept up in what the NSA calls "incidental" collection. The FBI can then search those communications, but it's unclear how often that happens.To read this article in full or to leave a comment, please click here]]> 2017-03-14T08:55:41+00:00 http://www.networkworld.com/article/3180805/security/the-nsas-foreign-surveillance-5-things-to-know.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337110 False Guideline None None Network World - Magazine Info IBM\'s position on Security Analytics and Operations (SOAPA), part 2 my interview with IBM security general manager Marc van Zadelhoff, where we talked about his perspective about the transition from security analytics and operations point tools to an integrated event-based security analytics and operations platform architecture (SOAPA). In part 2 of the interview, we talked about SOAPA requirements, intelligence and the need for SOAPA to scale. You can view the interview here. Some of the highlights include:To read this article in full or to leave a comment, please click here]]> 2017-03-14T07:42:00+00:00 http://www.networkworld.com/article/3180510/security/ibm-on-security-analytics-and-operations-soapa-part-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337111 False None None None Network World - Magazine Info FBI trained Geek Squad techs on law-enforcement tactics, new records show Orange County (California) Weekly has been all over a case involving a well-respected physician Dr. Mark A. Rettenmaier. Rettenmaier took his laptop to the Mission Viejo Best Buy in November 2011 after he was unable to start it. + Also on Network World: Why you shouldn't trust Geek Squad ever again + While performing a recovery scan of his data files, a Geek Squad technician found an image of "a fully nude, white prepubescent female on her hands and knees on a bed, with a brown choker-type collar around her neck." The technician notified his boss, who alerted the FBI. To read this article in full or to leave a comment, please click here]]> 2017-03-14T06:04:00+00:00 http://www.networkworld.com/article/3180458/security/fbi-trained-geek-squad-techs-on-law-enforcement-tactics-new-records-show.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=336371 False None None None Network World - Magazine Info 10 must-ask questions for evaluating EDR tools To read this article in full or to leave a comment, please click here]]> 2017-03-14T05:43:00+00:00 http://www.networkworld.com/article/3180747/security/10-must-ask-questions-for-evaluating-edr-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=336372 False None None None Network World - Magazine Info Continuous authentication: Why it\'s getting attention and what you need to know To read this article in full or to leave a comment, please click here]]> 2017-03-14T05:33:00+00:00 http://www.networkworld.com/article/3180583/security/continuous-authentication-why-it-s-getting-attention-and-what-you-need-to-know.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=336373 False None None None Network World - Magazine Info It\'s time to turn on HTTPS: the benefits are well worth the effort Google Chrome and Mozilla Firefox shows that over 50 percent of web traffic is now encrypted, both on computers and mobile devices. Most of that traffic goes to a few large websites, but even so, it's a jump of over 10 percentage points since a year ago.To read this article in full or to leave a comment, please click here]]> 2017-03-14T05:00:08+00:00 http://www.networkworld.com/article/3180685/security/its-time-to-turn-on-https-the-benefits-are-well-worth-the-effort.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=336374 False None None None Network World - Magazine Info Mirai is the hydra of IoT security: too many heads to cut off available in late September. Since then, it's been blamed for enslaving IoT devices such as DVRs and internet cameras to launch massive distributed denial-of-service attacks, one of which disrupted internet access across the U.S. in October.The good news: Last month, police arrested one suspected hacker who may have been behind several Mirai-related DDoS attacks.To read this article in full or to leave a comment, please click here]]> 2017-03-13T17:30:56+00:00 http://www.networkworld.com/article/3180452/security/mirai-is-the-hydra-of-iot-security-too-many-heads-to-cut-off.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335467 False None None None Network World - Magazine Info WikiLeaks dump brings CIA spying powers into the spotlight document dump that allegedly details the U.S. agency's secret hacking tools. The documents themselves don't reveal much about who the CIA might have snooped on. But the agency certainly has the power to spy on foreigners outside the U.S., said Paul Pillar, a former deputy counterterrorism chief with the CIA. That's its job after all: to collect foreign intelligence. But even so, the CIA is pretty selective with its targets.   To read this article in full or to leave a comment, please click here]]> 2017-03-13T10:22:00+00:00 http://www.networkworld.com/article/3180207/security/wikileaks-dump-brings-cia-spying-powers-into-the-spotlight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335468 False None None None Network World - Magazine Info GOP senator alleges password-hijack attempts after blasting WikiLeaks founder Sasse tweeted Saturday. The probing was hitting "basically every device, every platform, personal and govt," he added in a follow-up tweet.To read this article in full or to leave a comment, please click here]]> 2017-03-13T08:57:00+00:00 http://www.networkworld.com/article/3180062/security/gop-senator-alleges-password-hijack-attempts-after-blasting-wikileaks-founder.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335469 False None None None Network World - Magazine Info Cisco jumps on ex-Juniper exec Davidson for service provider biz Cisco/Jonathan Davidson Davidson is joining Cisco's Service Provider Business Unit and will report to Yvette Kanouff, the senior vice president and general manager that unit.