www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T16:59:38+00:00 www.secnews.physaphae.fr Network World - Magazine Info Should police departments be able to have their own DNA databases? 42-year-old cold case of “Baby Sarah.” Recently in Niagara Falls, cops found the man responsible for a smash and grab robbery committed 11 years ago, in 2006, via DNA which the man had been ordered to submit for unrelated offences. But it takes some state labs a year-and-a-half to process DNA, so some police departments are bypassing the state labs and creating their own DNA databases to track criminals.To read this article in full or to leave a comment, please click here]]> 2017-03-06T09:03:00+00:00 http://www.networkworld.com/article/3177244/security/should-police-departments-be-able-to-have-their-own-dna-databases.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328715 False None None None Network World - Magazine Info US DOJ drops child porn case to avoid disclosing Tor exploit a court filing Friday. "Disclosure is not currently an option."The case involves Jay Michaud, a school administrator from Vancouver, Washington, who was arrested in July 2015 for allegedly viewing child porn images on Playpen. Michaud's case was one of at least 137 cases brought throughout the U.S. in relation to Playpen, a website that operated on the Tor anonymity network and which the FBI managed to seize in 2015.To read this article in full or to leave a comment, please click here]]> 2017-03-06T06:39:00+00:00 http://www.networkworld.com/article/3176912/security/us-doj-drops-child-porn-case-to-avoid-disclosing-tor-exploit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328716 False None None None Network World - Magazine Info Okta acquires Stormpath to boost its identity services for developers To read this article in full or to leave a comment, please click here]]> 2017-03-06T06:00:01+00:00 http://www.networkworld.com/article/3177227/security/okta-acquires-stormpath-to-boost-its-identity-services-for-developers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328718 False None None None Network World - Magazine Info New products of the week 3.6.17 Image by CertaOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.A10 Networks Thunder CFW, with integrated Gi/SGi firewall capabilitiesa10Image by a10To read this article in full or to leave a comment, please click here]]> 2017-03-06T02:58:00+00:00 http://www.networkworld.com/article/3176674/cloud-computing/new-products-of-the-week-3-6-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328413 True None None None Network World - Magazine Info Review: vArmour flips security on its head even reviewed dedicated threat-hunting tools that ferret out malware that's already active inside a network. However, what if there were a different way to approach security? Instead of searching for behaviors that might indicate a threat, what if you could define everything that is allowed within a network? If every process, application and workflow needed to conduct business could be defined, then by default everything outside of those definitions could be flagged as illegal. At the very least, critical programs could be identified and all interactions with them could be tightly defined and monitored. It's a different way of looking at security, called segmentation.To read this article in full or to leave a comment, please click here]]> 2017-03-06T02:50:00+00:00 http://www.networkworld.com/article/3176060/security/review-varmour-flips-security-on-its-head.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328414 False None None None Network World - Magazine Info Ransomware attack hit Pennsylvania Democratic Senators site was still down and displayed an “error establishing a database connection” message. The same error displays when trying to view each Democratic senator's website.“Officials from the caucus have been in contact with law enforcement to investigate the incident and are working with Microsoft to restore the IT system,” according to a written statement text-messaged to reporters and obtained by The Hill. It was sent via text since the caucus could not use its email. “There is currently no indication that the caucus system was targeted or that any data has been compromised.”To read this article in full or to leave a comment, please click here]]> 2017-03-05T07:31:00+00:00 http://www.networkworld.com/article/3176888/security/ransomware-attack-hit-pennsylvania-democratic-senators.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327856 False None None None Network World - Magazine Info Enough with "the Cyber"! To read this article in full or to leave a comment, please click here]]> 2017-03-04T13:07:00+00:00 http://www.networkworld.com/article/3176887/security/enough-with-the-cyber.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327857 False None Yahoo None Network World - Magazine Info HackerOne offers bug bounty service for free to open-source projects blog post. "Our company, product, and approach is built on, inspired by, and driven by open source and a culture of collaborative software development. As such, we want to give something back."HackerOne is a platform that makes it easier for companies to interact with security researchers, triage their reports, and reward them. Very few companies have the necessary resources to build and maintain bug bounty programs on their own with all the logistics that such efforts involve, much less so open-source projects that are mostly funded through donations.To read this article in full or to leave a comment, please click here]]> 2017-03-03T12:28:31+00:00 http://www.networkworld.com/article/3176756/security/hackerone-offers-bug-bounty-service-for-free-to-open-source-projects.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327858 False None None None Network World - Magazine Info Security alert overload threatens to bury security teams To read this article in full or to leave a comment, please click here]]> 2017-03-03T11:01:00+00:00 http://www.networkworld.com/article/3176718/security/dealing-with-overwhelming-volume-of-security-alerts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327859 False None None None Network World - Magazine Info The 10 essential Reddits for security pros Image by IDGReddit isn't just about viral news stories and viral memes or heated thread debates, although there is always plenty of that on the sharing and social media site. For security professionals, as well as those interested in pursuing the field of cybersecurity, there is a wealth of advice, content, and conversation from deep and dirty forensics work to the latest on cyberlaw and everything in-between - if you know where to look.To read this article in full or to leave a comment, please click here]]> 2017-03-03T09:15:00+00:00 http://www.networkworld.com/article/3176833/security/the-10-essential-reddits-for-security-pros.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327872 False None None None Network World - Magazine Info U.S. Marshals warn against dual phone scams Avaya wants out of S.F. stadium suite, not too impressed with 49ers on-field performance either+“Recently, there were reported attempts of a fraudulent caller who identified himself as a Deputy United States Marshal. This phony law enforcement officer informed the potential victims that warrants were being issued for them or their family member due to being absent from a federal grand jury they were previously summoned to appear before. The potential victims were then informed they could avoid arrest by paying a fine by electronic fund transfer or cashier's check. The Marshals Service became aware of the scam after receiving information from several calls from alert citizens,” the service wrote.To read this article in full or to leave a comment, please click here]]> 2017-03-03T09:05:00+00:00 http://www.networkworld.com/article/3176831/security/u-s-marshals-warn-against-dual-phone-scams.