www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T01:15:28+00:00 www.secnews.physaphae.fr Network World - Magazine Info Are companies doing enough on the IoT security front? study by the Institute for Critical Infrastructure Technology (ICIT) - a cyber security think tank that acts as a conduit between private sector companies and U.S. federal agencies, points out how vulnerable enterprises are to attacks such as distributed denial of service (DDoS) via IoT.To read this article in full or to leave a comment, please click here]]> 2017-02-10T04:29:00+00:00 http://www.networkworld.com/article/3168507/internet-of-things/are-companies-doing-enough-on-the-iot-security-front.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=311320 False None None None Network World - Magazine Info Apple\'s iCloud saved deleted browser records, security company finds blog post. Users can set iCloud to store their browsing history so that it's available from all connected devices. The researchers found that when a user deletes that history, iCloud doesn't actually erase it but keeps it in a format invisible to the user.To read this article in full or to leave a comment, please click here]]> 2017-02-09T16:30:00+00:00 http://www.networkworld.com/article/3168457/security/apples-icloud-saved-deleted-browser-records-security-company-finds.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310299 False None None None Network World - Magazine Info Hospital devices left vulnerable, leave patients at risk To read this article in full or to leave a comment, please click here]]> 2017-02-09T14:02:00+00:00 http://www.networkworld.com/article/3168401/security/hospital-devices-left-vulnerable-leave-patients-vulnerable.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310300 False None None None Network World - Magazine Info \'Fileless malware\' attacks, used on banks, have been around for years recently discovered in the networks of at least 140 banks, telecoms and governments, account for about 15% of known attacks today and have been around for years in different forms."Fileless malware attacks are becoming much more common and circumvent most of the endpoint protection and detection tools deployed today," Gartner security analyst Avivah Litan said.A recent discovery of fileless malware was reported on Wednesday by researchers at Moscow-based Kaspersky Labs. The attackers have not been identified and "attribution [is] almost impossible," according to Kaspersky.To read this article in full or to leave a comment, please click here]]> 2017-02-09T14:00:00+00:00 http://www.networkworld.com/article/3168342/security/fileless-malware-attacks-used-at-banks-have-been-around-for-years.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310301 False None None None Network World - Magazine Info DARPA hits snag in GEO satellite service plan Robotic Servicing of Geosynchronous Satellites (RSGS) program that would enable cooperative inspection and servicing of satellites in geosynchronous orbit (GEO), more than 20,000 miles above the Earth, and demonstrate those technologies on orbit.+More on Network World: How to catch a 400lb drone traveling at full speed+To read this article in full or to leave a comment, please click here]]> 2017-02-09T12:42:00+00:00 http://www.networkworld.com/article/3168396/security/darpa-hits-snag-in-geo-satellite-service-plan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310302 False None None None Network World - Magazine Info Android privacy assistant seeks to stop unwanted data collection Privacy Assistant, comes from a team at Carnegie Mellon University, who've built it after six years of research studying digital privacy.  “It's very clear that a large percentage of people are not willing to give their data to any random app,” said CMU professor Norman Sadeh. “They want to be more selective with their data, so this assistant will help them do that.”To read this article in full or to leave a comment, please click here]]> 2017-02-09T12:14:31+00:00 http://www.networkworld.com/article/3168333/security/android-privacy-assistant-seeks-to-stop-unwanted-data-collection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310315 False None None None Network World - Magazine Info Microsoft lawsuit against indefinite gag orders can proceed sued last year to end the government's practice of indefinitely blocking it from informing customers of search warrants for their information. Microsoft alleged that such orders violate its First Amendment frees speech rights and the Fourth Amendment privacy rights of its users.The Justice Department argued that Microsoft couldn't bring either of the claims in a motion argued in front of the judge two weeks ago.To read this article in full or to leave a comment, please click here]]> 2017-02-09T12:08:48+00:00 http://www.networkworld.com/article/3168448/techology-business/microsoft-lawsuit-against-indefinite-gag-orders-can-proceed.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310316 False None None None Network World - Magazine Info IT and C-level leaders point fingers at each other over cyber defense To read this article in full or to leave a comment, please click here]]> 2017-02-09T11:18:00+00:00 http://www.networkworld.com/article/3168394/security/it-and-c-level-leaders-point-fingers-at-each-other-over-cyber-defense.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310317 False Guideline None None Network World - Magazine Info Windows Trojan hacks into embedded devices to install Mirai come across a Windows Trojan program that was designed to gain access to embedded devices using brute-force methods and to install the Mirai malware on them.Mirai is a malware program for Linux-based internet-of-things devices, such as routers, IP cameras, digital video recorders and others. It's used primarily to launch distributed denial-of-service (DDoS) attacks and spreads over Telnet by using factory device credentials.To read this article in full or to leave a comment, please click here]]> 2017-02-09T10:05:47+00:00 http://www.networkworld.com/article/3168348/security/windows-trojan-hacks-into-embedded-devices-to-install-mirai.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310318 False None None None Network World - Magazine Info As third RSA Conference without \'booth babes\' nears, no one seems to miss them made news by contractually insisting that vendors pitch their security wares without the help of “booth babes,” a first such ban for the technology industry.Next week's RSAC in San Francisco will be the third without the babes, so I checked in with event staff to see if the policy had evolved at all and how it has been accepted by various stake-holders.  Here's how the contract language read in 2015: All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of al staff they deploy at their booth (whether the exhibitor's direct employees or their contractors) be considered appropriate in a professional environment. Attire of an overly revealing or suggestive nature is not permitted. Examples of such attire may include but are not restricted to:To read this article in full or to leave a comment, please click here]]> 2017-02-09T09:03:00+00:00 http://www.networkworld.com/article/3168326/security/as-third-rsa-conference-without-booth-babes-nears-no-one-seems-to-miss-them.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310319 False None None None Network World - Magazine Info Cisco Umbrella cloud service shapes security for cloud, mobile resources huge IT challenge. In an attempt to address such anxieties Cisco today announced Umbrella, a secure, cloud-based gateway, based on technology from OpenDNS and other technologies it acquired such as CloudLock as well as existing Cisco security services that together ultimately promises to offer secure business access to resources even when users are not using the safety of a VPN.To read this article in full or to leave a comment, please click here]]> 2017-02-09T07:55:00+00:00 http://www.networkworld.com/article/3167837/security/cisco-umbrella-cloud-service-shapes-security-for-cloud-mobile-resources.