+More on Network World: Cisco's Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here]]> 2017-03-13T08:23:00+00:00 http://www.networkworld.com/article/3180058/cisco-subnet/cisco-jumps-on-ex-juniper-exec-davidson-for-service-provider-biz.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335470 False None None None Network World - Magazine Info Rapid7 discloses multiple vulnerabilities in telepresence robot Rapid7 revealed three security flaws it discovered in the mobile conferencing device Double Telepresence Robot. Rapid7 researcher Deral Heiland discovered three vulnerabilities: unauthenticated access to data, static user session management, and weak Bluetooth pairing. Two of three vulnerabilities disclosed to Double Robotics were patched in January, a really quick response considering the fixes were deployed about a week after the flaws were disclosed to the company.To read this article in full or to leave a comment, please click here]]> 2017-03-13T07:12:00+00:00 http://www.networkworld.com/article/3179840/security/rapid7-disclosed-massive-vulnerabilities-in-telepresence-robot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335483 False None None None Network World - Magazine Info Old nemesis spam becoming significant way for attackers to subvert data IBM technology moves even closer to human speech recognition parity+“Attackers are not limited to a single set of tools, however. The ongoing expansion of domain name choices has added another instrument to the spammer's toolbox: enticing recipients to click through to malicious sites, ultimately allowing attackers to infiltrate their networks,” wrote Ralf Iffert, Manager, X-Force Content Security in a blog about the spam findings. “More than 35% of the URLs found in spam sent in 2016 used traditional, generic top-level domains (gTLD) .com and .info. Surprisingly, over 20% of the URLs used the .ru country code top-level domain (ccTLD), helped mainly by the large number of spam emails containing the .ru ccTLD.”To read this article in full or to leave a comment, please click here]]> 2017-03-13T06:45:00+00:00 http://www.networkworld.com/article/3180056/security/ibm-cisco-old-nemesis-spam-becoming-significant-way-for-attackers-to-subvert-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335071 False None None None Network World - Magazine Info How much are vendor security assurances worth after the CIA leaks? published the 8,700-plus CIA documents last Tuesday.To read this article in full or to leave a comment, please click here]]> 2017-03-13T06:40:04+00:00 http://www.networkworld.com/article/3180051/security/how-much-are-vendor-security-assurances-worth-after-the-cia-leaks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335072 False None None None Network World - Magazine Info Disaster recovery: How is your business set up to survive an outage? To read this article in full or to leave a comment, please click here]]> 2017-03-13T06:05:00+00:00 http://www.networkworld.com/article/3179838/disaster-recovery/disaster-recovery-how-is-your-business-set-up-to-survive-an-outage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335073 False None None None Network World - Magazine Info How to remove ransomware: Use this battle plan to fight back according to Sonicwall-even as the number of malware attacks declined. Why steal data when you can simply demand cash?To read this article in full or to leave a comment, please click here]]> 2017-03-13T05:54:00+00:00 http://www.networkworld.com/article/3180066/security/how-to-remove-ransomware-use-this-battle-plan-to-fight-back.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335074 False None None None Network World - Magazine Info IDG Contributor Network: How to avoid falling for the W-2 phishing scam form of phishing is known as the W-2 scam.To read this article in full or to leave a comment, please click here]]> 2017-03-13T04:30:00+00:00 http://www.networkworld.com/article/3179625/security/w-2-scams-phishing-and-the-end-of-one-size-fits-all-security-awareness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335087 False None None None Network World - Magazine Info IDG Contributor Network: Botnets: Is your network really protected? Gartner. There's no doubt that the Internet of Things (IoT) will bring many benefits, but it also brings greater risk.To read this article in full or to leave a comment, please click here]]> 2017-03-13T03:45:00+00:00 http://www.networkworld.com/article/3179430/internet-of-things/botnets-is-your-network-really-protected.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=335088 False None None None Network World - Magazine Info Setting up DLP features for email security 2017-03-13T03:00:00+00:00 http://www.networkworld.com/video/74095/setting-up-dlp-features-for-email-security#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334949 False None None None Network World - Magazine Info Zix wins 5-vendor email encryption shootout last looked at them nearly two years ago. They have gotten easier to use and deploy, thanks to a combination of user interface and encryption key management improvements, and are at the point where encryption can almost be called effortless on the part of the end user. Our biggest criticism in 2015 was that the products couldn't cover multiple use cases, such as when a user switches from reading emails on their smartphone to moving to a webmailer to composing messages on their Outlook desktop client. Fortunately, the products are all doing a better job handling multi-modal email.To read this article in full or to leave a comment, please click here]]> 2017-03-13T03:00:00+00:00 http://www.networkworld.com/article/3178694/email/zix-wins-5-vendor-email-encryption-shootout.