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327873 False None None None Network World - Magazine Info Fileless Powershell malware uses DNS as covert communication channel To read this article in full or to leave a comment, please click here]]> 2017-03-03T09:01:07+00:00 http://www.networkworld.com/article/3176748/security/fileless-powershell-malware-uses-dns-as-covert-communication-channel.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327874 False None None None Network World - Magazine Info Infosec mourns over Howard Schmidt, who helped make the country a safer place Oracle Corp. "From a security standpoint, he had a tremendous impact, the many roles he played, the work in the white house."To read this article in full or to leave a comment, please click here]]> 2017-03-03T05:13:00+00:00 http://www.networkworld.com/article/3176828/techology-business/infosec-mourns-over-howard-schmidt-who-helped-make-the-country-a-safer-place.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327545 False None None None Network World - Magazine Info Pence used private mail for state work as governor, account was hacked his personal AOL account to communicate with his top advisers on issues ranging from security gates at the governor's residence to the state's response to terror attacks across the globe. A hacker seems to have got access to his email account in June last year and sent a fake mail to people on the former governor's contact list, claiming  that Pence and his wife had been attacked on their way back to their hotel in the Philippines, according to the report. Pence subsequently changed his AOL account.To read this article in full or to leave a comment, please click here]]> 2017-03-02T20:50:00+00:00 http://www.networkworld.com/article/3176071/security/pence-used-private-mail-for-state-work-as-governor-account-was-hacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327008 False None None None Network World - Magazine Info Slack bug paved the way for a hack that can steal user access To read this article in full or to leave a comment, please click here]]> 2017-03-02T12:07:52+00:00 http://www.networkworld.com/article/3176200/security/slack-bug-paved-the-way-for-a-hack-that-can-steal-user-access.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327009 False None None None Network World - Magazine Info Free decryption tools now available for Dharma ransomware To read this article in full or to leave a comment, please click here]]> 2017-03-02T11:50:53+00:00 http://www.networkworld.com/article/3176588/security/free-decryption-tools-now-available-for-dharma-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327010 False None None None Network World - Magazine Info Ransomware roundtable: Is this the new spam? 2017-03-02T09:51:00+00:00 http://www.networkworld.com/video/74879/ransomware-roundtable-is-this-the-new-spam#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327023 False None None None Network World - Magazine Info Chrome for MacOS to block rogue ad injections and settings changes blog post Wednesday. "As a result, macOS users may start seeing more warnings when they navigate to dangerous sites or download dangerous files."To read this article in full or to leave a comment, please click here]]> 2017-03-02T07:32:08+00:00 http://www.networkworld.com/article/3176509/security/chrome-for-macos-to-block-rogue-ad-injections-and-settings-changes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=327011 False None None None Network World - Magazine Info How to get your infrastructure in shape to shake off scriptable attacks F-Secure's The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks.The number of attack scripts is climbing as elite hackers continue to create these scripts and sell them to others, says Itzik Kotler, CTO and Co-Founder, SafeBreach. There doesn't seem to be any stopping this trend.CSO examines scriptable attacks and the part of the problem that you can control: getting your infrastructure in shape to shrug off these breaches.To read this article in full or to leave a comment, please click here]]> 2017-03-02T05:40:00+00:00 http://www.networkworld.com/article/3176103/security/how-to-get-your-infrastructure-in-shape-to-shake-off-scriptable-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=326083 False None None None Network World - Magazine Info How to respond to a cyber attack Image by ThinkstockCybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt to access, damage or impair another system that appears to be involved in an attack is mostly likely illegal and can result in civil and/or criminal liability. Since many intrusions and attacks are launched from compromised systems, there's also the danger of damaging an innocent victim's system.To read this article in full or to leave a comment, please click here]]> 2017-03-02T05:38:00+00:00 http://www.networkworld.com/article/3176308/malware-cybercrime/how-to-respond-to-a-cyber-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=326084 False None None None Network World - Magazine Info US FCC stays data security regulations for broadband providers to stay temporarily one part of privacy rules passed in October that would give consumers the right to decide how their data is used and shared by broadband providers.The rules include the requirement that internet service providers should obtain "opt-in" consent from consumers to use and share sensitive information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.To read this article in full or to leave a comment, please click here]]> 2017-03-01T20:36:46+00:00 http://www.networkworld.com/article/3175763/internet/us-fcc-stays-data-security-regulations-for-broadband-providers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325573 False None None None Network World - Magazine Info Yahoo execs botched its response to 2014 breach, investigation finds data breach involving 500 million user accounts in September, actually knew an intrusion had occurred back in 2014, but allegedly botched its response.The findings were made in a Yahoo securities exchange filing on Wednesday that offered more details about the 2014 breach, which the company has blamed on a state-sponsored hacker.To read this article in full or to leave a comment, please click here]]> 2017-03-01T17:01:38+00:00 http://www.networkworld.com/article/3176042/security/yahoo-execs-botched-its-response-to-2014-breach-investigation-finds.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325574 False None Yahoo None Network World - Magazine Info Old Windows malware may have tampered with 132 Android apps blog post.To read this article in full or to leave a comment, please click here]]> 2017-03-01T13:59:37+00:00 http://www.networkworld.com/article/3176166/security/old-windows-malware-may-have-tampered-with-132-android-apps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325575 False None None None Network World - Magazine Info US surveillance law may see no new protections for foreign targets Section 702 of the Foreign Intelligence Surveillance Act expires on Dec. 31, and some digital rights groups are calling on Congress to overhaul the law to protect the privacy of residents of both the U.S. and other countries. Congress will almost certainly extend the provision in some form. But a congressional hearing on Wednesday focused largely on the NSA's "inadvertent" collection of U.S. residents' data, with little time given to the privacy concerns of people overseas.To read this article in full or to leave a comment, please click here]]> 2017-03-01T11:48:43+00:00 http://www.networkworld.com/article/3176184/security/us-surveillance-law-may-see-no-new-protections-for-foreign-targets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325576 False None None None Network World - Magazine Info February 2017: The month in hacks and breaches