www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T10:53:35+00:00 www.secnews.physaphae.fr Network World - Magazine Info LinkedIn will help people in India train for semi-skilled jobs To read this article in full or to leave a comment, please click here]]> 2017-02-21T23:52:17+00:00 http://www.networkworld.com/article/3172793/internet/linkedin-will-help-people-in-india-train-for-semi-skilled-jobs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320275 False None None None Network World - Magazine Info Java and Python FTP attacks can punch holes through firewalls To read this article in full or to leave a comment, please click here]]> 2017-02-21T09:52:32+00:00 http://www.networkworld.com/article/3171082/security/java-and-python-ftp-attacks-can-punch-holes-through-firewalls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319486 False None None None Network World - Magazine Info Cisco deepens enterprise network virtualization, security detection of DNA suite Cisco reserves $125 million to pay for faulty clock component in switches, routers+To read this article in full or to leave a comment, please click here]]> 2017-02-21T09:43:00+00:00 http://www.networkworld.com/article/3171080/cisco-subnet/cisco-deepens-enterprise-network-virtualization-security-detection-of-dna-suite.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319487 False None None None Network World - Magazine Info IDG Contributor Network: Cisco Rapid Threat Containment quickly detects, removes infected end points Cisco acquired SourceFire, and cybersecurity industry legends such as Marty Roesch took leadership roles within the company, Cisco's initiative is for all security products to be open and to interoperate with other products.Another very large acquisition was OpenDNS, and the CEO from OpenDNS now leads all of the security business at Cisco. The culture is all about Cisco products, as well as non-Cisco products, working better together. + Also on Network World: Cisco ONE simplifies security purchasing + For many, it's shocking to think about Cisco as a vendor pushing for openness and standards. I'm not sure why because Cisco has spent its life creating networking protocols and then helping them to become standards available to all. But I digress.To read this article in full or to leave a comment, please click here]]> 2017-02-21T09:40:00+00:00 http://www.networkworld.com/article/3164571/security/cisco-rapid-threat-containment-quickly-detects-removes-infected-end-points.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319488 False Guideline None None Network World - Magazine Info IDG Contributor Network: IoT in crime prevention: Balancing justice with privacy IoT-enabled pacemaker doesn't indicate any change in heart rate during the robbery? Can investigators obtain that information from the service provider? Should they?+ Also on Network World: Cops use pacemaker data to charge homeowner with arson, insurance fraud + Issues of privacy increase as IoT sensors collect more information about us. What rights do individuals have over the information collected about them? Can the accuracy of sensor data be trusted?To read this article in full or to leave a comment, please click here]]> 2017-02-21T08:37:00+00:00 http://www.networkworld.com/article/3172191/security/iot-in-crime-prevention-balancing-justice-with-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319489 False None None None Network World - Magazine Info New York State cybersecurity rules and the skills shortage Department of Financial Services (DFS) rules (23 NYCRR 500) go into effect next week on March 1, 2017.Anyone who has reviewed similar cybersecurity regulations will find requirements in 23 NYCRR 500 familiar, so while the regulations are somewhat broader than others, there are obvious common threads. In reviewing the document, however, section 500.10 caught my eye. Here is the text from this section:To read this article in full or to leave a comment, please click here]]> 2017-02-21T07:55:00+00:00 http://www.networkworld.com/article/3172363/security/new-york-state-cybersecurity-rules-and-the-skills-shortage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319502 False None None None Network World - Magazine Info EFF: Congress considers making it illegal to protect consumer privacy online To read this article in full or to leave a comment, please click here]]> 2017-02-21T07:36:00+00:00 http://www.networkworld.com/article/3172198/security/eff-congress-is-considering-making-it-illegal-to-protect-consumer-privacy-online.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319503 False None None None Network World - Magazine Info IDG Contributor Network: Breaking through the cybersecurity bubble RSA Conference in San Francisco, however, there were some hopeful signs that this narrow view and myopic perspective is evolving-at least for some. “Don't draw lines that separate different fields. Draw connections that bring them together,” implored RSA CTO Dr. Zulfikar Ramzan in the opening keynote as he called for business-driven security. “In my experience, today's security professionals must also draw connections between security details and business objectives.”To read this article in full or to leave a comment, please click here]]> 2017-02-21T07:15:00+00:00 http://www.networkworld.com/article/3171693/security/breaking-through-the-cybersecurity-bubble.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319504 False None None None Network World - Magazine Info We finally know how much a data breach can cost Everything you know about cyberwar is wrong + The massive Yahoo data breaches of 2013 and 2014 now have a real cost attached to them, and it's a couple orders of magnitude larger than those piddly estimates. Simply put, the breaches forced Yahoo to renegotiate its sale to Verizon, cutting the price by $350 million. To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:54:00+00:00 http://www.networkworld.com/article/3172402/security/we-finally-know-how-much-a-data-breach-can-cost.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319505 False None Yahoo None Network World - Magazine Info Verizon knocks off $350M from Yahoo deal after breaches announced the amended terms of the deal Tuesday.Back in October, one news report had Verizon seeking a $1 billion discount after the first breach was announced.To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:41:55+00:00 http://www.networkworld.com/article/3172121/security/verizon-knocks-off-350m-from-yahoo-deal-after-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319506 False None Yahoo None Network World - Magazine Info 9 new hacks coming to get you largest denial-of-service attacks the world has ever seen, not to mention allowing strangers to spy on the very people the cameras are supposed to protect.To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:22:00+00:00 http://www.networkworld.com/article/3172401/security/9-new-hacks-coming-to-get-you.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319507 False None None None Network World - Magazine Info Understanding the attack surface to better allocate funds To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:19:00+00:00 http://www.networkworld.com/article/3172525/techology-business/understanding-the-attack-surface-to-better-allocate-funds.