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310320 False None None None Network World - Magazine Info Review: Arlo Pro cameras offer true flexibility for home security To read this article in full or to leave a comment, please click here]]> 2017-02-09T06:01:00+00:00 http://www.networkworld.com/article/3167422/consumer-electronics/review-arlo-pro-cameras-offer-true-flexibility-for-home-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310303 False None None None Network World - Magazine Info What cyberinsurance gotchas companies must be ready for Image by ThinkstockBusinesses shelled out $2 billion in cyber insurance premiums in 2015 but current projections show that astronomical growth rates will result in a market of over $20 billion by 2025. The single biggest challenge faced by insurance companies today is the lack of actuarial data on cyber attacks which makes pricing these cyber insurance policies very difficult. As a result, insurance companies are increasingly resorting to other methods to assist them in more accurately pricing these policies which is good news for them but which will result in a number of challenges for businesses.To read this article in full or to leave a comment, please click here]]> 2017-02-09T04:48:00+00:00 http://www.networkworld.com/article/3168047/security/what-cyberinsurance-gotchas-companies-must-be-ready-for.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310071 False None None None Network World - Magazine Info Can the FTC save the IoT? To read this article in full or to leave a comment, please click here]]> 2017-02-09T04:47:00+00:00 http://www.networkworld.com/article/3168046/internet-of-things/can-the-ftc-save-the-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310072 False None None None Network World - Magazine Info Zingbox launhces IoT protection for business Zingbox, a cloud-based, internet-of-things security startup, is coming out with its first product that it says can tell good IoT behavior from bad and sends alerts when it finds activity outside the norm.Called Guardian, the solution consists of a virtual appliance that gathers and processes network traffic data and sends it to the Zingbox cloud, where it is analyzed for anomalies. When they are found, it can send alerts to security staff or intervene automatically via integration with firewalls, says May Wang, a founder of the company and its CTO.To read this article in full or to leave a comment, please click here]]> 2017-02-08T21:01:00+00:00 http://www.networkworld.com/article/3168044/security/zingbox-launhces-iot-protection-for-business.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309142 False None None None Network World - Magazine Info US idea to collect travelers\' passwords alarms privacy experts hearing when he was asked what his department was doing to look at visa applicants' social media activity.He said it was “very hard to truly vet” the visa applicants from the seven Muslim-majority countries covered by the Trump administration's travel ban, which is now in legal limbo. Many of the countries are failed states with little internal infrastructure, he said.To read this article in full or to leave a comment, please click here]]> 2017-02-08T15:50:20+00:00 http://www.networkworld.com/article/3167924/security/us-idea-to-collect-travelers-passwords-alarms-privacy-experts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309143 False None None None Network World - Magazine Info AT&T, IBM, Nokia join to make IoT systems safer IoT Cybersecurity Alliance, formed Wednesday, also includes IBM, Symantec, Palo Alto Networks, and mobile security company Trustonic. The group said it won't set standards but will conduct research, educate consumers and businesses, and influence standards and policies.As IoT technologies take shape, there's a danger of new vulnerabilities being created in several areas. Consumer devices have been in the security spotlight thanks to incidents like the DDoS attacks last year that turned poorly secured set-top boxes and DVRs into botnets. But the potential weaknesses are much broader, spanning the network, cloud, and application layers, the new group said in a press release.To read this article in full or to leave a comment, please click here]]> 2017-02-08T12:44:19+00:00 http://www.networkworld.com/article/3167745/internet-of-things/att-ibm-nokia-join-to-make-iot-systems-safer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309144 False None None None Network World - Magazine Info Gartner: Algorithm-based technology patents are raging wrote that according to a worldwide search on analytics vendor Aulive, nearly 17,000 patents applied for in 2015 mentioned "algorithm" in the title or description, versus 570 in 2000. Including those mentioning "algorithm" anywhere in the document, there were more than 100,000 applications last year versus 28,000 five years ago.At this pace, and considering the rising interest in protecting algorithmic intellectual property, by 2020 there could be nearly half a million patent applications mentioning "algorithm," and more than 25,000 patent applications for algorithms themselves, Gartner stated. Of the top 40 organizations patenting the most algorithms the past five years, 33 are Chinese businesses and universities – IBM is the only western tech company on the list at No. 10.To read this article in full or to leave a comment, please click here]]> 2017-02-08T12:35:00+00:00 http://www.networkworld.com/article/3167242/security/gartner-algorithm-based-technology-patents-are-raging.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309145 False None None None Network World - Magazine Info NASA begins recovery after tornado hits Michoud Assembly Facility in New Orleans tornado struck NASA's Michoud Assembly Facility in New Orleans on Tuesday. About 3,500 employees were at the facility when a large tornado hit at 11:25 a.m. Fortunately, only five people suffered minor injuries. After the tornado, local law enforcement helped employees reach their homes, as NASA reported about 200 parked cars had been damaged.To read this article in full or to leave a comment, please click here]]> 2017-02-08T10:58:00+00:00 http://www.networkworld.com/article/3167255/security/nasa-begins-recovery-after-tornado-hits-michoud-assembly-facility-in-new-orleans.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309158 False None None None Network World - Magazine Info Accenture wants to help businesses secure their blockchains To read this article in full or to leave a comment, please click here]]> 2017-02-08T09:37:47+00:00 http://www.networkworld.com/article/3167534/security/accenture-wants-to-help-businesses-secure-their-blockchains.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309159 False None None None Network World - Magazine Info NASA has a shadow IT problem shadow IT operation but a recent audit of NASA's IT realm came up with 28 unsanctioned cloud services operating in its environment. NASA's own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG. +More on Network World: NASA's “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here]]> 2017-02-08T08:38:00+00:00 http://www.networkworld.com/article/3167609/security/nasa-has-a-shadow-it-problem.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309160 False Guideline None None Network World - Magazine Info Hard-to-detect fileless attacks target banks, other organizations To read this article in full or to leave a comment, please click here]]> 2017-02-08T08:13:12+00:00 http://www.networkworld.com/article/3167412/security/hard-to-detect-fileless-attacks-target-banks-other-organizations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309161 False None None None Network World - Magazine Info Open source users: It\'s time for extreme vetting essential certifications for smart security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] InfoWorld: Why is Red Hat getting on the soapbox about open source security?To read this article in full or to leave a comment, please click here]]> 2017-02-08T05:14:00+00:00 http://www.networkworld.com/article/3167272/linux/open-source-users-its-time-for-extreme-vetting.