taking down a dark web hosting service that the hacker claimed was hosting child pornography sites. In the process, the hacker showed just how easily the dark web can be compromised.Then, on February 10, as many as 20 hackers (or groups of hackers) exploited a recently patched REST API vulnerability to deface over 1.5 million web pages across about 40,000 WordPress websites. “The flaw was fixed in WordPress 4.7.2, released on Jan. 26, but the WordPress team did not publicly disclose the vulnerability's existence until a week later,” Lucian Constantin reported.To read this article in full or to leave a comment, please click here]]> 2017-03-01T09:24:00+00:00 http://www.networkworld.com/article/3176087/security/february-2017-the-month-in-hacks-and-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325589 False None None None Network World - Magazine Info Cisco warns of NetFlow appliance vulnerability Cisco tries to squash Smart Install security abuse+ Specifically, Cisco wrote: “A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.”To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:53:00+00:00 http://www.networkworld.com/article/3176084/security/cisco-warns-of-netflow-appliance-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325590 False None None None Network World - Magazine Info IDG Contributor Network: SD-WAN facilitates security on the WAN prognostications about the future of networking and security. In that blog post, we spoke about vendor approaches to securing the new Internet connections created by SD-WAN. There's another dimension, though, to SD-WAN security that we didn't discuss and that's about the WAN.The WAN: Risk and reward for today's attackers For a lot of SD-WAN vendors, security integration means inspecting incoming and outgoing Internet traffic. But while services, such as Zscaler, may inspect HTTP traffic bound for the internet, they do nothing for traffic bound to other locations. And that's a problem because increasingly site-to-site traffic requires its own inspection and protection.To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:52:00+00:00 http://www.networkworld.com/article/3174745/wide-area-networking/sd-wan-facilitates-security-on-the-wan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325591 False None None None Network World - Magazine Info IDG Contributor Network: To improve information security, enterprises and government must share information cooperation between the private and public sectors. This leads to the questions of what kind of relationship should the government and companies have, how can they work together and what's preventing this process from happening?To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:28:00+00:00 http://www.networkworld.com/article/3174682/security/to-improve-information-security-enterprises-and-government-must-share-information.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325592 False Guideline Yahoo None Network World - Magazine Info IT experience can be beneficial for a cybersecurity career research conducted in 2016 by ESG and the Information Systems Security Association (ISSA), 78% of cybersecurity professionals follow a more indirect route. These folks start their careers as IT professionals and make their way into cybersecurity as their careers progress.To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:23:00+00:00 http://www.networkworld.com/article/3176022/security/it-experience-can-be-beneficial-for-a-cybersecurity-career.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325593 False None None None Network World - Magazine Info Palo Alto Networks pays $105M for LightCyber to better detect network attacks LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are looking around for ways to carry out exploits.The $105 million cash deal brings LightCyber's ability to analyze behavior of devices to discover reconnaissance by malware inside networks and lateral movements as it seeks to compromise vulnerable systems.Based on machine learning, LightCyber absorbs the behaviors of individuals and devices, sets a normal level for them and finds anomalies that could indicate attacks underway.To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:22:00+00:00 http://www.networkworld.com/article/3176021/security/palo-alto-networks-pays-105m-for-lightcyber-to-better-detect-network-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325594 False None None None Network World - Magazine Info Robots are just as plagued by security vulnerabilities as IoT devices a new report.To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:09:51+00:00 http://www.networkworld.com/article/3175752/security/robots-are-just-as-plagued-by-security-vulnerabilities-as-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325595 False None None None Network World - Magazine Info Global cybercrime prosecution a patchwork of alliances To read this article in full or to leave a comment, please click here]]> 2017-03-01T05:20:00+00:00 http://www.networkworld.com/article/3175749/security/global-cybercrime-prosecution-a-patchwork-of-alliances.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325149 False None None None Network World - Magazine Info Smart teddy bear maker faces scrutiny over data breach response breach, which affects 800,000 user accounts, only came to its attention last week on Feb. 22.The statement is raising eyebrows. One researcher named Victor Gevers began contacting the toymaker about the problem in late December, when he noticed that a company MongoDB database storing customer information was publicly exposed.To read this article in full or to leave a comment, please click here]]> 2017-02-28T19:06:26+00:00 http://www.networkworld.com/article/3175776/security/smart-teddy-bear-maker-faces-scrutiny-over-data-breach-response.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324698 False None None None Network World - Magazine Info Microsoft may owe you $100 if you bought from the Microsoft Store To read this article in full or to leave a comment, please click here]]> 2017-02-28T14:30:00+00:00 http://www.networkworld.com/article/3175683/security/microsoft-may-owe-you-100-if-you-bought-from-the-microsoft-store.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324699 False Guideline None None Network World - Magazine Info Google reveals Microsoft bug affecting IE and Edge two unpatched bugs, and now it's doing it again. A security flaw in Microsoft Edge and Internet Explorer was first reported to Microsoft Nov. 25, 2016. Microsoft was offered the standard 90-day lead to patch the issue before Google announced it to the world. With the cancellation of this month's Patch Tuesday, Microsoft failed to issue a fix, and now the bug is out there for the whole world to see. To read this article in full or to leave a comment, please click here]]> 2017-02-28T13:36:00+00:00 http://www.networkworld.com/article/3175714/security/google-reveals-microsoft-bug-affecting-ie-and-edge.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324700 False Guideline None None Network World - Magazine Info Border agents go all Monty Python on visa-holding software engineer a LinkedIn story:To read this article in full or to leave a comment, please click here]]> 2017-02-28T10:42:00+00:00 http://www.networkworld.com/article/3175083/security/border-agents-go-all-monty-python-on-visa-holding-software-engineer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324701 False None None None Network World - Magazine Info A new way to prevent cyberattacks on home devices Dojo.The device was shown at Mobile World Congress here this week and will go on sale online in April. While the Dojo device isn't intended to provide enterprise-level security, it could be used to help, in a small way, in warding off massive attacks like the one that used the Mirai botnet which took advantage of unsecure, consumer-grade cameras and other devices last October.To read this article in full or to leave a comment, please click here]]> 2017-02-28T09:45:00+00:00 http://www.networkworld.com/article/3175664/security/a-new-way-to-prevent-cyberattacks-on-home-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324714 False None None None Network World - Magazine Info Cisco tries to squash Smart Install security abuse security issue with its Smart Install switch management software that could allow unauthenticated access to customer configuration details.Cisco defines Smart Install as a legacy feature that provides zero-touch deployment for new switches, typically access layer switches.