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334936 False None None None Network World - Magazine Info New products of the week 3.13.2017 Image by 1EOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Tachyon1eImage by 1ETo read this article in full or to leave a comment, please click here]]> 2017-03-13T02:47:00+00:00 http://www.networkworld.com/article/3179664/mobile-wireless/new-products-of-the-week-3-13-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334937 True None None None Network World - Magazine Info On web\'s 28th anniversary, its creator Tim Berners-Lee takes aim at fake news open letter, Berners-Lee said that in the last 12 months, “I've become increasingly worried about three new trends, which I believe we must tackle in order for the web to fulfill its true potential as a tool which serves all of humanity.” We've lost control of our personal data. It's too easy for misinformation to spread on the web. Political advertising online needs transparency and understanding. As it stands now for most of the web, people get free content in exchange for their personal data. Once companies have our data, we no longer have control over with whom it is shared. We can't pick and choose what gets shared; it's generally “all or nothing.”To read this article in full or to leave a comment, please click here]]> 2017-03-12T08:41:00+00:00 http://www.networkworld.com/article/3179769/security/on-webs-28th-anniversary-its-creator-tim-berners-lee-takes-aim-at-fake-news.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334012 False None None None Network World - Magazine Info Cisco issues critical warning around Apache Struts2 vulnerability vulnerable products here as it learns of them.Earlier this week Apache revealed a vulnerability in the Jakarta multipart parser used in Apache Struts2 that could let an attacker execute commands remotely on the targeted system using what's known as acrafted Content-Type header value.-More on Network World: Cisco's Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here]]> 2017-03-10T13:56:00+00:00 http://www.networkworld.com/article/3179673/security/cisco-issues-critical-warning-around-apache-struts2-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334013 False None None None Network World - Magazine Info IDG Contributor Network: Tech crime as a service escalates Europol, the European Union's policing office says tech-oriented CaaS is being offered to swathes of the underbelly of Europe. Criminals gain an advantage because they can perform crimes better and more efficiently, and they can work at scales greater than their existing technical proficiency.+ Also on Network World: Anonymous hacker causes dark web to shrink by as much as 85% + An estimated 5,000 internationally operating crime gangs are currently being investigated in the trading bloc, according to Europol.To read this article in full or to leave a comment, please click here]]> 2017-03-10T11:25:00+00:00 http://www.networkworld.com/article/3179612/security/tech-crime-as-a-service-escalates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334014 False None None None Network World - Magazine Info Anonymous hacker causes dark web to shrink by as much as 85% The hacker who did it told Vice it was his first hack, and he didn't intend to take down the site-just look through it. When he found large amounts of child porn, he deduced the site knew what was going on and he decided to take down the hosts. To read this article in full or to leave a comment, please click here]]> 2017-03-10T10:54:00+00:00 http://www.networkworld.com/article/3179421/security/anonymous-hacker-causes-dark-web-to-shrink-by-as-much-as-85.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334015 False None None None Network World - Magazine Info IDG Contributor Network: Well-funded doesn\'t mean well-secured RELATED: What IT admins love/hate about 8 top network monitoring tools While I'm the type of parent who makes the children fish-finger sandwiches and declares them fed, my wife prefers to serve a lavish five-course meal. In the past, she would often customize meals to meet each child's individual taste and preference. After a while, I had to put a stop to it.To read this article in full or to leave a comment, please click here]]> 2017-03-10T07:18:00+00:00 http://www.networkworld.com/article/3179468/security/well-funded-doesnt-mean-well-secured.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334029 False None None None Network World - Magazine Info IBM\'s position on Security Analytics and Operations (SOAPA) To read this article in full or to leave a comment, please click here]]> 2017-03-10T07:18:00+00:00 http://www.networkworld.com/article/3179627/security/ibm-chat-about-security-analytics-and-operations-soapa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=334028 False None None None Network World - Magazine Info Google tries to beat AWS at cloud security To read this article in full or to leave a comment, please click here]]> 2017-03-10T05:34:00+00:00 http://www.networkworld.com/article/3179453/security/google-tries-to-beat-aws-at-cloud-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333699 False Guideline None None Network World - Magazine Info Newer car tech opens doors to CIA attacks explored hacking vehicle computer control systems should concern consumers, particularly as more and more cars and trucks roll off assembly lines with autonomous features."I think it's a legitimate concern considering all of the computers being added to cars," said Kit Walsh, a staff attorney with the privacy group Electronic Frontier Foundation (EFF). "There's no reason the CIA or other intelligence agencies or bad actors couldn't use those vulnerabilities to hurt people.To read this article in full or to leave a comment, please click here]]> 2017-03-10T05:33:00+00:00 http://www.networkworld.com/article/3179452/security/cias-exploration-of-zero-day-attacks-against-vehicles-isnt-a-first.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333700 False None None None Network World - Magazine Info Danes targeted by malware spread through Dropbox According to a research report by AppRiver, the attack hit Denmark, Germany, and several surrounding Scandinavian countries on Wednesday morning. The attack was unusual in that it narrowly targeted a specific audience, said Troy Gill, security analyst at AppRiver. "Somehow, they found this language-based list of email addresses," he said. "I'm not sure where they gathered it."To read this article in full or to leave a comment, please click here]]> 2017-03-10T05:32:00+00:00 http://www.networkworld.com/article/3179451/security/danes-targeted-by-malware-spread-through-dropbox.