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308817 False None None None Network World - Magazine Info What company execs can learn from Trump\'s tweeting To read this article in full or to leave a comment, please click here]]> 2017-02-08T05:07:00+00:00 http://www.networkworld.com/article/3167271/social-networking/what-company-execs-can-learn-from-trumps-tweets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308818 False None None None Network World - Magazine Info Mac malware, possibly made in Iran, targets US defense industry report from Claudio Guarnieri and Collin Anderson, who are researching Iranian cyberespionage threats.The fake site was previously used in a spear phishing email attack to spread Windows malware and is believed to be maintained by Iranian hackers, the researchers claimed.To read this article in full or to leave a comment, please click here]]> 2017-02-07T12:30:00+00:00 http://www.networkworld.com/article/3166942/security/mac-malware-possibly-made-in-iran-targets-us-defense-industry.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308324 False None None None Network World - Magazine Info Study: 1 in 3 website visitors is an attack bot attack against DNS provider Dyn.That's among the key findings of Imperva's Bot Traffic Report 2016, which is based on analysis of over 16.7 billion visits to 100,000 randomly-selected domains on the Imperva content delivery network from August 9, 2016 to November 6, 2016.To read this article in full or to leave a comment, please click here]]> 2017-02-07T11:34:00+00:00 http://www.networkworld.com/article/3166934/security/study-1-in-3-website-visitors-is-an-attack-bot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308325 False None None None Network World - Magazine Info Polish banks on alert after mystery malware found on computers reported Friday.To read this article in full or to leave a comment, please click here]]> 2017-02-07T09:28:07+00:00 http://www.networkworld.com/article/3166452/security/polish-banks-on-alert-after-mystery-malware-found-on-computers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308326 False None None None Network World - Magazine Info Vizio to pay $2.2 million for spying on what customers watch without consent IPO. But Vizio has agreed to pay $2.2 million to settle charges by the FTC. The company collected data about what people were watching without their consent and then shared the data with advertisers and other companies.In the FTC's words, “The data generated when you watch television can reveal a lot about you and your household. So, before a company pulls up a chair next to you and starts taking careful notes on everything you watch (and then shares it with its partners), it should ask if that's OK with you. VIZIO wasn't doing that, and the FTC stepped in.”To read this article in full or to leave a comment, please click here]]> 2017-02-07T08:18:00+00:00 http://www.networkworld.com/article/3166373/security/vizio-to-pay-2-2-million-for-spying-on-what-customers-watch-without-consent.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308327 False None None None Network World - Magazine Info 7 musts for any successful BYOD program Image by PexelsToday, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.To read this article in full or to leave a comment, please click here]]> 2017-02-07T06:25:00+00:00 http://www.networkworld.com/article/3166535/mobile-security/7-musts-for-any-successful-byod-program.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308340 False None None None Network World - Magazine Info How to protect your privacy with a VPN on Android To read this article in full or to leave a comment, please click here]]> 2017-02-07T06:24:00+00:00 http://www.networkworld.com/article/3166445/android/how-to-protect-your-privacy-with-a-vpn-on-android.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308341 False None None None Network World - Magazine Info Criminals release fewer new types of malware last year, double down on ransomware a report released this morning by SonicWall."This is the first time I've seen that the number of unique malware samples actually decreased," said Dmitriy Ayrapetov, director of product management at SonicWall, which produced the report, based on data collections from more than a million sensors.To read this article in full or to leave a comment, please click here]]> 2017-02-07T06:15:00+00:00 http://www.networkworld.com/article/3166350/security/criminals-release-fewer-new-types-of-malware-last-year-double-down-on-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308342 False None None None Network World - Magazine Info Report: IRS-related phishing scams seen running rampant To read this article in full or to leave a comment, please click here]]> 2017-02-07T06:12:00+00:00 http://www.networkworld.com/article/3166590/security/report-irs-related-phishing-scams-seen-running-rampant.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=308343 False None None None Network World - Magazine Info IDG Contributor Network: ForeScout extends to offer AWS security visibility ForeScout is a security company that specializes in giving organizations agentless visibility and control of both traditional and IoT devices connected to the network. That's probably super-interesting if you're a IT security practitioner, but if you're not, you're probably stifling a yawn about now. But remember, if you will, that the first planned IPO of 2017 -- that of AppDynamics -- got canceled very much at the last minute when the company was acquired by Cisco. So given we're yet to see a 2017 IPO, and that ForeScout is rumored to have confidentially filed its documentation for an IPO recently, anything newsy from ForeScout's HQ gets a little more interesting.To read this article in full or to leave a comment, please click here]]> 2017-02-07T05:00:00+00:00 http://www.networkworld.com/article/3165415/security/forescout-extends-to-offer-aws-security-visibility.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307998 False None None None Network World - Magazine Info Dozens of iOS apps fail to secure users\' data, researcher says claimed in a Monday blog post.   TLS is used to secure an app's communication over an internet connection. Without it, a hacker can essentially eavesdrop over a network to spy on whatever data the app sends, such as login information.  To read this article in full or to leave a comment, please click here]]> 2017-02-06T17:46:08+00:00 http://www.networkworld.com/article/3166525/security/dozens-of-ios-apps-fail-to-secure-users-data-researcher-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307120 False None None None Network World - Magazine Info US House approves new privacy protections for email and the cloud Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months. The House approved the bill by voice vote, and it now goes the Senate for consideration.The Email Privacy Act would update a 31-year-old law called the Electronic Communications Privacy Act (ECPA). Some privacy advocates and tech companies have pushed Congress to update ECPA since 2011. Lax protections for stored data raise doubts about U.S. cloud services among consumers and enterprises, supporters of the bill say.To read this article in full or to leave a comment, please click here]]> 2017-02-06T15:30:47+00:00 http://www.networkworld.com/article/3166101/security/us-house-approves-new-privacy-protections-for-email-and-the-cloud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307121 False None None None Network World - Magazine Info The key functions to consider when building or buying a log analysis platform Confucius resonate with anyone who has ever tried to glean useful information from log data.There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.To read this article in full or to leave a comment, please click here]]> 2017-02-06T14:38:00+00:00 http://www.networkworld.com/article/3166258/security/the-key-functions-to-consider-when-building-or-buying-a-log-analysis-platform.