+More on Network World: Cisco Jasper grows Internet of Things reach, breadth+To read this article in full or to leave a comment, please click here]]> 2017-02-28T09:35:00+00:00 http://www.networkworld.com/article/3175061/security/cisco-tries-to-squash-smart-install-security-abuse.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324715 False None None None Network World - Magazine Info Trend Micro report: Ransomware booming ransomware as a service (RaaS) and payments made to anonymous bitcoin accounts, and the result is a booming criminal enterprise worth $1 billion last year, according to TrendLabs 2016 Security Roundup. Neophyte crooks are being drawn in because it's so easy to set up a ransomware operation, the report says. “Since RaaS is available in the underground, the service provides fledgling cybercriminals the necessary tools to run their own extortion campaigns,” it says.To read this article in full or to leave a comment, please click here]]> 2017-02-28T09:31:00+00:00 http://www.networkworld.com/article/3175030/security/trend-micro-report-ransomware-booming.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324716 False None None None Network World - Magazine Info This tool can help you discover Cisco Smart Install protocol abuse To read this article in full or to leave a comment, please click here]]> 2017-02-28T08:49:29+00:00 http://www.networkworld.com/article/3175054/security/this-tool-can-help-you-discover-cisco-smart-install-protocol-abuse.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324717 False None None None Network World - Magazine Info 821,000 user records exposed due to misconfigured MongoDB for smart stuffed toys CloudPets, owned by SpiralToys, it wasn't the cute and huggable smart stuffed toys hackers were hugging, but the data. Here it is:- Toy captured kids voices- Data exposed via MongoDB- 2.2m recordings- DB ransom'd- And much more...https://t.co/HvePnZleXRTo read this article in full or to leave a comment, please click here]]> 2017-02-28T07:22:00+00:00 http://www.networkworld.com/article/3175508/security/821-000-user-records-exposed-due-to-misconfigured-mongodb-for-smart-stuffed-toys.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324718 False None None None Network World - Magazine Info New financial regulations go into effect in New York new regulations go into effect in New York State, requiring that all regulated financial services institutions have a cybersecurity program in place, appoint a Chief Information Security Officer, and monitor the cybersecurity policies of their business partners.It might seem a little sudden, since the regulations were only finalized a month ago. But it's actually not as bad as it sounds."There's a transitional period," said Brad Keller, senior director of third party strategy at Prevalent. "Everyone has six months to be in compliance."To read this article in full or to leave a comment, please click here]]> 2017-02-28T05:01:00+00:00 http://www.networkworld.com/article/3175139/compliance/new-financial-regulations-go-into-effect-in-new-york.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324397 False None None None Network World - Magazine Info Will a cyber crisis add to chaos of Trump\'s first 100 days? new president will face a cyber crisis sometime within his first 100 days.The company made the prediction last fall, prior to the election, as part of its “Predictions 2017” brief, so it didn't specifically focus on either Trump or Democratic candidate Hillary Clinton.To read this article in full or to leave a comment, please click here]]> 2017-02-28T05:00:00+00:00 http://www.networkworld.com/article/3175138/security/will-a-cyber-crisis-add-to-chaos-of-trump-s-first-100-days.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324398 False None None None Network World - Magazine Info 7 universal rules of threat intelligence Image by ThinkstockCybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of attacks from malicious actors across the globe. As part of your organization's cybersecurity efforts, it is your job to not just catch these attacks as they happen, but try to mitigate threats and prevent them before anything occurs.To read this article in full or to leave a comment, please click here]]> 2017-02-28T04:58:00+00:00 http://www.networkworld.com/article/3175137/security/7-universal-rules-of-threat-intelligence.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324399 False None None None Network World - Magazine Info This tiny chip could revolutionize smartphone and IOT security To read this article in full or to leave a comment, please click here]]> 2017-02-28T01:10:48+00:00 http://www.networkworld.com/article/3175131/encryption/this-tiny-chip-could-revolutionize-smartphone-and-iot-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324136 False None None None Network World - Magazine Info Smart teddy bears involved in a contentious data breach blog post.To read this article in full or to leave a comment, please click here]]> 2017-02-27T18:08:59+00:00 http://www.networkworld.com/article/3175225/security/smart-teddy-bears-involved-in-a-contentious-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323324 False None None None Network World - Magazine Info Space X to zoom two citizen astronauts to the moon Space X said the mission will take place after the space company launches its unmanned Dragon (Version 2) spacecraft to the International Space Station later this year.To read this article in full or to leave a comment, please click here]]> 2017-02-27T14:39:00+00:00 http://www.networkworld.com/article/3175007/security/space-x-to-zoom-two-citizen-astronauts-to-the-moon.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323325 False None None None Network World - Magazine Info Google shifts on email encryption tool, leaving its fate unclear announced in 2014, was no longer a Google product. Instead, it's become a "full community-driven open source project," the company said in a blog post.To read this article in full or to leave a comment, please click here]]> 2017-02-27T13:23:44+00:00 http://www.networkworld.com/article/3175045/privacy/google-shifts-on-email-encryption-tool-leaving-its-fate-unclear.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323326 False None None None Network World - Magazine Info The latest ransomware threat: Doxware To read this article in full or to leave a comment, please click here]]> 2017-02-27T10:34:00+00:00 http://www.networkworld.com/article/3174678/security/the-latest-ransomware-threat-doxware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323327 False None None None Network World - Magazine Info SHA-1 collision can break SVN code repositories first practical collision attack against the SHA-1 hash function on Thursday. Their demonstration consisted of creating two PDF files with different contents that had the same SHA-1 digest.To read this article in full or to leave a comment, please click here]]> 2017-02-27T10:23:45+00:00 http://www.networkworld.com/article/3174673/security/sha-1-collision-can-break-svn-code-repositories.