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333701 False None None None Network World - Magazine Info Protecting the enterprise against mobile threats The State of Enterprise Mobile Security: 2016 to 2017, by Chris Sherman, "Employees are going to continue to purchase and use whatever devices and apps they need to serve customers and be highly productive, whether or not these devices are company-sanctioned."To read this article in full or to leave a comment, please click here]]> 2017-03-10T03:00:00+00:00 http://www.networkworld.com/article/3179358/security/protecting-the-enterprise-against-mobile-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333702 False None None None Network World - Magazine Info WikiLeaks will share CIA hacking details with companies, but can they use it? plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed.But will software companies want it?The information WikiLeaks plans to share comes from 8,700-plus documents it says were stolen from an internal CIA server. If the data is classified -- and it almost certainly is -- possessing it would be a crime.That was underlined on Thursday by White House press secretary Sean Spicer, who advised tech vendors to consider the legal consequences of receiving documents from WikiLeaks.To read this article in full or to leave a comment, please click here]]> 2017-03-09T19:06:47+00:00 http://www.networkworld.com/article/3179470/security/wikileaks-will-share-cia-hacking-details-with-companies-but-can-they-use-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333096 False None None None Network World - Magazine Info The CIA should help vendors patch the flaws it was exploiting To read this article in full or to leave a comment, please click here]]> 2017-03-09T14:59:00+00:00 http://www.networkworld.com/article/3179464/security/the-cia-should-help-vendors-patch-the-flaws-it-was-exploiting.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333097 False None None None Network World - Magazine Info How to achieve security via whitelisting with Docker containers   here to subscribe.  Docker containers have become an important means for organizations to build and run applications in the cloud. There's a lot of flexibility with containers, as they can be deployed on top of any bare-metal server, virtual machine, or platform-as-as-service (PaaS) environment. Developers have embraced Docker containers on public clouds because they don't need help from an IT operations team to spin them up.A software container is simply a thin package of an application and the libraries that support the application, making it easy to move a container from one operating system to another. This makes it possible for a developer to build an application and then take all the source code and supporting files and basically create something like a zip file so the container can be deployed just about anywhere. It contains everything the application needs to run, including code, runtime, system tools and system libraries.To read this article in full or to leave a comment, please click here]]> 2017-03-09T13:38:00+00:00 http://www.networkworld.com/article/3179349/security/how-to-achieve-security-via-whitelisting-with-docker-containers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333098 False None None None Network World - Magazine Info After CIA leak, Intel Security releases detection tool for EFI rootkits CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple's Macbooks. A rootkit is a malicious program that runs with high privileges -- typically in the kernel -- and hides the existence of other malicious components and activities.The documents from CIA's Embedded Development Branch (EDB) mention an OS X "implant" called DerStarke that includes a kernel code injection module dubbed Bokor and an EFI persistence module called DarkMatter.To read this article in full or to leave a comment, please click here]]> 2017-03-09T13:32:26+00:00 http://www.networkworld.com/article/3179344/security/after-cia-leak-intel-security-releases-detection-tool-for-efi-rootkits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333099 False None None None Network World - Magazine Info After WikiLeaks\' CIA dump, China tells U.S. to stop spying press briefing.Geng also said that China would protect its own networks, was willing to work with others toward what he called "orderly cyberspace," and repeated his government's stock denunciation of hacking.To read this article in full or to leave a comment, please click here]]> 2017-03-09T12:22:00+00:00 http://www.networkworld.com/article/3178703/security/after-wikileaks-cia-dump-china-tells-us-to-stop-spying.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333112 False None None None Network World - Magazine Info After the WikiLeaks dump: Do nothing Apple, Cisco, Microsoft and Samsung react to CIA targeting their products + If hardware and device makers gasp that their stuff is crackable, it's only time to snicker. Nothing is foolproof because 1) fools are so ingenious and 2) with a big enough hammer you can crack anything. Even you. You are not impregnable. It's a matter of degree-and if you can detect the breach quickly.To read this article in full or to leave a comment, please click here]]> 2017-03-09T12:03:00+00:00 http://www.networkworld.com/article/3179092/security/after-the-wikileaks-dump-do-nothing.