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319508 False None None None Network World - Magazine Info 5 open source security tools too good to ignore To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:12:00+00:00 http://www.networkworld.com/article/3172398/security/5-open-source-security-tools-too-good-to-ignore.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319490 False Guideline None None Network World - Magazine Info Why you need a bug bounty program handling security vulnerability reports, but some organizations take a much more proactive approach to dealing with security researchers.An increasing number of hardware and software vendors have formal bug bounty programs. Google, for example, runs its own vulnerability rewards program, and Microsoft has multiple bug bounties covering Office 365, Azure, .NET and Edge as general programs covering exploits and defenses.To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:08:00+00:00 http://www.networkworld.com/article/3172361/security/why-you-need-a-bug-bounty-program.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319510 False None None None Network World - Magazine Info Would killing Bitcoin end ransomware? Absolute.To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:04:00+00:00 http://www.networkworld.com/article/3172479/security/would-killing-bitcoin-end-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319511 False None None None Network World - Magazine Info 8 steps to regaining control over shadow IT Image by Pexels“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise. Gartner predicts that by 2020, one-third of security breaches will come in through shadow IT services.To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:03:00+00:00 http://www.networkworld.com/article/3172477/security/8-steps-to-regaining-control-over-shadow-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319512 False None None None Network World - Magazine Info Iraqi hacker took credit for hijacking subdomain and defacing Trump site screenshot of the defacement was posted on the subreddit Hacking. The page displayed an anonymous man in a fedora above the message: Hacked By Pro_Mast3r ~Attacker GovNothing Is ImpossiblePeace From Iraq defacement of trump site g33xter Ars Technica reported the server was “behind Cloudflare's content management and security platform, and does not appear to be directly linked from the Trump Pence campaign's home page. But it does appear to be an actual Trump campaign server.”To read this article in full or to leave a comment, please click here]]> 2017-02-20T09:15:00+00:00 http://www.networkworld.com/article/3171732/security/iraqi-hacker-took-credit-for-hijacking-subdomain-and-defacing-trump-site.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=318633 False None None None Network World - Magazine Info Hackers behind bank attack campaign use Russian as decoy an attack campaign that has targeted 104 organizations -- most of them banks -- from 31 different countries.They found multiple commands and strings in the malware that appear to have been translated into Russian using online tools, the results making little sense to a native Russian speaker.To read this article in full or to leave a comment, please click here]]> 2017-02-20T07:00:37+00:00 http://www.networkworld.com/article/3171775/security/hackers-behind-bank-attack-campaign-use-russian-as-decoy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=318634 False None None None Network World - Magazine Info 12 steps to small business security Image by ThinkstockIf you're a small to midsized business and you wing it when it comes to network management and security then it's not a question of if you will have a disaster, it's merely a question of when. Why? Because malware, accidents and disasters are all waiting in the wings to pop out and make your life hell and cost you lots of money. Now I won't lie to you, getting insulated from the bad stuff isn't cheap, but if you think security and reliability is expensive, try fixing a disaster. Here are 12 steps that will, in the long run, make your business safer. Think you've got this covered? How many have you got in place?To read this article in full or to leave a comment, please click here]]> 2017-02-20T04:18:00+00:00 http://www.networkworld.com/article/3171657/security/12-steps-to-small-business-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=318374 False None None None Network World - Magazine Info New products of the week 2.20.17 Image by RiverbedOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ambra for DevelopersambraImage by ambraTo read this article in full or to leave a comment, please click here]]> 2017-02-20T03:06:00+00:00 http://www.networkworld.com/article/3171372/cloud-computing/new-products-of-the-week-2-20-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=318375 True None None None Network World - Magazine Info F-bombing cop recorded threatening to sic dog on driver to rip him up To read this article in full or to leave a comment, please click here]]> 2017-02-19T08:39:00+00:00 http://www.networkworld.com/article/3171772/security/f-bombing-cop-recorded-threatening-to-sic-dog-on-driver-to-rip-him-up.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317652 False None None None Network World - Magazine Info Users take the cheese to solve data breaches Verizon's recently released annual breach report, which examines some of the cases where the RISK Team was called in to hunt down culprits. The “ride–along edition” of Verizon's report provides a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed, who defaced a website or where a leak is coming from. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here]]> 2017-02-17T17:00:00+00:00 http://www.networkworld.com/article/3171784/security/users-take-the-cheese-to-solve-data-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317653 True None None None Network World - Magazine Info Ride along to solve these data breaches Image by Daimler AGVerizon's recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon's report gets a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed or where a leak is. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here]]> 2017-02-17T16:59:00+00:00 http://www.networkworld.com/article/3171692/security/ride-along-to-solve-these-data-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317654 False None None None Network World - Magazine Info RSA demo: TruStar anonymizes incident data to improve information exchange 2017-02-17T15:50:00+00:00 http://www.networkworld.com/video/74457/rsa-demo-trustar-anonymizes-incident-data-to-improve-information-exchange#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317667 False None None None Network World - Magazine Info Why cyber-robotics is key to cybersecurity\'s future 2017-02-17T15:46:00+00:00 http://www.networkworld.com/video/74437/why-cyber-robotics-is-key-to-cybersecuritys-future#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317668 False None None None Network World - Magazine Info Here\'s how the US government can bolster cybersecurity testified before U.S. Congress, warning it about the dangers of the internet.Unfortunately, the U.S. government is still struggling to act, he said. "You're just going to keep ending up with the status quo," he said, pointing to the U.S. government's failure to regulate the tech industry or incentivize any change.It's a feeling that was shared by the experts who attended this week's RSA cybersecurity show. Clearly, the U.S. government needs to do more on cybersecurity, but what?  