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323340 False None None None Network World - Magazine Info SK Telecom pushes for interoperable quantum crypto systems To read this article in full or to leave a comment, please click here]]> 2017-02-27T10:10:54+00:00 http://www.networkworld.com/article/3174702/encryption/sk-telecom-pushes-for-interoperable-quantum-crypto-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323341 False None None None Network World - Magazine Info IDG Contributor Network: 5 ecommerce fraud predictions for 2017 To read this article in full or to leave a comment, please click here]]> 2017-02-27T09:59:00+00:00 http://www.networkworld.com/article/3173322/security/5-ecommerce-fraud-predictions-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323342 False None None None Network World - Magazine Info Cog Systems offers more secure version of HTC A9 smartphone Cog Systems. The product grew out of custom security software the company developed for governments, and which it saw could also be put to use in the enterprise as a way to make smartphones more productive while still maintaining a high level of security. It includes a Type 1 hypervisor, a virtualized VPN and additional storage encryption that wrap the standard Android OS in additional layers of protection largely invisible to the end user.To read this article in full or to leave a comment, please click here]]> 2017-02-27T09:00:02+00:00 http://www.networkworld.com/article/3174694/security/cog-systems-offers-more-secure-version-of-htc-a9-smartphone.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323343 False None None None Network World - Magazine Info Down the rabbit hole, part 7: How to limit personal data collection from city cameras To read this article in full or to leave a comment, please click here]]> 2017-02-27T07:36:00+00:00 http://www.networkworld.com/article/3174521/security/down-the-rabbit-hole-part-7-how-to-limit-personal-data-collection-from-city-cameras.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323344 False None None None Network World - Magazine Info Who should be on an insider risk team? To read this article in full or to leave a comment, please click here]]> 2017-02-27T06:53:00+00:00 http://www.networkworld.com/article/3174589/security/who-should-be-on-an-insider-risk-team.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323345 False None None None Network World - Magazine Info What should an insider risk policy cover? cutting the pay of their contracted janitors. That didn't sit well with those employees.Threat actors saw an opportunity and pounced, convincing the possibly vengeful employees to turn on their employer. According to Verizon's recent breach report, the threat actors gave any agreeable janitor a USB drive to quietly stick into any networked computer at the company. It was later found, but the damage was done.What were the responsibilities of any employees who witnessed this act? A thorough insider risk policy would have spelled it out. Here, security experts provide their insights on what makes for a successful insider risk policy.To read this article in full or to leave a comment, please click here]]> 2017-02-27T06:51:00+00:00 http://www.networkworld.com/article/3174553/security/what-should-an-insider-risk-policy-cover.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323346 False None None None Network World - Magazine Info Russian cybersecurity expert charged with treason for sharing \'secrets\' with US firms arrested and charged with treason? It is now being reported that the treason charges were for allegedly passing state secrets to Verisign and other US companies.An unnamed source told Reuters that the accusations of treason were first made in 2010 by Russian businessman and founder of the online payment firm ChronoPay, Pavel Vrublevsky. The December 2016 arrests of Stoyanov and two FSB officers, Sergei Mikhailov and Dmitry Dokuchayev, were in response to those 2010 claims that the men had passed secrets on to American companies.To read this article in full or to leave a comment, please click here]]> 2017-02-27T06:35:00+00:00 http://www.networkworld.com/article/3174351/security/russian-cybersecurity-expert-charged-with-treason-for-sharing-secrets-with-us-firms.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323347 False None None None Network World - Magazine Info Microsoft\'s anti-malware program still isn\'t very good AV-TEST conducted a lengthy, comprehensive test over a 12-month period to determine the best malware removal solutions for Windows 10. This involved 897 individual evaluations for each product, evaluating eight security suites. To read this article in full or to leave a comment, please click here]]> 2017-02-27T05:59:00+00:00 http://www.networkworld.com/article/3174550/security/microsofts-anti-malware-program-still-isnt-very-good.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323348 False None None None Network World - Magazine Info New products of the week 2.27.17 Image by Transition NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ONLYOFFICE app for ownCloudascensioImage by ascensioTo read this article in full or to leave a comment, please click here]]> 2017-02-27T02:33:00+00:00 http://www.networkworld.com/article/3173956/cloud-computing/new-products-of-the-week-2-27-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=323087 True None None None Network World - Magazine Info Oldies but goodies make presence felt amid glitzy startups at RSAC To read this article in full or to leave a comment, please click here]]> 2017-02-27T02:15:00+00:00 http://www.networkworld.com/article/3174097/security/oldies-but-goodies-make-presence-felt-amid-glitzy-startups-at-rsac.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322900 False Guideline None None Network World - Magazine Info Ransomware attacks targeted hundreds of MySQL databases MongoDB ransomware attacks;” in January, there were tens of thousands of MongoDB installs erased and replaced with ransom demands. In the new attacks, targeted MySQL databases are erased and replaced with a ransom demand for 0.2 bitcoin, which is currently equal to about $234.To read this article in full or to leave a comment, please click here]]> 2017-02-26T08:08:00+00:00 http://www.networkworld.com/article/3174306/security/ransomware-attacks-targeted-hundreds-of-mysql-databases.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322464 False None None None Network World - Magazine Info The new BlackBerry has a physical keyboard and will arrive in April licensee of the brand, at a launch event in Barcelona on the eve of Mobile World Congress. Like the BlackBerries of old, the KEYone has a physical keyboard with raised keys. A neat twist is that it also acts as a touchpad of sorts, and each letter can be used as a shortcut, with a short or long keypress, for 52 shortcuts in all.To read this article in full or to leave a comment, please click here]]> 2017-02-25T11:13:00+00:00 http://www.networkworld.com/article/3174326/smartphones/the-new-blackberry-has-a-physical-keyboard-and-will-arrive-in-april.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322465 False None None None Network World - Magazine Info I come to bury SHA1, not to praise it To read this article in full or to leave a comment, please click here]]> 2017-02-24T11:58:00+00:00 http://www.networkworld.com/article/3173701/security/i-come-to-bury-sha1-not-to-praise-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322466 False None None None Network World - Magazine Info Google discloses unpatched IE vulnerability after Patch Tuesday delay decided to skip this month's Patch Tuesday and postpone its previously planned security fixes until March.Microsoft blamed the unprecedented decision to push back scheduled security updates by a month on a "last minute issue" that could have had an impact on customers, but the company hasn't clarified the nature of the problem.To read this article in full or to leave a comment, please click here]]> 2017-02-24T10:44:56+00:00 http://www.networkworld.com/article/3173957/security/google-discloses-unpatched-ie-vulnerability-after-patch-tuesday-delay.