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333113 False None None None Network World - Magazine Info Assange: CIA had lost control of its cyberweapon documents published by WikiLeaks this week, Julian Assange says.The CIA "lost control of its entire cyberweapons arsenal," the WikiLeaks editor in chief said during a press conference Thursday. "This is a historic act of devastating incompetence, to have created such an arsenal and stored all in one place and not secured it."Assange declined to name the source who gave the information to WikiLeaks, but he seemed to suggest the 8,700-plus documents, purportedly from an isolated CIA server, came from an insider source.To read this article in full or to leave a comment, please click here]]> 2017-03-09T08:03:00+00:00 http://www.networkworld.com/article/3178722/security/assange-cia-had-lost-control-of-its-cyberweapon-documents.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333114 False None None None Network World - Magazine Info IDG Contributor Network: Basic training: Cybersecurity lessons inspired by an opportunistic developer frequency of distributed denial of service (DDoS) attacks has increased more than 2.5 times since 2013, with the current average DDoS attack large enough to take many organizations completely offline.RELATED: Machine learning offers new hope against cyber attacks Most businesses have cybersecurity initiatives, but how can we be sure the policies and people are keeping pace with the threats that are becoming more dynamic as technology progresses? TechRepublic reported that an estimated 90 million cyber attacks occurred in 2016, which means 400 attacks every minute. As data travels through a virtual ecosystem, security must extend beyond the device itself. To read this article in full or to leave a comment, please click here]]> 2017-03-09T07:13:00+00:00 http://www.networkworld.com/article/3177299/security/basic-training-cybersecurity-lessons-inspired-by-an-opportunistic-developer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333115 False None None None Network World - Magazine Info IBM technology moves even closer to human speech recognition parity Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes+To read this article in full or to leave a comment, please click here]]> 2017-03-09T06:02:00+00:00 http://www.networkworld.com/article/3178680/software/ibm-technology-moves-even-closer-to-human-speech-recognition-parity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333116 False None None None Network World - Magazine Info Profiling 10 types of hackers Image by ThinkstockHackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks. Travis Farral, director of security strategy at Anomali, outlines the top 10 types of hackers you should have on your radar.To read this article in full or to leave a comment, please click here]]> 2017-03-09T05:25:00+00:00 http://www.networkworld.com/article/3178711/security/profiling-10-types-of-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=332659 False None None None Network World - Magazine Info Bots: Biggest player on the cybercrime block ransomware and DDoS attacks had the highest profile by far during the past year. There was an entire day devoted to a ransomware “summit” at the recent RSA conference in San Francisco.But when it comes to money being lost (and made), bot fraud is king – by a lot.Most estimates of losses in the US from ransomware during 2016 were in the $1 billion range. By contrast, a study published in January 2016 by White Ops and the Association of National Advertisers (ANA) titled “Bot Baseline: Fraud in Digital Advertising,” estimated global losses in 2016 would be $7.2 billion.To read this article in full or to leave a comment, please click here]]> 2017-03-09T05:24:00+00:00 http://www.networkworld.com/article/3178710/security/bots-biggest-player-on-the-cybercrime-block.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=332660 False None None None Network World - Magazine Info Darktrace finds more attacks, cuts response time, saves money for Blackhawk Network To read this article in full or to leave a comment, please click here]]> 2017-03-09T05:20:00+00:00 http://www.networkworld.com/article/3178673/security/darktrace-finds-more-attacks-cuts-response-time-saves-money-for-blackhawk-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=332661 False None None None Network World - Magazine Info Hackers exploit Apache Struts vulnerability to compromise corporate web servers fixed a high-impact vulnerability in the framework's Jakarta Multipart parser. Hours later, an exploit for the flaw appeared on Chinese-language websites and this was almost immediately followed by real-world attacks, according to researchers from Cisco Systems.To read this article in full or to leave a comment, please click here]]> 2017-03-09T03:53:29+00:00 http://www.networkworld.com/article/3178657/security/hackers-exploit-apache-struts-vulnerability-to-compromise-corporate-web-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=332662 False None None None Network World - Magazine Info WikiLeaks looks at helping tech vendors disarm CIA hacking tools published secret hacking tools allegedly taken from the CIA, which appear to target smartphones, smart TVs and PCs.Companies including Apple and Cisco have been looking through the stolen documents to address any vulnerabilities the CIA may have exploited. However, WikiLeaks might be able to speed up and expand the whole process.To read this article in full or to leave a comment, please click here]]> 2017-03-08T18:37:42+00:00 http://www.networkworld.com/article/3178638/security/wikileaks-looks-at-helping-tech-vendors-disarm-cia-hacking-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331623 False None None None Network World - Magazine Info Apple has already fixed most of the iOS exploits the CIA used To read this article in full or to leave a comment, please click here]]> 2017-03-08T13:49:00+00:00 http://www.networkworld.com/article/3178672/security/apple-has-already-fixed-most-of-the-ios-exploits-the-cia-used.