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307122 False None None None Network World - Magazine Info IDG Contributor Network: Why managing trust is critical for digital transformation Digital disruption has demolished more than 50% of the Fortune 500 since 2000 Technology is creating new online-only companies-i.e., Kickstarter for funding, Sofi for lending and Venmo for payments. The digital disruption and, more important, its pace continues to disrupt long-established business models. Incumbents, not wanting to become another cautionary tale of digital disruption, are making radical changes to their businesses to focus on online and mobile channels.To read this article in full or to leave a comment, please click here]]> 2017-02-06T11:25:00+00:00 http://www.networkworld.com/article/3163462/internet/why-managing-trust-is-critical-for-digital-transformation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307123 False None None None Network World - Magazine Info RSA Conference 2017: Security analytics and operations endpoint security, while the second focused on network security. I am also in the middle of a big research project on security analytics and operations right now and believe that many independent technologies will be integrated into a comprehensive architecture that ESG calls SOAPA (i.e. security operations and analytics platform architecture).To read this article in full or to leave a comment, please click here]]> 2017-02-06T10:45:00+00:00 http://www.networkworld.com/article/3166204/security/security-analytics-and-operations-at-rsa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307136 False None None None Network World - Magazine Info Hacker takes out dark web hosting service using well-known exploit To read this article in full or to leave a comment, please click here]]> 2017-02-06T10:41:12+00:00 http://www.networkworld.com/article/3166132/security/hacker-takes-out-dark-web-hosting-service-using-well-known-exploit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307137 False None None None Network World - Magazine Info TV maker Vizio pays $2.2M to settle complaint that it spied on users said in a complaint, released Monday.Vizio smart TVs captured "second-by-second" information about video displayed, including video from consumer cable service, broadband, set-top boxes, DVDs, over-the-air broadcasts, and streaming devices, according to the complaint.To read this article in full or to leave a comment, please click here]]> 2017-02-06T09:38:00+00:00 http://www.networkworld.com/article/3166146/security/tv-maker-vizio-pays-22m-to-settle-complaint-that-it-spied-on-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307138 False None None None Network World - Magazine Info How to catch a 400lb drone traveling at full speed Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here]]> 2017-02-06T09:33:00+00:00 http://www.networkworld.com/article/3166107/security/darpa-how-to-catch-a-400lb-drone-traveling-at-full-speed.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307139 False None None None Network World - Magazine Info Malware distributors are switching to less suspicious file types warned about a new wave of spam emails that carried malicious .LNK files inside ZIP archives. Those files had malicious PowerShell scripts attached to them.PowerShell is a scripting language for automating Windows system administration tasks. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.To read this article in full or to leave a comment, please click here]]> 2017-02-06T09:26:44+00:00 http://www.networkworld.com/article/3165681/security/malware-distributors-are-switching-to-less-suspicious-file-types.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307140 False None None None Network World - Magazine Info RSA Conference: Carbon Black to introduce Streaming Prevention To read this article in full or to leave a comment, please click here]]> 2017-02-06T07:38:00+00:00 http://www.networkworld.com/article/3166090/security/rsa-conference-carbon-black-to-introduce-streaming-prevention.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307141 False None None None Network World - Magazine Info Hacker hijacks thousands of publicly exposed printers to warn owners To read this article in full or to leave a comment, please click here]]> 2017-02-06T07:26:44+00:00 http://www.networkworld.com/article/3166047/security/hacker-hijacks-thousands-of-publicly-exposed-printers-to-warn-owners.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307142 False None None None Network World - Magazine Info Hacking the 2016 election: A timeline 77,759 votes in three states,” not to mention that the loser walked away with 2.8 million more votes than the winner, the 2016 election season produced one big story after another. But what may prove to be the biggest story of the 2016 election is the series of hacks that undermined both the democratic process and the Democratic candidate - and the the role of the Russian government in those hacks.To read this article in full or to leave a comment, please click here]]> 2017-02-06T07:11:00+00:00 http://www.networkworld.com/article/3166088/election-hacking/hacking-the-2016-election-a-timeline.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307143 False None None None Network World - Magazine Info Friends or enemies? Security vendors tiptoe towards collaboration opinion piece last year.To read this article in full or to leave a comment, please click here]]> 2017-02-06T07:02:00+00:00 http://www.networkworld.com/article/3166086/security/friends-or-enemies-security-vendors-tiptoe-towards-collaboration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307144 False None None None Network World - Magazine Info 97 companies file brief against Trump\'s immigration ban brief late Sunday opposing President Donald Trump's executive order on immigration on the grounds that it harms competitiveness and is discriminatory.The brief was filed in the Ninth Circuit Court of Appeals late last night, a bump up in the timetable, as Bloomberg reported the companies had originally planned to file later this week.To read this article in full or to leave a comment, please click here]]> 2017-02-06T06:07:00+00:00 http://www.networkworld.com/article/3166008/security/97-companies-file-brief-against-trump-s-immigration-ban.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307145 False None None None Network World - Magazine Info Security Sessions: The CSO\'s role in active shooter planning 2017-02-06T06:00:00+00:00 http://www.networkworld.com/video/73795/security-sessions-the-csos-role-in-active-shooter-planning#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=307146 False None None None Network World - Magazine Info RSA Innovation Sandbox winners: One year later To read this article in full or to leave a comment, please click here]]> 2017-02-06T03:32:00+00:00 http://www.networkworld.com/article/3163243/security/rsa-innovation-sandbox-winners-one-year-later.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306771 False None None None Network World - Magazine Info Google ordered by US court to produce emails stored abroad To read this article in full or to leave a comment, please click here]]> 2017-02-06T03:07:40+00:00 http://www.networkworld.com/article/3165866/internet/google-ordered-by-us-court-to-produce-emails-stored-abroad.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306772 False None None None Network World - Magazine Info New products of the week 2.6.17 Image by FortinetOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Red Armor NSE7000corsaImage by corsaTo read this article in full or to leave a comment, please click here]]> 2017-02-06T02:49:00+00:00 http://www.networkworld.com/article/3165291/security/new-products-of-the-week-2-6-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306773 True None None None Network World - Magazine Info Hacker stackoverflowin pwning printers, forcing rogue botnet warning print jobs To read this article in full or to leave a comment, please click here]]> 2017-02-05T08:46:00+00:00 http://www.networkworld.com/article/3165419/security/hacker-stackoverflowin-pwning-printers-forcing-rogue-botnet-warning-print-jobs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306348 False None None None Network World - Magazine Info UK defense secretary urges NATO to fend off Russian cyberattacks speech about the threat of “Russia's military resurgence.”He pointed to the Kremlin's suspected role in influencing last year's presidential election in the U.S., as part of growing number of alleged cyber attacks that have targeted Western governments.   