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322467 False None None None Network World - Magazine Info FCC puts the brakes on ISP privacy rules it just passed in October The rules, passed when the FCC had a Democratic majority, require broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details, with third parties. Without the stay, the opt-in requirements were scheduled to take effect next week.To read this article in full or to leave a comment, please click here]]> 2017-02-24T10:43:55+00:00 http://www.networkworld.com/article/3174188/internet/fcc-puts-the-brakes-on-isp-privacy-rules-it-just-passed-in-october.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322480 False None None None Network World - Magazine Info Cisco unveils Hierarchy of Needs for the digital enterprise Cisco's Open Berlin innovation center where inventive start-ups are building and showcasing solutions that run on Cisco technology. Innovation and digital transformation are linked together like Kirk and Spock. You can't have one without the other. At this week's event, Ruba Borno, Cisco vice president of growth initiatives and chief of staff for the office of the CEO, gave her first-ever keynote to a Cisco Live audience. Not surprisingly, she focused on digital transformation. However, unlike many keynotes I have seen, Borno didn't just talk about digitization at a high level. Instead she was more prescriptive and gave the audience a guide on how to proceed with making the shift to a digital enterprise. To read this article in full or to leave a comment, please click here]]> 2017-02-24T10:29:00+00:00 http://www.networkworld.com/article/3174096/data-center/cisco-unveils-hierarchy-of-needs-for-the-digital-enterprise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322481 False None None None Network World - Magazine Info Fraud rises as cybercriminals flock to online lenders ThreatMetrix Cybercrime Report: Q4 2016.Cybercriminals are increasingly targeting online lenders and emerging financial services, says Vanita Pandey, vice president of strategy and product marketing, ThreatMetrix.[ Related: 8 tips to defend against online financial fraud threats ]To read this article in full or to leave a comment, please click here]]> 2017-02-24T10:07:00+00:00 http://www.networkworld.com/article/3173998/security/fraud-rise-as-cybercriminals-flock-to-online-lenders.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322482 False None None None Network World - Magazine Info Replace SHA-1. It\'s not that hard. SHA-1 has been broken it's time for enterprises that have ignored its potential weakness for years to finally act, and it's not that hard. The most common use of the hash function is in securing SSL and TLS connections, and to get rid of SHA-1 in that use is to utilize browsers and servers that don't support it. Depending on the size of an organization, this isn't onerous, says Paul Ducklin, a senior security advisor at Sophos. (See his excellent description of the problem with SHA-1 and other hashing algorithms.)To read this article in full or to leave a comment, please click here]]> 2017-02-24T10:03:00+00:00 http://www.networkworld.com/article/3173996/security/replace-sha-1-it-s-not-that-hard.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322483 False None None None Network World - Magazine Info Cloudflare bug exposed passwords, other sensitive data from websites To read this article in full or to leave a comment, please click here]]> 2017-02-24T08:47:36+00:00 http://www.networkworld.com/article/3173857/security/cloudflare-bug-exposed-passwords-other-sensitive-data-from-websites.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322484 False None None None Network World - Magazine Info IDG Contributor Network: 3 security analytics approaches that don\'t work (but could) - Part 2 drawbacks of security analytics approaches I described in part 1 of this series, it's possible to build such solutions today, giving users a way to rapidly identify their highest-priority security threats at very large scale without being deluged with false-positive alerts or being forced to hire an army of extra analysts.To read this article in full or to leave a comment, please click here]]> 2017-02-24T06:03:00+00:00 http://www.networkworld.com/article/3173383/analytics/three-security-analytics-approaches-that-dont-work-but-could-part-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322485 False Guideline None None Network World - Magazine Info Ransomware \'customer support\' chat reveals criminals\' ruthlessness Spora ransomware family. The back-and-forth not only put a spotlight on the gang's customer support chops, but, said a company security advisor, illustrated the intertwining of Bitcoin and extortion malware.To read this article in full or to leave a comment, please click here]]> 2017-02-24T04:54:00+00:00 http://www.networkworld.com/article/3173855/security/ransomware-customer-support-chat-reveals-criminals-ruthlessness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322192 False None None None Network World - Magazine Info The future of biometrics and IoT Image by ThinkstockBiometrics falls into the third category of security modalities: (1) what we have: e.g. key, RFID card or ID card; (2) what we know: e.g. password, PIN, challenge/response answers like mother's maiden name or first pet; and (3) what we are: e.g. biometrics, such as our fingerprint, face, iris, etc.To read this article in full or to leave a comment, please click here]]> 2017-02-24T04:47:00+00:00 http://www.networkworld.com/article/3173991/security/the-future-of-biometrics-and-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322193 False None None None Network World - Magazine Info Has fraud met its match? 41 million Americans have had their identities stolen, and millions more have had their personally identifiable information (PII) placed at risk through a data breach, according to a Bankrate.com survey of 1,000 adults conducted last month.To read this article in full or to leave a comment, please click here]]> 2017-02-24T04:46:00+00:00 http://www.networkworld.com/article/3173990/security/has-fraud-met-its-match.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322194 False None None None Network World - Magazine Info Stop using SHA1: It\'s now completely unsafe some exemptions have been made.To read this article in full or to leave a comment, please click here]]> 2017-02-23T14:35:46+00:00 http://www.networkworld.com/article/3173787/security/stop-using-sha1-it-s-now-completely-unsafe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321628 False None None None Network World - Magazine Info How to assess security automation tools here to subscribe.  During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer, co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference. His insight is worth repeating for anyone looking to add automation tools to their security toolset.As I saw at CyberTech, and I'm sure was the case at RSA, the hottest topics were security automation, automated incident response and security orchestration. These can be confusing terms, as every vendor describes them a little bit differently.To read this article in full or to leave a comment, please click here]]> 2017-02-23T12:15:00+00:00 http://www.networkworld.com/article/3173690/security/how-to-assess-security-automation-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321629 False Guideline None None Network World - Magazine Info New York State cybersecurity regulations: Who wins? cybersecurity regulations, which take effect on March 1, 2017. These regulations are somewhat redundant with others in the financial services industry (i.e. FFIEC, GLBA, NIST CSF, OCC, etc.) but tend to go a bit further with several specific prescriptive requirements. For example, the New York State cybersecurity regulations cover nonpublic data (rather than customer data), mandate the presence of a CISO (or third-party equivalent) and require a program for secure data destruction.To read this article in full or to leave a comment, please click here]]> 2017-02-23T10:59:00+00:00 http://www.networkworld.com/article/3173689/security/ny-state-cybersecurity-regulations-who-wins.