Public and Private sector Perhaps, the need for U.S. action hasn't been more urgent. In last year's election, Russia was accused of hacking U.S. political groups and figures in an effort to influence the outcome.To read this article in full or to leave a comment, please click here]]> 2017-02-17T13:34:08+00:00 http://www.networkworld.com/article/3171616/security/heres-how-the-us-government-can-bolster-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317655 False None None None Network World - Magazine Info IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017 usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year. It should come as no surprise that the IRS saw a big spike in phishing and malware incidents during the 2016 tax season because the agency has been very public about its battle with this scourge. Just this month the IRS issued another warning about what it called a dangerous, evolving W-2 scams that are targeting corporations, school districts and other public and private concerns.To read this article in full or to leave a comment, please click here]]> 2017-02-17T11:09:00+00:00 http://www.networkworld.com/article/3171683/security/irs-dirty-dozen-phishing-phone-cons-and-identity-theft-lead-scam-list-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317670 False Guideline None None Network World - Magazine Info Insecure Android apps put connected cars at risk To read this article in full or to leave a comment, please click here]]> 2017-02-17T08:33:28+00:00 http://www.networkworld.com/article/3170991/security/insecure-android-apps-put-connected-cars-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317671 False None None None Network World - Magazine Info CyberTech conference showcases cybersecurity solutions originating in Israel   here to subscribe.  Mention “cybersecurity conference” and most people think of the annual RSA Conference, which was held last week. But halfway around the world, the annual CyberTech Tel Aviv event is building momentum as one of the largest gatherings of cybersecurity professionals in the world. This year, more than 10,000 people representing 67 countries amassed in Tel Aviv, and I had the privilege of being one of them.Israel is making a name for itself, and that name is Cyber Nation. A 2011 government resolution created the National Cyber Bureau as an advising body for the Prime Minister. The bureau's main mission is to bolster Israel's national cybersecurity defenses, but a secondary mission is to promote research and development in the cyber field and encourage the commercial cyber industry in Israel.To read this article in full or to leave a comment, please click here]]> 2017-02-17T07:11:00+00:00 http://www.networkworld.com/article/3171668/security/cybertech-conference-showcases-cybersecurity-solutions-originating-in-israel.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317672 False None None None Network World - Magazine Info RSA: Eric Schmidt shares deep learning on AI Google CEO Sundar Pichai said AI is what helps the search giant build better products over time. "We will move from a mobile-first to an AI-first world,” he said.To read this article in full or to leave a comment, please click here]]> 2017-02-17T04:42:00+00:00 http://www.networkworld.com/article/3170795/security/rsa-eric-schmidt-shares-deep-learning-on-ai.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317355 False None None None Network World - Magazine Info The high price of security shaming [Infographic] Bitdefender survey of 250 IT security professionals. What's more, “some 14 percent would pay more than $500k.” If you think that's a high price to pay, consider this: 34 percent of companies were breached in the past 12 months, according to the report, and “74 percent of IT decision makers don't know how the company was breached.” Among the survey's other notable findings is that while 64 percent of respondents said they think their current security budget is sufficient, they also admitted that “only 64 percent of cyberattacks can be stopped, detected or prevented with the current resources.”To read this article in full or to leave a comment, please click here]]> 2017-02-17T04:42:00+00:00 http://www.networkworld.com/article/3171489/security/the-high-price-of-security-shaming-infographic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317354 False None None None Network World - Magazine Info Experts at RSA give their best cybersecurity advice two-factor authentication to protect their internet accounts, especially email. It can be particularly useful when stopping hackers who are trying to steal login passwords from users, whether through malware or email phishing schemes.To read this article in full or to leave a comment, please click here]]> 2017-02-16T16:34:19+00:00 http://www.networkworld.com/article/3171276/security/experts-at-rsa-give-their-best-cybersecurity-advice.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316833 False None None None Network World - Magazine Info Why (or where) many security programs fail 2017-02-16T13:36:00+00:00 http://www.networkworld.com/video/74358/why-or-where-many-security-programs-fail#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316846 False None None None Network World - Magazine Info Israeli soldiers hit in cyberespionage campaign using Android malware To read this article in full or to leave a comment, please click here]]> 2017-02-16T12:45:33+00:00 http://www.networkworld.com/article/3171266/security/israeli-soldiers-hit-in-cyberespionage-campaign-using-android-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316834 False None None None Network World - Magazine Info SD-WANs get IPv6 support from Versa WAN and security packages.According to Kumar Mehta, founder and CDO of Versa Networks by supporting IPv4 and IPv6 for SD-WAN and SD-Security, customers will have the flexibility to design their WAN under IPv4 today and protect it from obsolescence as they switch over to IPv6 in the future.To read this article in full or to leave a comment, please click here]]> 2017-02-16T12:37:00+00:00 http://www.networkworld.com/article/3171265/lan-wan/sd-wans-get-ipv6-support-from-versa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316835 False None None None Network World - Magazine Info How the Cyber Threat Alliance works to fight cybercrime 2017-02-16T11:29:00+00:00 http://www.networkworld.com/video/74456/how-the-cyber-threat-alliance-works-to-fight-cybercrime#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316849 False None None None Network World - Magazine Info How blockchain can help drive cybersecurity 2017-02-16T11:03:00+00:00 http://www.networkworld.com/video/74455/how-blockchain-can-help-drive-cybersecurity#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316850 False None None None Network World - Magazine Info Microsoft\'s monthlong delay of patches may pose risks had to be delayed because of a "last minute issue" that could have had an impact on customers. The company did not initially specify for how long the patches will be postponed, which likely threw a wrench in some systems administrators' patch deployment plans.To read this article