To read this article in full or to leave a comment, please click here]]> 2017-02-03T11:59:39+00:00 http://www.networkworld.com/article/3165445/security/uk-defense-secretary-urges-nato-to-fend-off-russian-cyberattacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306349 False None None None Network World - Magazine Info US Immigration and Customs Enforcement nabs $20M in fake sports gear ahead of Super Bowl 51 10 of the latest craziest and scariest things the TSA found on your fellow travelers+170202opteamplayer1 ICE/DHS U.S. Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) teams nabbed 260,000 counterfeit sports-related items during its annual, year-long Operation Team Player sting. Last year ICE seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million.To read this article in full or to leave a comment, please click here]]> 2017-02-03T11:22:00+00:00 http://www.networkworld.com/article/3165400/security/us-immigration-and-customs-enforcement-nabs-20m-in-fake-sports-gear-ahead-of-super-bowl-51.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306350 False Guideline None None Network World - Magazine Info Microsoft will likely fix Windows SMB denial-of-service flaw on Patch Tuesday There was concern initially that the flaw might also allow for arbitrary code execution and not just denial-of-service, which would have made it critical. The CERT Coordination Center (CERT/CC) at Carnegie Mellon University at first mentioned arbitrary code execution as a possibility in an advisory released Thursday. However, the organization has since removed that wording from the document and downgraded the flaw's severity score from 10 (critical) to 7.8 (high).To read this article in full or to leave a comment, please click here]]> 2017-02-03T10:48:05+00:00 http://www.networkworld.com/article/3165269/security/microsoft-will-likely-fix-windows-smb-denial-of-service-flaw-on-patch-tuesday.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306351 False None None None Network World - Magazine Info Zero-day Windows file-sharing flaw can crash systems, maybe worse an advisory from the CERT Coordination Center (CERT/CC) at Carnegie Mellon University.To read this article in full or to leave a comment, please click here]]> 2017-02-03T08:35:19+00:00 http://www.networkworld.com/article/3165384/security/zero-day-windows-file-sharing-flaw-can-crash-systems-maybe-worse.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306364 False None None None Network World - Magazine Info IDG Contributor Network: Thinking of cutting out your database administrator? Think again If the cloud is so great, why are so many businesses unsatisfied? + In 2017, however, the trend of enterprises moving data into the cloud continues to reduce the role of the database administrator (DBA) in big and small businesses alike around the world.To read this article in full or to leave a comment, please click here]]> 2017-02-03T08:10:00+00:00 http://www.networkworld.com/article/3163639/system-management/thinking-of-cutting-out-your-database-administrator-think-again.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306365 False None None None Network World - Magazine Info How AI is stopping criminal hacking in real time a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle.Yet, there is one ally that has emerged in recent years. Artificial intelligence can stay vigilant at all times, looking for patterns in behavior and alerting you to a new threat.To read this article in full or to leave a comment, please click here]]> 2017-02-03T04:35:00+00:00 http://www.networkworld.com/article/3165232/security/how-ai-is-stopping-criminal-hacking-in-real-time.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306106 False None Yahoo None Network World - Magazine Info 6 things software vendors need to know about HIPAA compliance Image by ThinkstockMany people are loosely familiar with Health Insurance Portability and Accountability Act (HIPAA) and usually associate it with hospitals, clinics and health insurance companies. However, it can be less clear how HIPAA compliance standards apply to countless other software vendors, SaaS providers that work with healthcare-related businesses or handle protected health information (PHI). In recent months, the Office for Civil Rights has been coming down hard on HIPAA violators, doling out some of the large fines – upwards of $5 million. So in order to ensure your business is protected and to maintain your brand reputation, it is vital to know the ins and outs of HIPAA compliance. With this in mind, Dizzion provides suggestions for ways vendors can maintain HIPAA compliance while still focusing on their primary business objectives.To read this article in full or to leave a comment, please click here]]> 2017-02-03T03:19:00+00:00 http://www.networkworld.com/article/3163640/security/6-things-software-vendors-need-to-know-about-hipaa-compliance.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306107 False None None None Network World - Magazine Info AT&T extends NetBond service to secure IoT connections NetBond, a private network service from AT&T, instead of the Internet. The NetBond service sets up a VPN (virtual private network) from an edge device to the cloud. It can connect to 16 different public clouds, including Amazon Web Services and Microsoft Azure, or a private or hybrid cloud.To read this article in full or to leave a comment, please click here]]> 2017-02-02T17:22:07+00:00 http://www.networkworld.com/article/3165064/internet-of-things/atandt-extends-netbond-service-to-secure-iot-connections.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305107 False None None None Network World - Magazine Info RSA 2017: The Internet of Things security threat took down Dyn data centers and many of the high-profile Web sites it supports.Those attacks, generating peak traffic of 1TByte or more, raise the question of how best to secure these devices, and sessions at the Feb.13-17 conference in San Francisco try to answer it.+More on Network World: Cisco: Faulty clock part could cause failure in some Nexus switches, ISR routers, ASA security appliances+To read this article in full or to leave a comment, please click here]]> 2017-02-02T16:40:00+00:00 http://www.networkworld.com/article/3164839/security/rsa-2017-the-internet-of-things-security-threat.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305108 False None None None Network World - Magazine Info IRS warns on ever-changing “dangerous W-2 phishing scam” To read this article in full or to leave a comment, please click here]]> 2017-02-02T14:50:00+00:00 http://www.networkworld.com/article/3164946/security/irs-warns-on-ever-changing-dangerous-w-2-phishing-scam.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305109 False None None None Network World - Magazine Info Obama-led sanction accidentally hampered U.S. tech firms in Russia sanction order was designed to block U.S. companies from doing business with Russia's Federal Security Service, also known as the FSB, because of its suspected role in influencing last year's election.But the FSB isn't just an intelligence agency. It's also a crucial regulator in Russia that clears new IT products, including smartphones and tablets, for sale in the country.To read this article in full or to leave a comment, please click here]]> 2017-02-02T14:34:31+00:00 http://www.networkworld.com/article/3164942/security/obama-led-sanction-accidentally-hampered-us-tech-firms-in-russia.