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321630 False None None None Network World - Magazine Info Breaking and protecting devops tool chains 2017-02-23T10:33:00+00:00 http://www.networkworld.com/video/74438/breaking-and-protecting-devops-tool-chains#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321643 False None Uber None Network World - Magazine Info Bruce Schneier and the call for "public service technologists" 2017-02-23T10:32:00+00:00 http://www.networkworld.com/video/74495/bruce-schneier-and-the-call-for-public-service-technologists#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321644 False None None None Network World - Magazine Info Ethernet 2.5GBASE-T and 5GBASE-T grows, testing on tap from UNH lab To read this article in full or to leave a comment, please click here]]> 2017-02-23T08:32:00+00:00 http://www.networkworld.com/article/3173725/lan-wan/ethernet-2-5gbase-t-and-5gbase-t-grows-testing-on-tap-from-unh-lab.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321631 False None None None Network World - Magazine Info Eleven-year-old root flaw found and patched in the Linux kernel found the vulnerability, plans to publish an exploit for it a few days.To read this article in full or to leave a comment, please click here]]> 2017-02-23T07:11:33+00:00 http://www.networkworld.com/article/3173608/security/eleven-year-old-root-flaw-found-and-patched-in-the-linux-kernel.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321646 False Guideline None None Network World - Magazine Info IDG Contributor Network: Is DevOps security about behavior or process? RELATED: Machine learning offers new hope against cyber attacks Several of the tracks at RSA this year covered the area of security in the development process. I was most interested in the Advanced Security & DevOps track. DevOps is a hot topic in the industry, and now we have SecDevOps, or perhaps DevSecOps as the new security buzzword spinoff. Behind the buzzwords, however, I learned some useful lessons, a few of which I'd like to discuss here.To read this article in full or to leave a comment, please click here]]> 2017-02-23T06:52:00+00:00 http://www.networkworld.com/article/3172784/security/is-devops-security-about-behavior-or-process.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321647 False None None None Network World - Magazine Info How to scrub your private data from \'people finder\' sites 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] Forget the National Security Agency. Aggregator sites such as Intelius, Radaris, and PeopleFinder have data warehouses full of information about you, accessible to people without your permission, and used for purposes you know nothing about. While these sites ostensibly provide background checks and other public services, they also simplify identity theft, stalking, and doxxing (exposing personal information online to encourage harassment), which is both creepy and downright dangerous.To read this article in full or to leave a comment, please click here]]> 2017-02-23T06:27:00+00:00 http://www.networkworld.com/article/3173261/security/how-to-scrub-your-private-data-from-people-finder-sites.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321648 False None None None Network World - Magazine Info Why DRaaS is a better defense against ransomware Image by Eric E CastroIt's one thing for a user's files to get infected with ransomware, it's quite another to have a production database or mission-critical application infected. But, restoring these databases and apps from a traditional backup solution (appliance, cloud or tape) will take hours or even days which can cost a business tens or hundreds of thousands of dollars. Dean Nicolls, vice president of marketing at Infrascale, shares some tangible ways disaster recovery as a service (DRaaS) can pay big dividends and quickly restore systems in the wake of a ransomware attack.To read this article in full or to leave a comment, please click here]]> 2017-02-23T06:20:00+00:00 http://www.networkworld.com/article/3173234/disaster-recovery/why-draas-is-a-better-defense-against-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321649 False None None None Network World - Magazine Info Are you afraid your car will be taken over? take over a connected car. It was a monumental moment that made the auto industry stand up and take notice of the vulnerability of the connected cars they manufactured.Miller and Valesek were not maliciously running cars off the road, but they did give demonstrations so that the auto industry would begin to take security seriously. As seen in this video, the two researchers had the capability through their laptops to shut down the vehicle's engine on the highway or spew window washing fluid onto the windshield, which could startle an unsuspecting driver to perhaps jerk the wheel and hit another car. They identified more than seven major categories of remote attack surfaces, based on their study of 20 models (2014 to 2015) from different car manufacturers.To read this article in full or to leave a comment, please click here]]> 2017-02-23T06:19:00+00:00 http://www.networkworld.com/article/3173626/mobile-security/are-you-afraid-your-car-will-be-taken-over.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321650 False None None None Network World - Magazine Info Police arrest man suspected of building million-router German botnet November 2016 hack on Deutsche Telekom. The agency said it arrested a 29-year-old man at Luton airport, acting on a European Arrest Warrant issued by the public prosecutor's office in Cologne, Germany.The German Federal Criminal Police Office (Bundeskriminalamt, or BKA), which led the investigation, said it had worked with British law enforcement officials to arrest the man, a Briton.To read this article in full or to leave a comment, please click here]]> 2017-02-23T05:38:17+00:00 http://www.networkworld.com/article/3173275/security/police-arrest-man-suspected-of-building-million-router-german-botnet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321269 False None None None Network World - Magazine Info Amid cyberattacks, ISPs try to clean up the internet To read this article in full or to leave a comment, please click here]]> 2017-02-23T05:30:03+00:00 http://www.networkworld.com/article/3173296/security/amid-cyberattacks-isps-try-to-clean-up-the-internet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321270 False None None None Network World - Magazine Info A hard drive\'s LED light can be used to covertly leak data YouTube video posted Wednesday. It shows a hacked computer broadcasting the data through a computer's LED light, with a drone flying nearby reading the pattern. The researchers designed the scheme to underscore vulnerabilities of air-gapped systems, or computers that have been intentionally disconnected from the internet.To read this article in full or to leave a comment, please click here]]> 2017-02-22T16:40:33+00:00 http://www.networkworld.com/article/3173368/security/a-hard-drives-led-light-can-be-used-to-covertly-leak-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320793 False None None None Network World - Magazine Info 7.4% of software on PCs are past end of life report from Secunia Research, which is owned by Flexera Software, covers findings for the fourth quarter of 2016 in 12 countries. In the U.S., it found 7.5 percent of private users had unpatched Windows operating systems in Q4 of 2016, up from 6.1 percent in Q3 of 2016 and down from 9.9 percent in Q4 of 2015.To read this article in full or to leave a comment, please click here]]> 2017-02-22T13:19:00+00:00 http://www.networkworld.com/article/3173106/security/74-of-software-on-pcs-are-past-end-of-life.