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331624 False None None None Network World - Magazine Info Security holes in Confide messaging app exposed user details post.The consultancy noticed it could access records for 7,000 Confide users by exploiting vulnerabilities in the app's account management system. Part of the problem resided with Confide's API, which could be used to reveal data on user's phone numbers and email addresses.To read this article in full or to leave a comment, please click here]]> 2017-03-08T12:51:51+00:00 http://www.networkworld.com/article/3178584/security/security-holes-in-confide-messaging-app-exposed-user-details.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331625 False None None None Network World - Magazine Info Leaked docs suggest NSA and CIA behind Equation cyberespionage group were documented in February 2015 by researchers from antivirus vendor Kaspersky Lab. It is widely considered to be the most advanced cyberespionage group in the world based on the sophistication of its tools and the length of its operations, some possibly dating as far back as 1996.To read this article in full or to leave a comment, please click here]]> 2017-03-08T11:39:00+00:00 http://www.networkworld.com/article/3178509/security/leaked-docs-suggest-nsa-and-cia-behind-equation-cyberespionage-group.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331626 False None None None Network World - Magazine Info Fears of election hacking spread in Europe To read this article in full or to leave a comment, please click here]]> 2017-03-08T10:13:00+00:00 http://www.networkworld.com/article/3178414/security/fears-of-election-hacking-spread-in-europe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331639 False None None None Network World - Magazine Info Cisco Talos warns of new Cryptolocker ransomware campaigns eports are warning businesses and consumers alike that a new round of ransomware based on the infamous Cryptolocker (aka TorrentLocker or Teerac) code is making the rounds.Today Cisco Talos wrote: “Crypt0l0cker has gone through a long evolution, the adversaries are updating and improving the malware on a regular basis. Several indicators inside the samples we have analyzed point to a new major version of the malware. We have already seen large campaigns targeting Europe and other parts of the world in 2014 and 2015. It seems to be that the actors behind these campaigns are back now and launching again massive spam attacks.”To read this article in full or to leave a comment, please click here]]> 2017-03-08T10:02:00+00:00 http://www.networkworld.com/article/3178411/security/cisco-talos-warns-of-new-cryptolocker-ransomware-campaigns.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331640 False None None None Network World - Magazine Info Comey: Strong encryption “shatters” privacy-security bargain To read this article in full or to leave a comment, please click here]]> 2017-03-08T09:49:00+00:00 http://www.networkworld.com/article/3178101/security/comey-strong-encryption-shatters-privacy-security-bargain.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331641 False None None None Network World - Magazine Info Juniper product development chief resigns, company resets engineering makeup Juniper Development and Innovation group, where he replaced Rami Rahim who is now the company's CEO.To read this article in full or to leave a comment, please click here]]> 2017-03-08T08:48:00+00:00 http://www.networkworld.com/article/3178424/security/juniper-product-development-chief-resigns-company-resets-engineering-makeup.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331642 False Guideline None None Network World - Magazine Info Third-party releases \'nano-patch\' for Microsoft zero day bug To read this article in full or to leave a comment, please click here]]> 2017-03-08T06:46:00+00:00 http://www.networkworld.com/article/3178390/security/third-party-releases-nano-patch-for-microsoft-zero-day-bug.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331643 False None None None Network World - Magazine Info Apple, Cisco, Microsoft and Samsung react to CIA targeting their products define “embedded systems” as “The Things in the Internet of Things.” But the fact that the CIA intended to exploit IoT should not surprise anyone, considering that in 2012, then-CIA Director David Petraeus said the CIA “cannot wait to spy on you” through your smart internet-connected devices.To read this article in full or to leave a comment, please click here]]> 2017-03-08T06:22:00+00:00 http://www.networkworld.com/article/3177942/security/apple-cisco-microsoft-and-samsung-react-to-cia-targeting-their-products.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331644 False None None None Network World - Magazine Info CIA false flag team repurposed Shamoon data wiper, other malware the leaked documents the Umbrage team is part of the Remote Development Branch under the CIA's Center for Cyber Intelligence. It maintains a library of techniques borrowed from in-the-wild malware that could be integrated into its own projects.To read this article in full or to leave a comment, please click here]]> 2017-03-08T05:29:16+00:00 http://www.networkworld.com/article/3178081/security/cia-false-flag-team-repurposed-shamoon-data-wiper-other-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331267 False None None None Network World - Magazine Info What\'s the value in attack attribution? To read this article in full or to leave a comment, please click here]]> 2017-03-08T05:14:00+00:00 http://www.networkworld.com/article/3178020/security/is-identifying-an-attacker-a-waste-of-time.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331268 False None None None Network World - Magazine Info Consumer Reports decision to rate cybersecurity is a huge deal Consumer Reports is trying to change both of those things. Consumer Reports' new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here]]> 2017-03-08T03:45:00+00:00 http://www.networkworld.com/article/3177985/security/consumer-reports-decision-to-rate-cybersecurity-is-a-huge-deal.