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305110 False None None None Network World - Magazine Info IDG Contributor Network: SSL or IPsec: Which is best for IoT network security? To read this article in full or to leave a comment, please click here]]> 2017-02-02T12:40:00+00:00 http://www.networkworld.com/article/3164531/internet-of-things/ssl-or-ipsec-whats-the-right-approach-for-iot-network-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305123 False None None None Network World - Magazine Info RSA 2017: Anticipating network security chatter my expectations for endpoint security at the upcoming RSA Conference. Similarly, here's what I anticipate hearing about regarding network security:1. DDoS protection. While data breaches get front page, above-the-fold headlines, DDoS attacks remain relatively invisible by comparison. This is puzzling because DDoS attacks happen almost daily. A quick review of the news shows that the Trump hotel website, Sonic (ISP in CA), Emsisoft and Lloyd's Bank have all been hit with DDoS attacks over the past few weeks. These are relatively pedestrian attacks compared to the now infamous Mirai botnet DDoS attack on Dyn back in October and the subsequent attack on French hosting provider OVH a week later. To read this article in full or to leave a comment, please click here]]> 2017-02-02T12:38:00+00:00 http://www.networkworld.com/article/3164857/security/rsa-2017-anticipating-network-security-chatter.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305124 False None None None Network World - Magazine Info IDG Contributor Network: A patchwork quilt of IoT security last article is that manufacturers do not have the right incentives. But all is not lost. With a little ingenuity, we can make a quilt of independent pieces that can nevertheless turn out to offer good security coverage.The term “patchwork quilt” is often used pejoratively to describe something that is made up of an assortment of other parts. Yet it is worth remembering that a well-made quilt is still functional, durable and beautiful. And quilts are often made collaboratively in quilting bees. We need this sort of approach to network security.To read this article in full or to leave a comment, please click here]]> 2017-02-02T10:34:00+00:00 http://www.networkworld.com/article/3163991/internet-of-things/a-patchwork-quilt-of-iot-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305125 False None None None Network World - Magazine Info Cisco patches critical flaw in Prime Home device management server its advisory.To read this article in full or to leave a comment, please click here]]> 2017-02-02T10:06:40+00:00 http://www.networkworld.com/article/3164807/security/cisco-patches-critical-flaw-in-prime-home-device-management-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305126 False None None None Network World - Magazine Info Using DNS to weaken Locky, the powerful ransomware threat 3% submit payments. Cybersecurity experts estimate that Locky possesses 17% of the entire global market share for all ransomware infections.To read this article in full or to leave a comment, please click here]]> 2017-02-02T06:44:00+00:00 http://www.networkworld.com/article/3164521/security/using-dns-to-weaken-locky-the-powerful-ransomware-threat.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305127 False None None None Network World - Magazine Info WordPress silently fixes dangerous code injection vulnerability was released on January 26 as a security update, but the accompanying release notes only mentioned fixes for three moderate risk vulnerabilities, one of which did not even affect the platform's core code.On Wednesday, a week later, the WordPress security team disclosed that a fourth vulnerability, much more serious than the others, was also patched in version 4.7.2.To read this article in full or to leave a comment, please click here]]> 2017-02-02T06:41:39+00:00 http://www.networkworld.com/article/3164523/security/wordpress-silently-fixes-dangerous-code-injection-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=305128 False None None None Network World - Magazine Info GitLab database goes out after spam attack GitLab.com and was in the process restoring data from a backup. Data was accidentally deleted, according to a Twitter message.[ Docker, Amazon, TensorFlow, Windows 10, and more: See InfoWorld's 2017 Technology of the Year Award winners. | Cut to the key news in technology trends and IT breakthroughs with the InfoWorld Daily newsletter, our summary of the top tech happenings. ] "Losing production data is unacceptable, and in a few days we'll post the five whys of why this happened and a list of measures we will implement," GitLab said in a bulletin this morning. Git.wiki repositories and self-hosted installations were unaffected.To read this article in full or to leave a comment, please click here]]> 2017-02-02T05:09:00+00:00 http://www.networkworld.com/article/3164591/application-development/gitlab-database-goes-out-after-spam-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304748 False None None None Network World - Magazine Info The problem with threat intelligence [Infographic] To read this article in full or to leave a comment, please click here]]> 2017-02-02T05:08:00+00:00 http://www.networkworld.com/article/3164516/network-security/the-problem-with-threat-intelligence-infographic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304749 False None None None Network World - Magazine Info Phishing test results in a barely-passing grade for users rolled out a test to 2,000 users to see how much attention they were paying to what enters their in-box. â–  RELATED: Take a look at the messsages and see which ones are real An estimated 156 million phishing emails are sent worldwide every day, and about 16 million of those make it through our spam filters and into our inboxes. The global nonprofit Anti-Phishing Working Group (APWG) recorded more unique phishing campaigns in the first quarter of 2016 than in any other three-month span since it began tracking data more than a decade ago, and the U.S. is reportedly home to more phishing sites than any other country, according to Diligent.To read this article in full or to leave a comment, please click here]]> 2017-02-02T04:58:00+00:00 http://www.networkworld.com/article/3164589/security/phishing-test-results-in-a-barely-passing-grade-for-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304750 False None None None Network World - Magazine Info Why 2017 will be the worst year ever for security 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] “I think we are going to find more, not less, breaches in 2017,” says Ray Rothrock, CEO of RedSeal, a security analytics firm.To read this article in full or to leave a comment, please click here]]> 2017-02-02T04:53:00+00:00 http://www.networkworld.com/article/3164514/security/why-2017-will-be-the-worst-year-ever-for-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304751 False None Yahoo None Network World - Magazine Info HPE acquires security startup Niara to boost its ClearPass portfolio looking for anomalous, inconsistent activities that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.To read this article in full or to leave a comment, please click here]]> 2017-02-01T23:26:00+00:00 http://www.networkworld.com/article/3164575/security/hpe-acquires-security-startup-niara-to-boost-its-clearpass-portfolio.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304556 False None None None Network World - Magazine Info Hackers are seeking out company insiders on the black market findings on Tuesday. To read this article in full or to leave a comment, please click here]]> 2017-02-01T17:31:37+00:00 http://www.networkworld.com/article/3164412/security/hackers-are-seeking-out-company-insiders-on-the-black-market.