in full or to leave a comment, please click here]]> 2017-02-16T08:55:00+00:00 http://www.networkworld.com/article/3171087/security/microsofts-monthlong-delay-of-patches-may-pose-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316851 False None None None Network World - Magazine Info Tech groups gear up for FISA surveillance fight Section 702 of the Foreign Intelligence Surveillance Act expires on Dec. 31, and Congress almost certain to extend it in some form. The tech trade groups, including BSA, the Consumer Technology Association, and the Computer and Communications Industry Association, are asking lawmakers to build in new privacy protections for internet users. "It is critical that Congress takes a balanced yet focused approach with respect to Section 702," the groups said in a letter sent to top lawmakers Wednesday. "We urge your committees to ensure that any reauthorization includes meaningful safeguards for internet users' privacy and civil liberties."To read this article in full or to leave a comment, please click here]]> 2017-02-16T07:36:04+00:00 http://www.networkworld.com/article/3170941/security/tech-groups-gear-up-for-fisa-surveillance-fight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316852 False None None None Network World - Magazine Info IT leaders say it\'s hard to keep the cloud safe Intel cloud security report that surveyed 2,000 IT professionals in different countries and industries last fall.The issue isn't with the cloud itself, since trust outnumbers distrust for public clouds by more than two to one, according to Intel's survey.IT professionals told Intel that shadow IT and a shortage of cybersecurity skills are causing the most problems.To read this article in full or to leave a comment, please click here]]> 2017-02-16T05:26:00+00:00 http://www.networkworld.com/article/3170988/cloud-security/it-leaders-say-its-hard-to-keep-the-cloud-safe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316482 False Guideline None None Network World - Magazine Info The 7 security threats to technology that scare experts the most Hot products at RSA 2017 +Some of these threats target consumers directly, but even the ones that target corporations could eventually “filter down” to consumers, though the effects might not be felt for some time.To read this article in full or to leave a comment, please click here]]> 2017-02-16T05:24:00+00:00 http://www.networkworld.com/article/3170836/security/what-happens-if-your-thermostat-is-hacked-researchers-name-the-top-7-security-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316483 False None None None Network World - Magazine Info Should security pros get special H-1B visa consideration? To read this article in full or to leave a comment, please click here]]> 2017-02-16T05:14:00+00:00 http://www.networkworld.com/article/3170813/careers/should-security-pros-get-special-h-1b-visa-consideration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316484 False None None None Network World - Magazine Info 7 ways MDM threatens employee privacy Image by PexelsFor years, organizations have turned to Mobile Device Management (MDM) solutions with the hope of wrapping their arms around BYOD. MDM is a technology that enables organizations to control every aspect of a mobile device, from permitted apps to outbound communications. But with that complete control comes the potential for abuse.To read this article in full or to leave a comment, please click here]]> 2017-02-16T05:12:00+00:00 http://www.networkworld.com/article/3170882/mobile-security/7-ways-mdm-threatens-employee-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316485 False None None None Network World - Magazine Info Tips for negotiating with cyber extortionists To read this article in full or to leave a comment, please click here]]> 2017-02-16T05:07:00+00:00 http://www.networkworld.com/article/3170880/security/tips-for-negotiating-with-cyber-extortionists.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316498 False None None None Network World - Magazine Info The Challenges of Identity in the Cloud 2017-02-16T00:00:00+00:00 http://www.networkworld.com/video/74435/the-challenges-of-identity-in-the-cloud#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316858 False None None None Network World - Magazine Info What is Cyber Deception? 2017-02-16T00:00:00+00:00 http://www.networkworld.com/video/74357/what-is-cyber-deception#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316859 False None None None Network World - Magazine Info US legislation revived to curb warrantless geolocation tracking Geolocation Privacy and Surveillance Act, aims to create clear rules for when law enforcement agencies can acquire an individual's geolocation information, generated from electronic devices like smartphones, GPS units and Wi-Fi equipped laptops.To read this article in full or to leave a comment, please click here]]> 2017-02-15T23:38:13+00:00 http://www.networkworld.com/article/3170889/security/us-legislation-revived-to-curb-warrantless-geolocation-tracking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316196 False None None None Network World - Magazine Info A.I. faces hype, skepticism at RSA cybersecurity show To read this article in full or to leave a comment, please click here]]> 2017-02-15T14:51:20+00:00 http://www.networkworld.com/article/3170866/security/ai-faces-hype-skepticism-at-rsa-cybersecurity-show.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315417 False None None None Network World - Magazine Info Bruce Schneier: Public-service technologists are needed to tame the IoT RSA: Watch out for a new weapon - your own data | Hot products at RSA 2017 +The problem is governments lack the technological expertise to understand the mindset of the makers of IoT devices and the markets in which they are sold.To read this article in full or to leave a comment, please click here]]> 2017-02-15T14:37:00+00:00 http://www.networkworld.com/article/3170825/security/bruce-schneier-public-service-technologists-are-needed-to-tame-the-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315418 False None None None Network World - Magazine Info Sophos CEO sounds the alarm on enterprise ransomware attacks admitted to paying $17,000 to get its system unlocked, and a report in October said ransomware cases were on course to quadruple in 2016 over the previous year.To read this article in full or to leave a comment, please click here]]> 2017-02-15T11:53:55+00:00 http://www.networkworld.com/article/3170765/malware/sophos-ceo-sounds-the-alarm-on-enterprise-ransomware-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315419 False Guideline None None Network World - Magazine Info IDG Contributor Network: 3 new information security jobs for the digital enterprise To read this article in full or to leave a comment, please click here]]> 2017-02-15T11:46:00+00:00 http://www.networkworld.com/article/3170136/careers/3-new-information-security-jobs-for-the-digital-enterprise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315420 False Guideline None None Network World - Magazine Info How Google reinvented security and eliminated the need for firewalls To read this article in full or to leave a comment, please click here]]> 2017-02-15T10:48:00+00:00 http://www.networkworld.com/article/3170687/security/how-google-reinvented-security-and-eliminated-the-need-for-firewalls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315433 False None None None Network World - Magazine Info Yahoo warns users of account breaches related to recent attacks seeking a discount of US$250 million because of the data breaches.To read this article in full or to leave a comment, please click here]]> 2017-02-15T10:46:38+00:00 http://www.networkworld.com/article/3170688/security/yahoo-warns-users-of-account-breaches-related-to-recent-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315434 False None Yahoo None Network World - Magazine Info India blasts 104 satellites into orbit aboard one rocket said today it had launched 104 satellites from a single rocket, crushing the previous record of 37 satellites from a single rocket by the Russian space agency in 2014.The rocket – India's Polar Satellite Launch Vehicle (PSLV), also known as Cartosat-2 –is a four-stage rocket that India has used for a variety of missions since 1993. This was its 39th flight.