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331269 False None None None Network World - Magazine Info US senator probes into CloudPets smart toy hack a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children's Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here]]> 2017-03-08T00:07:34+00:00 http://www.networkworld.com/article/3177937/security/us-senator-probes-into-cloudpets-smart-toy-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331025 False None None None Network World - Magazine Info US Senate resolution aims to roll back privacy rules for ISPs rules have been opposed by internet service providers who argue that they are being treated differently from other Internet entities like search engines and social networking companies.To read this article in full or to leave a comment, please click here]]> 2017-03-07T22:55:38+00:00 http://www.networkworld.com/article/3178061/security/us-senate-resolution-aims-to-roll-back-privacy-rules-for-isps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331026 False None None None Network World - Magazine Info CIA-made malware? Now antivirus vendors can find out dumped a trove of 8,700 documents that allegedly detail the CIA's secret hacking operations, including spying tools designed for mobile phones, PCs and smart TVs. WikiLeaks has redacted the actual source code from the files to prevent the distribution of cyber weapons, it said. Nevertheless, the document dump -- if real -- still exposes some of the techniques that the CIA has allegedly been using.To read this article in full or to leave a comment, please click here]]> 2017-03-07T18:15:47+00:00 http://www.networkworld.com/article/3178067/security/cia-made-malware-now-antivirus-vendors-can-find-out.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330107 False None None None Network World - Magazine Info Extreme grabs Avaya\'s networking business for $100M Avaya wants out of S.F. stadium suite, not too impressed with 49ers on field performance either+ To read this article in full or to leave a comment, please click here]]> 2017-03-07T14:58:00+00:00 http://www.networkworld.com/article/3178065/lan-wan/extreme-grabs-avaya-s-networking-business-for-100m.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330108 False None None None Network World - Magazine Info Wikileaks\' dump of CIA exploits exposes enterprises to new risks release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google's Android, Microsoft's Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes the new revelations into account.While the trove of leaked data – known as Vault 7 – doesn't include code for actual exploits, it does describe the types of vulnerabilities they take advantage of, which can still be of value to both defenders and potential attackers, says John Pironti, president of IP Architects, a security risk consulting firm.To read this article in full or to leave a comment, please click here]]> 2017-03-07T14:12:00+00:00 http://www.networkworld.com/article/3177978/security/wikileaks-dump-of-cia-exploits-exposes-enterprises-to-new-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330109 False None None None Network World - Magazine Info Why email is safer in Office 365 than on your Exchange server To read this article in full or to leave a comment, please click here]]> 2017-03-07T10:00:00+00:00 http://www.networkworld.com/article/3177437/email/why-email-is-safer-in-office-365-than-on-your-exchange-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330110 False None None None Network World - Magazine Info Honeypot catches social engineering scams on social media To read this article in full or to leave a comment, please click here]]> 2017-03-07T09:58:00+00:00 http://www.networkworld.com/article/3177435/social-networking/honeypot-catches-social-engineering-scams-on-social-media.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330123 False None Yahoo None Network World - Magazine Info WikiLeaks\' CIA document dump shows agency can compromise Android, TVs Android exploits were developed by the CIA, while others came from the U.S. National Security Agency, U.K. intelligence agency GCHQ, and cyber arms dealers, according to the trove of documents released Tuesday. Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.To read this article in full or to leave a comment, please click here]]> 2017-03-07T08:01:16+00:00 http://www.networkworld.com/article/3177414/security/wikileaks-cia-document-dump-shows-agency-can-compromise-android-tvs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330124 False None None None Network World - Magazine Info Android gets patches for critical OpenSSL, media server and kernel driver flaws To read this article in full or to leave a comment, please click here]]> 2017-03-07T07:40:00+00:00 http://www.networkworld.com/article/3177787/security/android-gets-patches-for-critical-openssl-media-server-and-kernel-driver-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330125 False Guideline None None Network World - Magazine Info Cybersecurity skills shortage holding steady video where I'm interviewed on the cybersecurity skills shortage at the RSA Conference a few years ago. I also presented on this topic at the RSA Conference that same year. RELATED: Akamai CSO takes a creative approach to finding security pros I keep writing about the cybersecurity skills shortage for one consistent and troubling reason: It ain't getting any better. Here's a few data points to back up this claim: To read this article in full or to leave a comment, please click here]]> 2017-03-07T07:08:00+00:00 http://www.networkworld.com/article/3177374/security/cybersecurity-skills-shortage-holding-steady.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330126 False None None None Network World - Magazine Info BBC warns Facebook about child porn posts, Facebook reports BBC to cops To read this article in full or to leave a comment, please click here]]> 2017-03-07T07:04:00+00:00 http://www.networkworld.com/article/3177399/security/bbc-warns-facebook-about-child-porn-posts-facebook-reports-bbc-to-cops.