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320794 False None None None Network World - Magazine Info IDG Contributor Network: Reaching the cybersecurity tipping point password manager to create a complex password? If you do, you reached your “cybersecurity tipping point.”For many, that moment has not yet come. And if you are reading this article, it might be your job to get your employees to hit that point. And you already know that the hard part is figuring out how.To read this article in full or to leave a comment, please click here]]> 2017-02-22T11:42:00+00:00 http://www.networkworld.com/article/3171733/security/reaching-the-cybersecurity-tipping-point.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320795 False None None None Network World - Magazine Info What to expect from the Trump administration on cybersecurity To read this article in full or to leave a comment, please click here]]> 2017-02-22T11:07:40+00:00 http://www.networkworld.com/article/3173167/security/what-to-expect-from-the-trump-administration-on-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320796 False None None None Network World - Magazine Info New macOS ransomware spotted in the wild second such threat found in the wild so far, and it's a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it.OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere Pro CC and Microsoft Office for Mac and is being distributed as a bittorrent download. It is written in Apple's Swift programming language by what appears to be an inexperienced developer, judging from the many mistakes made in its implementation.To read this article in full or to leave a comment, please click here]]> 2017-02-22T10:58:05+00:00 http://www.networkworld.com/article/3173146/security/new-macos-ransomware-spotted-in-the-wild.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320809 False None None None Network World - Magazine Info How the DOT discovered its network was compromised by shadow IT leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here]]> 2017-02-22T10:55:00+00:00 http://www.networkworld.com/article/3172512/security/how-dot-cio-discovered-a-network-compromised-by-shadow-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320810 False Guideline None None Network World - Magazine Info Cisco touts next-gen firewall gear for midsize installations To read this article in full or to leave a comment, please click here]]> 2017-02-22T10:00:00+00:00 http://www.networkworld.com/article/3173038/security/cisco-touts-next-gen-firewall-gear-for-midsize-installations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320811 False None None None Network World - Magazine Info IDG Contributor Network: What is OWASP, and why it matters for AppSec 2016 State of Application Security report revealing they have an AppSec program in place.To read this article in full or to leave a comment, please click here]]> 2017-02-22T09:05:00+00:00 http://www.networkworld.com/article/3171079/security/what-is-owasp-and-why-it-matters-for-appsec.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320812 False None None None Network World - Magazine Info Senator to file bill requiring border agents to get a warrant before searching phones a letter to John Kelly, director of homeland security, Wyden poses the following questions:To read this article in full or to leave a comment, please click here]]> 2017-02-22T08:45:00+00:00 http://www.networkworld.com/article/3172928/mobile-wireless/senator-to-file-bill-requiring-border-agents-to-get-a-warrant-before-searching-phones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320813 False None None None Network World - Magazine Info Microsoft releases Adobe Flash Player fix, but doesn\'t patch 2 zero-day exploits MS17-005 to patch critical flaws in Adobe Flash Player, but that's it. Microsoft didn't release the fix for the two zero-day exploits disclosed this month.After the company said patches would be delayed in February, it clarified that security updates would instead be released on Patch Tuesday in March. Yet InfoWorld's Woody Leonhard reported that Microsoft emailed its largest customers on Monday with a heads-up about the Flash patches for Internet Explorer and Edge.To read this article in full or to leave a comment, please click here]]> 2017-02-22T06:37:00+00:00 http://www.networkworld.com/article/3172926/security/microsoft-released-adobe-flash-player-fix-but-didnt-patch-2-zero-days.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320814 False None None None Network World - Magazine Info Microsoft pushes out critical Flash Player patches with one week delay MS17-005, is rated critical for Windows 8.1, Windows RT 8.1, Windows 10 and Windows Server 2016, and moderate for Windows Server 2012 and Windows Server 2012 R2. On these Windows versions, Flash Player is bundled by default with Internet Explorer 11 and Microsoft Edge, so Microsoft delivers patches for it through Windows Update.This month's Flash Player patches were released by Adobe on February 14 and address 13 vulnerabilities that could lead to remote code execution. Typically Adobe releases patches on the same day as Microsoft, a day known in the industry as Patch Tuesday. This month, though, Microsoft postponed its updates at the last minute due to an unspecified issue that, it said, could have affected customers.To read this article in full or to leave a comment, please click here]]> 2017-02-22T05:38:22+00:00 http://www.networkworld.com/article/3172598/security/microsoft-pushes-out-critical-flash-player-patches-with-one-week-delay.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320445 False Guideline None None Network World - Magazine Info 5 ways to spot a phishing email Verizon's 2016 Data Breach Investigations Report, 30 percent of phishing emails get opened. Yes, that's right -- 30 percent. That incredible click-through rate explains why these attacks remain so popular: it just works.Phishing works because cybercriminals take great pains to camouflage their "bait" as legitimate email communication, hoping to convince targets to reveal login and password information and/or download malware, but there are still a number of ways to identify phishing emails. Here are five of the most common elements to look for.To read this article in full or to leave a comment, please click here]]> 2017-02-22T04:45:00+00:00 http://www.networkworld.com/article/3173044/security/5-ways-to-spot-a-phishing-email.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320446 False None None None Network World - Magazine Info 7 Wi-Fi vulnerabilities beyond weak passwords To read this article in full or to leave a comment, please click here]]> 2017-02-22T04:41:00+00:00 http://www.networkworld.com/article/3172594/network-security/7-wi-fi-vulnerabilities-beyond-weak-passwords.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320447 False None None None Network World - Magazine Info Kaspersky announces its OS for IoT devices announce KasperskyOS, a project that has been in the works for 14 years. Talk about slow development time. KasperskyOS is available for both x86 and ARM processors. It takes concepts from the Flux Advanced Security Kernel (FLASK) architecture, which was used in SELinux and SEBSD, but builds a new OS from scratch with security in mind, enabling what he calls "global Default Deny at the process level." To read this article in full or to leave a comment, please click here]]> 2017-02-22T04:00:00+00:00 http://www.networkworld.com/article/3171159/internet-of-things/kaspersky-announces-its-os-for-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320448 False None None None