+More on Network World: Small satellites bring “Moore's Law” into space+To read this article in full or to leave a comment, please click here]]> 2017-02-15T10:25:00+00:00 http://www.networkworld.com/article/3170726/security/india-blasts-104-satellites-into-orbit-aboard-one-rocket.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315435 False None None None Network World - Magazine Info JavaScript-based ASLR bypass attack simplifies browser exploits unveiled the attack, dubbed AnC, Wednesday after having coordinated its disclosure with processor, browser and OS vendors since October.ASLR is a feature present in all major operating systems. Applications, including browsers, take advantage of it to make the exploitation of memory corruption vulnerabilities like buffer overflows more difficult.To read this article in full or to leave a comment, please click here]]> 2017-02-15T09:45:17+00:00 http://www.networkworld.com/article/3170579/security/javascript-based-aslr-bypass-attack-simplifies-browser-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315436 False None None None Network World - Magazine Info RSA: Elite cryptographers scoff at idea that law enforcement can \'overcome\' encryption To read this article in full or to leave a comment, please click here]]> 2017-02-15T09:08:00+00:00 http://www.networkworld.com/article/3170103/security/rsa-elite-cryptographers-scoff-at-idea-that-law-enforcement-can-overcome-encryption.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315437 False None None None Network World - Magazine Info In and Around the 2017 RSA Conference blog about my expectations for endpoint security at RSA.  I followed up with another ditty about network security banter at this year's show and concluded the series with a blog about security analytics and operations talk at RSA. To read this article in full or to leave a comment, please click here]]> 2017-02-15T08:31:00+00:00 http://www.networkworld.com/article/3170575/security/in-and-around-the-2017-rsa-conference.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315438 False None None None Network World - Magazine Info NSS Labs rated 13 advanced endpoint security products, flagged 2 with caution rating To read this article in full or to leave a comment, please click here]]> 2017-02-15T08:10:00+00:00 http://www.networkworld.com/article/3170114/security/nss-labs-rated-13-advanced-endpoint-security-products-flagged-2-with-caution-rating.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315439 False None None None Network World - Magazine Info Researchers trick \'CEO\' email scammer into giving up identity To read this article in full or to leave a comment, please click here]]> 2017-02-15T08:00:00+00:00 http://www.networkworld.com/article/3170624/security/researchers-trick-ceo-email-scammer-into-giving-up-identity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315440 False None None None Network World - Magazine Info RSA: Watch out for a new weapon - your own data disrupt the 2016 presidential election, for example, and the consequences of similar manipulations could be high for businesses whose big-data analysis is undermined by altered small data that makes it up. With inaccurate input to draw on, the outcomes will be faulty, he says.To read this article in full or to leave a comment, please click here]]> 2017-02-15T06:20:00+00:00 http://www.networkworld.com/article/3170566/security/rsa-watch-out-for-a-new-weapon-your-own-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315441 False None None None Network World - Magazine Info Review: Samsung SmartCam PT network camera highly publicized DDoS attack on Dyn highlighted insecure cameras being used as part of a botnet; vulnerabilities were also found in Chinese-based security cameras and at least one Samsung SmartCam product. In the U.S., the FTC filed a complaint against D-Link over claims that their webcams were “secure”.To read this article in full or to leave a comment, please click here]]> 2017-02-15T06:00:00+00:00 http://www.networkworld.com/article/3170165/consumer-electronics/review-samsung-smartcam-pt-network-camera.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315421 False None None None Network World - Magazine Info Too many victims say yes to ransomware ransomware, don't pay!That has been the mantra of the FBI for several years now – one that was forcefully echoed by one of the nation's highest-profile security bloggers – Brian Krebs – in a recent post.But based on the statistics, either a lot of people aren't listening, or it's a bit more complicated than that. The reality is that the success of ransomware isn't just increasing. It's exploding.To read this article in full or to leave a comment, please click here]]> 2017-02-15T05:07:00+00:00 http://www.networkworld.com/article/3170467/security/to-pay-or-not-to-pay-too-many-victims-say-yes-to-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315071 False None None None Network World - Magazine Info Report: some small cities have surprisingly high number of exposed devices Trend Micro.Houston, for example, had 3,900,208 exposed devices, compared with 1,031,325 in New York City, even though New York has nearly four times as many people.But many of the cities with the highest numbers of exposed devices were even smaller. Sometimes, much, much smaller.To read this article in full or to leave a comment, please click here]]> 2017-02-15T05:03:00+00:00 http://www.networkworld.com/article/3170096/network-security/report-some-small-cities-have-surprisingly-high-number-of-exposed-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315072 False None None None Network World - Magazine Info 6 Internet of Things companies to watch companies transforming their businesses via the Internet of Things rather than just tracking the latest IoT vendor announcements. But after taking a spin through our ongoing and interactive startup funding timeline, we figured it was a good time to round up some of the latest startups to rein in venture capital for their IoT-related businesses. To read this article in full or to leave a comment, please click here]]> 2017-02-15T04:15:00+00:00 http://www.networkworld.com/article/3168791/internet-of-things/6-internet-of-things-companies-to-watch.