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304142 False None None None Network World - Magazine Info Trump may ask businesses to boost cybersecurity a draft of the order was leaked to The Washington Post.In it, Trump calls for, “…economic and other incentives to: induce private sector owners and operators of the Nation's critical infrastructure to maximize protective measures; invest in cyber enterprise risk management tools and services; and adopt best practices with respect to processes and technologies necessary for the increased sharing of and response to real-time cyber threat information.”To read this article in full or to leave a comment, please click here]]> 2017-02-01T15:55:00+00:00 http://www.networkworld.com/article/3164509/security/trump-may-ask-businesses-to-boost-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304143 False None None None Network World - Magazine Info Computing conference to celebrate 50 years of Turing Award Association for Computing Machinery (ACM) has announced it will celebrate 50 years of the A.M. Turing Award -- dubbed the "Nobel Prize of Computing -- with a (tech) star-studded conference in San Francisco this summer.The two-day event, to be held June 23-24, will "explore how computing has evolved and where the field is headed," according to the ACM.MORE: Why there's no official Nobel Prize in ComputingACM, which boasts of nearly 100,000 computing professional and student members around the world, is calling the event the Celebration of 50 Years of the ACM Turing Award. If you can't attend in person, be aware that a live stream will be available.To read this article in full or to leave a comment, please click here]]> 2017-02-01T15:02:00+00:00 http://www.networkworld.com/article/3164446/careers/computing-conference-to-celebrate-50-years-of-turing-award.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304144 False None None None Network World - Magazine Info WhatsApp reduces spam, despite end-to-end encryption encryption means that no one -- not even WhatsApp -- can read the content of your messages, except for the recipient.More privacy, however, can raise issues about spam detection. If WhatsApp can't scan your messages for suspicious content, say for advertisements peddling cheap Viagra, then how can it effectively filter them out?To read this article in full or to leave a comment, please click here]]> 2017-02-01T13:53:05+00:00 http://www.networkworld.com/article/3164524/security/whatsapp-reduces-spam-despite-end-to-end-encryption.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304145 False None None None Network World - Magazine Info In treason case, Russia alleges security experts aided US were reported in the Russian media last week. Since then, the arrest of a third FSB officer named Dmitry Dokuchayev, who also worked for the agency's Information Security Center, came to light, and the investigation is said to have targeted even more people.To read this article in full or to leave a comment, please click here]]> 2017-02-01T12:00:53+00:00 http://www.networkworld.com/article/3163634/security/in-treason-case-russia-alleges-security-experts-aided-us.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304158 False None None None Network World - Magazine Info Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option To read this article in full or to leave a comment, please click here]]> 2017-02-01T10:46:00+00:00 http://www.networkworld.com/article/3163979/analytics/cisco-amps-up-tetration-platform-with-better-security-reduced-footprint-aws-cloud-option.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304159 False None None None Network World - Magazine Info How Facebook and Google are battling internet terrorism To read this article in full or to leave a comment, please click here]]> 2017-02-01T10:37:00+00:00 http://www.networkworld.com/article/3163632/social-networking/how-facebook-and-google-are-battling-internet-terrorism.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304160 False None None None Network World - Magazine Info Mobile security firm offers cash to hackers for their old exploits To read this article in full or to leave a comment, please click here]]> 2017-02-01T08:29:57+00:00 http://www.networkworld.com/article/3164287/security/mobile-security-firm-offers-cash-to-hackers-for-their-old-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304161 False Guideline None None Network World - Magazine Info Cisco unveils Tetration 2.0, focuses on application security Tetration. The product moved Cisco into the analytics market, with the information being used to help customers better understand application performance and improve data center security. This week, Cisco announced the next version of Tetration Analytics, which is focused at providing security at the application layer. Cisco also released some new deployment options to make it easier for customers to get started with Tetration. To read this article in full or to leave a comment, please click here]]> 2017-02-01T08:05:00+00:00 http://www.networkworld.com/article/3164247/security/cisco-unveils-tetration-20-focuses-on-application-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304162 False None None None Network World - Magazine Info Witcher dev, XBOX 360 ISO & PSP ISO forums hacked: Over 4.4 million accounts exposed Have I Been Pwned Nearly 1.9 million CD Projekt Red accounts were exposed; Have I Been Pwned numbered the burned accounts at 1,871,373.To read this article in full or to leave a comment, please click here]]> 2017-02-01T07:03:00+00:00 http://www.networkworld.com/article/3163802/security/witcher-dev-xbox-360-iso-psp-iso-forums-hacked-over-44-million-accounts-exposed.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304163 False None None None Network World - Magazine Info Are Apple-specific threats on the rise? To read this article in full or to leave a comment, please click here]]> 2017-02-01T05:34:00+00:00 http://www.networkworld.com/article/3164191/security/are-apple-specific-threats-on-the-rise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303895 False Guideline None None Network World - Magazine Info What IT security pros are earning in 2017 Image by ThinkstockLast year was a record one for data breaches, with some 1,093 breaches reported. That represented a 40 percent increase over the prior year, according to the Identity Theft Resource Center. It is no wonder that information security remains one of the most top-of-mind issues for CIOs, CISOs, and CEOs. The result is continued high demand for IT security pros. “The market for IT security professionals is poised for another strong year,” notes CompTIA Senior Vice President Tim Herbert. “The security job category was one of the faster growing IT occupations during 2016. During the last 90 days, U.S. employers posted nearly 25,000 job openings for security positions.”To read this article in full or to leave a comment, please click here]]> 2017-02-01T05:33:00+00:00 http://www.networkworld.com/article/3164227/careers/what-it-security-pros-are-earning-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303896 False None None None Network World - Magazine Info Sniff out and kick out Windows malware for free 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] In this video, you'll learn how to download and run Windows Sysinternals Process Explorer to test all currently running executables on your Windows system against VirusTotal's 57 antivirus engines, which together offer the best accuracy you can ever get (with a small percentage of false positives that are pretty easy to spot).To read this article in full or to leave a comment, please click here]]> 2017-02-01T05:32:00+00:00 http://www.networkworld.com/article/3163797/security/sniff-out-and-kick-out-windows-malware-for-free.