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330127 False None None None Network World - Magazine Info Ransomware picks off broader targets with greater severity the FBI reported last year that ransomware was on the rise, you should read the forecasts for this year. According to SonicWall's most recent Annual Threat Report, “ransomware attacks grew 167 times since 2015, from 3.8 million in 2015 to 638 million in 2016.”This year, TrendMicro sees a 25-percent growth in the number of new ransomware families available for use in breaches. Reports of the encroachment of ransomware on government, law enforcement, critical infrastructure, and health and safety are already climbing.To read this article in full or to leave a comment, please click here]]> 2017-03-07T04:10:00+00:00 http://www.networkworld.com/article/3177708/security/ransomware-picks-off-broader-targets-with-greater-severity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=329806 False None None None Network World - Magazine Info 7 tips to strengthen online security Image by PexelsA lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we're away – or if we're too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily basis, the more we expose ourselves to security risks. This is the nature of how our digital lives have evolved and it requires more active participation as individuals to protect ourselves and minimize exposure.To read this article in full or to leave a comment, please click here]]> 2017-03-07T04:06:00+00:00 http://www.networkworld.com/article/3177353/security/7-tips-to-strengthen-online-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=329807 False None None None Network World - Magazine Info Consumers are wary of smart homes that know too much TV announcers inadvertently activating viewers' Amazon Echos, or about data from digital assistants being used as evidence in criminal trials. But privacy concerns are just one hurdle smart homes still have to overcome, according to the survey.To read this article in full or to leave a comment, please click here]]> 2017-03-06T15:54:31+00:00 http://www.networkworld.com/article/3177312/internet-of-things/consumers-are-wary-of-smart-homes-that-know-too-much.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328697 False None None None Network World - Magazine Info Researchers link Middle East attacks to new victim in Europe new research this morning that shows some links between the massive Shamoon attack that took down 35,000 computers in Saudi Arabia to a new attack against a target in Europe.The Shamoon attack, which occurred in 2012, was followed by a series of related against against Gulf States earlier this year. The attacks were widely attributed to Iran.The new malware, called StoneDrill, is, like Shamoon, a wiper -- it destroys all the data on a computer.To read this article in full or to leave a comment, please click here]]> 2017-03-06T12:15:00+00:00 http://www.networkworld.com/article/3177295/malware-cybercrime/researchers-link-middle-east-attacks-to-new-victim-in-europe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328698 False None None None Network World - Magazine Info IDG Contributor Network: 7 ways to improve your Joomla security downloaded 78 million times and currently powers millions of websites.Joomla websites have not been entirely unaffected by the cyber crime problems that have plagued content management systems (CMSs) and the internet in general. A wave of fake jQuery attacks hit Joomla and WordPress sites in 2015 and 2016, affecting over 4.5 million sites.To read this article in full or to leave a comment, please click here]]> 2017-03-06T12:10:00+00:00 http://www.networkworld.com/article/3171382/security/7-ways-to-improve-your-joomla-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328699 False None None None Network World - Magazine Info Consumer Reports to grade tech products on security, privacy said.Already, cybersecurity  experts are constantly finding new tech products, whether they be cars or smart teddy bears, that are often poorly secured and easy to hack.  To read this article in full or to leave a comment, please click here]]> 2017-03-06T12:06:45+00:00 http://www.networkworld.com/article/3177287/security/consumer-reports-to-grade-tech-products-on-security-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328700 False None Tesla None Network World - Magazine Info IDG Contributor Network: Robots are malfunctioning, hurting people IOActive.+ Also on Network World: How secure are home robots? + These incidents “clearly demonstrate the serious potential consequences of robot malfunctions,” the consultancy says in a white paper it recently published about existing robot security (PDF).To read this article in full or to leave a comment, please click here]]> 2017-03-06T11:31:00+00:00 http://www.networkworld.com/article/3177307/security/robots-are-malfunctioning-hurting-people.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328713 False None None None Network World - Magazine Info Microsoft paying a bug bounty of $30,000 last week's blog post on Intel price cuts. As it turns out, I have been informed that Intel didn't cut the prices, Micro Center cut them as a loss leader, something it frequently does. It doesn't change the bargain prices, just the motivation. So, I wanted to set the record straight on that. Onward. Microsoft is looking for a few good bugs. And people who will keep it quiet. OK, so I have no evidence of direct causality, but it seems convenient. Over the past few weeks, Google has embarrassed Microsoft twice by publicly disclosing security vulnerabilities in Windows 10 that still have not been patched after 90 days. Google has no mercy with its Zero Day disclosures and plays no favorites. Any company that does not fix a bug by 90 days after Google informs them of it will be hung out to dry. To read this article in full or to leave a comment, please click here]]> 2017-03-06T09:54:00+00:00 http://www.networkworld.com/article/3177211/security/microsoft-paying-a-bug-bounty-of-30000.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328714 False Guideline None None