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315073 False None None None Network World - Magazine Info New Chinese Cybersecurity Threats 2017-02-15T00:00:00+00:00 http://www.networkworld.com/video/74315/new-chinese-cybersecurity-threats#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315447 False None None None Network World - Magazine Info The Future of Passwords and Authentication 2017-02-15T00:00:00+00:00 http://www.networkworld.com/video/74335/the-future-of-passwords-and-authentication#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315446 False None None None Network World - Magazine Info Doubts abound over US action on cybersecurity influence last year's election. Clearly, the government should be doing more on cybersecurity, said U.S. lawmakers and officials at the show, but they admit that politics and policy conflicts have hampered the government's approach.  “I wish the federal government could do this, but it's very hard, unfortunately, due to partisan politics,” said Virginia State Governor Terry McAuliffe, during a speech at the show. “They haven't been able to take the lead on this issue as they should have.”To read this article in full or to leave a comment, please click here]]> 2017-02-14T20:17:03+00:00 http://www.networkworld.com/article/3170188/security/doubts-abound-over-us-action-on-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313869 False Guideline None None Network World - Magazine Info Microsoft shelves all February security updates post to the MSRC (Microsoft Security Research Center) blog. "After considering all options, we made the decision to delay this month's updates."Today was set as Patch Tuesday, the monthly release of security fixes from Microsoft. Normally, Microsoft issues the updates around 10 a.m. PT (1 p.m. ET). Although Microsoft did not time stamp its blog post, the SAN Institute's Internet Storm Center (ISC) pointed out the delay at 8:22 a.m. PT (11:22 ET).To read this article in full or to leave a comment, please click here]]> 2017-02-14T13:07:00+00:00 http://www.networkworld.com/article/3170145/computers/microsoft-shelves-all-february-security-updates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313870 False None None None Network World - Magazine Info Christian Slater wants you to check your printer security Mr. Robot", so fans of that show might like watching him in this short film, sponsored/created by HP. The film, titled "The Wolf", showcases the security vulnerabilities found at companies through the connected office printer.It's certainly a clever way to get people to think about printer security, especially as more of them become connected not only to the office network, but the Internet. Plus, Slater is really good here.Enjoy! To read this article in full or to leave a comment, please click here]]> 2017-02-14T10:55:00+00:00 http://www.networkworld.com/article/3169938/security/christian-slater-wants-you-to-check-your-printer-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313871 False None None None Network World - Magazine Info Microsoft says tech companies need to protect and not to help attack customers announced by MSRC: Our top priority is to provide the best possible experience for customers in maintaining and protecting their systems. This month, we discovered a last minute issue that could impact some customers and was not resolved in time for our planned updates today.To read this article in full or to leave a comment, please click here]]> 2017-02-14T10:50:00+00:00 http://www.networkworld.com/article/3169911/security/microsoft-says-tech-companies-need-to-protect-and-not-to-help-attack-customers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313872 False None None None Network World - Magazine Info Russian cyberspies blamed for US election hacks are now targeting Macs To read this article in full or to leave a comment, please click here]]> 2017-02-14T10:09:15+00:00 http://www.networkworld.com/article/3169930/security/russian-cyberspies-blamed-for-us-election-hacks-are-now-targeting-macs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313885 False None APT 28 None Network World - Magazine Info Microsoft\'s president wants a Geneva Convention for cyberwar said in a blog post. The manifesto, published alongside his keynote address at the RSA conference in San Francisco on Tuesday, argued for codifying recent international norms around cyberwarfare and for establishing an independent agency to respond to and analyze cyberattacks.To read this article in full or to leave a comment, please click here]]> 2017-02-14T08:30:00+00:00 http://www.networkworld.com/article/3169846/security/microsofts-president-wants-a-geneva-convention-for-cyberwar.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313886 False None None None Network World - Magazine Info Avaya Surge protects the Internet of Things The Internet of Things security threat + Healthcare has rapidly been connecting patient devices, retailers are making point-of-sale systems “smart,” hotels are looking to improve the guest experience, and sports and entertainment venues are connecting more devices. While these verticals may seem different, the commonality of IoT initiatives is that when everything is connected, you can change the way the business interacts with customers, students, patients, patrons, employees or other constituents that interact with the organization. To read this article in full or to leave a comment, please click here]]> 2017-02-14T07:26:00+00:00 http://www.networkworld.com/article/3169680/security/avaya-surge-protects-the-internet-of-things.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313887 False None None None Network World - Magazine Info IBM\'s Watson teams up with its SIEM platform for smarter, faster event detection To read this article in full or to leave a comment, please click here]]> 2017-02-14T06:36:00+00:00 http://www.networkworld.com/article/3169884/security/ibm-s-watson-teams-up-with-its-siem-platform-for-smarter-faster-event-detection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313888 False None None None Network World - Magazine Info Forget the network perimeter, say security vendors To read this article in full or to leave a comment, please click here]]> 2017-02-14T06:27:32+00:00 http://www.networkworld.com/article/3169560/security/forget-the-network-perimeter-say-security-vendors.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313889 False None None None Network World - Magazine Info Microsoft outlines new Office 365 security capabilities outlined in a recent blog post. Office 365 also needs these security measures because it is cloud based. That means its users are connecting outside their firewall, which adds all kinds of risk, both from intrusion and accidental data loss. There are three new security features: Office 365 Secure Score, Office 365 Threat Intelligence Private Preview, and Office 365 Advanced Data Governance Preview. To read this article in full or to leave a comment, please click here]]> 2017-02-14T06:12:00+00:00 http://www.networkworld.com/article/3169559/security/microsoft-outlines-new-office-365-security-capabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313890 False None None None Network World - Magazine Info Rise of as-a-service lowers bar for cybercriminals lowered the bar for entry into the criminal market. Hackers no longer need to have sophisticated skills in order to gain entry into the world of cybercrime.According to Geoff Webb, vice president of strategy at Micro Focus, the industrialization of the processes and the availability of the tools has created this expanded forum that allows non-technical people, anyone really, to enter into the digital crime market. To read this article in full or to leave a comment, please click here]]> 2017-02-14T05:33:00+00:00 http://www.networkworld.com/article/3169691/security/rise-of-as-a-service-lowers-bar-for-cybercriminals.