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303897 False None None None Network World - Magazine Info 5 things DevOps needs to do to secure containers Image by PixabayDo deepening adoption and broader deployment of container technologies (from the likes of Docker, CoreOS and others) threaten to escalate into the latest skirmish between operations, developers and information security? Certainly, the potential exists to widen the rift, but in fact there is far more common ground than would initially suggest. Containerization introduces new infrastructure that operates dynamically and is open in nature, with more potential for cross-container activity. Containerization presents an almost unprecedented opportunity to embed security into the software delivery pipeline – rather than graft on security checks, container monitoring and policy for access controls as an afterthought.To read this article in full or to leave a comment, please click here]]> 2017-02-01T05:26:00+00:00 http://www.networkworld.com/article/3164224/application-development/5-things-devops-needs-to-do-to-secure-containers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303898 False None None None Network World - Magazine Info AI isn\'t just for the good guys anymore DARPA Cyber Grand Challenge pitted automated systems against one another, trying to find weaknesses in the others' code and exploit them."This is a great example of how easily machines can find and exploit new vulnerabilities, something we'll likely see increase and become more sophisticated over time," said David Gibson, vice president of strategy and market development at Varonis Systems.His company hasn't seen any examples of hackers leveraging artificial intelligence technology or machine learning, but nobody adopts new technologies faster than the sin and hacking industries, he said.To read this article in full or to leave a comment, please click here]]> 2017-02-01T05:22:00+00:00 http://www.networkworld.com/article/3163819/malware-cybercrime/ai-isnt-just-for-the-good-guys-anymore.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303911 False None None None Network World - Magazine Info How to make PC security alerts better? Make them twirl, jiggle To read this article in full or to leave a comment, please click here]]> 2017-01-31T14:29:31+00:00 http://www.networkworld.com/article/3163806/security/how-to-make-pc-security-alerts-better-make-them-twirl-jiggle.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303326 False None None None Network World - Magazine Info Trump stresses cybersecurity but postpones executive order draft copy of the order, leaked earlier, would give the Department of Defense and the Department of Homeland Security 60 days to submit a list of recommendations to protect U.S. government and private networks. Trump had been scheduled to sign the executive order Tuesday but canceled shortly before it was due to happen.To read this article in full or to leave a comment, please click here]]> 2017-01-31T12:59:58+00:00 http://www.networkworld.com/article/3163513/security/trump-stresses-cybersecurity-but-postpones-executive-order.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303327 False None None None Network World - Magazine Info Google upgrades G Suite with tools for IT pros bolstered its G Suite of productivity apps with new controls and tools for IT professionals. G Suite administrators now have more access to control security key enforcement, data control with data loss prevention (DLP) for Google Drive and Gmail, and additional insights by connecting Gmail to BigQuery, Google's enterprise data warehouse designed to enable SQL queries, according to Google.All of the changes, which are live today, are designed to elevate G Suite for the enterprise, especially among companies that need more confidence in the controls they can maintain over corporate data, according to Google.To read this article in full or to leave a comment, please click here]]> 2017-01-31T12:13:00+00:00 http://www.networkworld.com/article/3163253/analytics/google-upgrades-g-suite-with-tools-for-it-pros.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303328 False None None None Network World - Magazine Info Illumio extends its segmentation to the network and cloud Illumio, security is starting to change and is able to meet the demands of digital organizations. One of the big advancements in data center security has been the rise of segmentation tools. In actuality, coarse-grained segmentation has been around for decades in the form of firewalls, VLANs and ACLs, but companies like Illumio and VMware have extended the paradigm to applications, workloads and users. To read this article in full or to leave a comment, please click here]]> 2017-01-31T11:44:00+00:00 http://www.networkworld.com/article/3163451/security/illumio-extends-its-segmentation-to-the-network-and-cloud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303329 False None None None Network World - Magazine Info Cisco: Spam is making a big-time comeback 2017 Annual Cybersecurity Report.The company's 10th such report says spam is way up. It accounts for 65% of all corporate email among customers who opted in to let the company gather data via telemetry in Cisco gear.Whereas spam had been knocked down as a threat in 2010 and kept at relatively low levels through 2015, it made a surge in 2016. In 2010, Cisco recorded 5,000 spam messages being sent per second. That number stayed generally below 1,500 for the next five years, spiking to about 2,000 briefly in 2014. But in 2016 it leaped to more than 3,000.To read this article in full or to leave a comment, please click here]]> 2017-01-31T11:10:00+00:00 http://www.networkworld.com/article/3163250/security/cisco-spam-is-making-a-big-time-comeback.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303342 False None None None Network World - Magazine Info Easy-to-exploit authentication bypass flaw puts Netgear routers at risk To read this article in full or to leave a comment, please click here]]> 2017-01-31T09:26:05+00:00 http://www.networkworld.com/article/3163238/security/easy-to-exploit-authentication-bypass-flaw-puts-netgear-routers-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303343 False None None None Network World - Magazine Info Trump to sign cybersecurity order calling for government-wide review To read this article in full or to leave a comment, please click here]]> 2017-01-31T09:02:31+00:00 http://www.networkworld.com/article/3163435/security/trump-to-sign-cybersecurity-order-calling-for-government-wide-review.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303344 False Guideline None None Network World - Magazine Info RSA Conference 2017: Endpoint security in the spotlight To read this article in full or to leave a comment, please click here]]> 2017-01-31T07:50:00+00:00 http://www.networkworld.com/article/3163450/security/rsa-conference-topic-endpoint-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303345 False None None None Network World - Magazine Info Busted: Federal Reserve employee mined bitcoin using government server news release by the Office of Inspector General, Berthaume pleaded guilty to one count of unlawful conversion of government property.Working as a Communications Analyst, Berthaume had access to some Board computer servers. He put the computing power of a federal server to work for him. Mining is costly after all, as nowadays it tends to use more electricity than a miner earns. Unless a person has excess power from a solar farm for mining, then stealing electricity for mining is an option some people choose. You may have heard about the three men and one woman recently arrested in Venezuela for electricity theft and internet fraud.To read this article in full or to leave a comment, please click here]]> 2017-01-31T07:31:00+00:00 http://www.networkworld.com/article/3163431/security/busted-federal-reserve-employee-mined-bitcoin-using-government-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303346 False Guideline None None Network World - Magazine Info Privacy worries are on the rise, new poll of U.S. consumers shows in a statement. The survey, released last week, polled 2,500 U.S. consumers about their privacy concerns across four verticals: Financial services, healthcare, retail and government.To read this article in full or to leave a comment, please click here]]> 2017-01-31T05:56:00+00:00 http://www.networkworld.com/article/3163246/security/privacy-worries-are-on-the-rise-new-poll-of-u-s-consumers-shows.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302937 False None None None Network World - Magazine Info SonicWall CEO talks of life after Dell spinout To read this article in full or to leave a comment, please click here]]> 2017-01-31T05:47:00+00:00 http://www.networkworld.com/article/3163425/security/sonicwall-ceo-talks-of-life-after-dell-spinout.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302938 False Guideline None None