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313605 False None None None Network World - Magazine Info Heartbreaking hacks Image by ThinkstockValentine's Day is historically about love, flowers and chocolate. Unless you're a hacker, then it's about worms, vulnerabilities, data theft and more. Preying on our need for love and affection, hackers have historically unleashed some hard-hitting attacks around Valentine's Day, or in relation to the topic of love. So, before you open that Valentine's Day email or click through to that online dating site, WatchGuard's Marc Laliberte runs you through some of the most nefarious love-related cyber-attacks.To read this article in full or to leave a comment, please click here]]> 2017-02-14T05:32:00+00:00 http://www.networkworld.com/article/3169543/security/heartbreaking-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313606 False None None None Network World - Magazine Info Hot products at RSA 2017 Image by Web SummitRSA, the world's largest security conference, is underway this week in San Francisco with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks. They'll also be able to view the latest hardware and software to protect their most valuable corporate assets. Here is a brief description of some new security products being announced at the conference.To read this article in full or to leave a comment, please click here]]> 2017-02-14T02:44:00+00:00 http://www.networkworld.com/article/3168917/security/hot-products-at-rsa-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313607 False None None None Network World - Magazine Info Cybersecurity alliance promoting intel-sharing seeks to expand Cyber Threat Alliance, a group of security firms that often compete, says its efforts to share intelligence on the latest hacking threats have been paying off. Rivals including Fortinet, Intel Security, Palo Alto Networks and Symantec originally entered into the alliance over two years ago, even as doubts arose over whether it'd last.To read this article in full or to leave a comment, please click here]]> 2017-02-14T00:59:35+00:00 http://www.networkworld.com/article/3169534/security/cybersecurity-alliance-promoting-intel-sharing-seeks-to-expand.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313326 False None None None Network World - Magazine Info The Cybersecurity Canon 2017-02-14T00:00:00+00:00 http://www.networkworld.com/video/74235/the-cybersecurity-canon#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313895 False None None None Network World - Magazine Info Cybersecurity and the Cloud in 2017 2017-02-14T00:00:00+00:00 http://www.networkworld.com/video/74215/cybersecurity-and-the-cloud-in-2017#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313896 False None None None Network World - Magazine Info Worried about hacks, senators want info on Trump\'s personal phone wrote in the letter, which was made public Monday.To read this article in full or to leave a comment, please click here]]> 2017-02-13T23:54:02+00:00 http://www.networkworld.com/article/3169576/security/worried-about-hacks-senators-want-info-on-trumps-personal-phone.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313327 False None None None Network World - Magazine Info Researcher develops ransomware attack that targets water supply ransomware, a form of malware that can hold data hostage in exchange for bitcoin.To read this article in full or to leave a comment, please click here]]> 2017-02-13T18:27:48+00:00 http://www.networkworld.com/article/3169568/security/researcher-develops-ransomware-attack-that-targets-water-supply.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312505 False None None None Network World - Magazine Info Experts worried about ransomware hitting critical infrastructure one estimate.To read this article in full or to leave a comment, please click here]]> 2017-02-13T13:14:00+00:00 http://www.networkworld.com/article/3169465/security/experts-worried-about-ransomware-hitting-critical-infrastructure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312506 False None None None Network World - Magazine Info IDG Contributor Network: Hackers show no mercy-even for pot dispensaries hack attack on a pot dispensary last month set that notion up in smoke.MJ Freeway, providers of popular medical marijuana tracking software, suffered a point-of-sale system hack that left over 1,000 marijuana dispensaries across 23 states unable to track their sales and inventories. Because of the state regulations regarding the sale of marijuana, some dispensaries were forced to close early or shut their doors completely. The disruption lasted weeks and caused patients to suffer long delays with obtaining access to their medicine.To read this article in full or to leave a comment, please click here]]> 2017-02-13T11:59:00+00:00 http://www.networkworld.com/article/3169374/malware-cybercrime/hackers-show-no-mercyeven-for-pot-dispensaries.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312507 False None None None Network World - Magazine Info Cisco, competitors infiltrate Avaya customer doubts wrote: “Let's not dance around it. Avaya's recent announcements have put a lot of people into the decision process. Change and uncertainty usually do. So then, what to do next? I'm not bold enough to say, 'Hey, come on over and write me a check right now.' That's not how this works. It's not an overnight decision. You have to figure out who you trust with your unified communications and customer care solutions. And to get there means asking a lot of questions – and getting the answers you need.”To read this article in full or to leave a comment, please click here]]> 2017-02-13T11:31:00+00:00 http://www.networkworld.com/article/3169418/lan-wan/cisco-competitors-infiltrate-avaya-customer-doubts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312508 False None None None Network World - Magazine Info Recent malware attacks on Polish banks tied to wider hacking campaign the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering hole attacks. They then injected code into them that redirected visitors to a custom exploit kit.To read this article in full or to leave a comment, please click here]]> 2017-02-13T09:11:13+00:00 http://www.networkworld.com/article/3169409/security/recent-malware-attacks-on-polish-banks-tied-to-wider-hacking-campaign.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312521 False None APT 38 None Network World - Magazine Info Most Americans with knowledge of employer\'s cybersecurity wouldn\'t want to be a customer Kaspersky Lab and HackerOne released the report, “Hacking America: Cybersecurity Perception.” Some of its revelations include that most Americans wouldn't want to be a customer of their employers since they don't trust their employers to protect their personal data; also, almost half the people surveyed think America is more vulnerable to cyber-espionage/nation-sponsored cyberattacks with Donald Trump as president.The study, based on answers provided by 5,000 US adults who were surveyed in December 2016, revealed that despite all the cybersecurity news coverage, American consumers and businesses still need a better understanding of cyberthreats and how to protect their personal and sensitive business data online.To read this article in full or to leave a comment, please click here]]> 2017-02-13T09:07:00+00:00 http://www.networkworld.com/article/3168042/security/most-americans-with-knowledge-of-employers-cybersecurity-wouldnt-want-to-be-a-customer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312522 False None None None Network World - Magazine Info How to lock down your security system Image by ThinkstockAs long as data is online there will always be concerns over cyber security. There are many steps a business can take to help better protect their physical security systems from cyber threats. From simple things like not using default or simple passwords, to more advanced steps like using PKI certificates and making sure you download the latest firmware - each are important to keeping your data, and your network, secure.To read this article in full or to leave a comment, please click here]]> 2017-02-13T05:52:00+00:00 http://www.networkworld.com/article/3168943/security/how-to-lock-down-your-security-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312227 False None None None Network World - Magazine Info Windows 10 will soon have a very different security system Windows Defender Advanced Threat Protection (WDATP) last year specifically for enterprises, meant to help detect, investigate and respond to attacks on their networks. It was released with the Windows 10 Anniversary Update and is built on the existing security in Windows 10. WDATP offers a new post-breach layer of protection to the Windows 10 security stack, as well as a cloud service to help detect threats that have made it past other defenses and trace how far they penetrated into the enterprise. To read this article in full or to leave a comment, please click here]]> 2017-02-13T05:46:00+00:00 http://www.networkworld.com/article/3169287/windows/windows-10-will-soon-have-a-very-different-security-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312228 False None None None Network World - Magazine Info New products of the week 2.13.17 Image by ZenossOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.USM AnywherealienvaultImage by alienvaultTo read this article in full or to leave a comment, please click here]]> 2017-02-13T03:23:00+00:00 http://www.networkworld.com/article/3168708/cloud-computing/new-products-of-the-week-2-13-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312229 True None None None Network World - Magazine Info How San Diego fights off 500,000 cyberattacks a day the city of San Diego is $4 billion business. And cities don't shut down. They run 24/7,” he says. “My almost 27 years in DoD did not prepare me for how interesting city networks are."To read this article in full or to leave a comment, please click here]]> 2017-02-13T03:00:00+00:00 http://www.networkworld.com/article/3168056/security/how-san-diego-fights-off-500000-cyberattacks-a-day.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312230 False None None None Network World - Magazine Info Expert: Line between cyber crooks and cyber spies getting more blurry Morrison & Foerster John Carlin “I think this blending of criminal and national security, whether it's terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that's just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.To read this article in full or to leave a comment, please click here]]> 2017-02-13T02:12:00+00:00 http://www.networkworld.com/article/3168828/security/expert-line-between-cyber-crooks-and-cyber-spies-getting-more-blurry.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312008 False None None None Network World - Magazine Info Intel, McAfee dispute heads for settlement talks Intel's transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here]]> 2017-02-12T23:34:21+00:00 http://www.networkworld.com/article/3168857/security/intel-mcafee-dispute-heads-for-settlement-talks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=312009 False None None None Network World - Magazine Info University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university's own vending machines and other IoT devices to attack the university's network.Since the university's help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member's perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here]]> 2017-02-12T08:15:00+00:00 http://www.networkworld.com/article/3168763/security/university-attacked-by-its-own-vending-machines-smart-light-bulbs-and-5-000-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=311612 False None None None Network World - Magazine Info Privacy groups claim FBI hacking operation went too far wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI's hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.To read this article in full or to leave a comment, please click here]]> 2017-02-10T14:48:23+00:00 http://www.networkworld.com/article/3168906/security/privacy-groups-claim-fbi-hacking-operation-went-too-far.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=311613 False None None None Network World - Magazine Info TechDemocracy aims to provide a holistic assessment of cyber risk   here to subscribe.  Gartner estimates that global spending on cybersecurity solutions exceeded $81 billion in 2016. The average enterprise with 1,000 or more employees spends about $15 million fighting cybercrime each year, according to the Ponemon Institute. Despite such heavy investments in all types of solutions, many CISOs still find it challenging to answer the questions, “How likely are we to have a breach, and if we do incur a breach, what will be the financial impact?”The main obstacle to answering those fundamental questions is that much of the information needed to reveal an organization's state of cyber risk is trapped in product silos, and it's seldom fully mapped to the organization's compliance policies.To read this article in full or to leave a comment, please click here]]> 2017-02-10T10:33:00+00:00 http://www.networkworld.com/article/3168852/security/techdemocracy-aims-to-provide-a-holistic-assessment-of-cyber-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=311615 False None None None Network World - Magazine Info Microsoft unveils a bonanza of security capabilities To read this article in full or to leave a comment, please click here]]> 2017-02-10T10:00:01+00:00 http://www.networkworld.com/article/3168769/security/microsoft-unveils-a-bonanza-of-security-capabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=311628 False None None None Network World - Magazine Info Recent WordPress vulnerability used to deface 1.5 million pages until a week later, to allow enough time for a large number of users to deploy the update.To read this article in full or to leave a comment, please click here]]> 2017-02-10T09:23:39+00:00 http://www.networkworld.com/article/3168523/security/recent-wordpress-vulnerability-used-to-deface-1-5-million-pages.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=311629 False None None None