www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T17:48:40+00:00 www.secnews.physaphae.fr TechRepublic - Security News US How to create a Kubernetes ReplicaSet 2020-07-15T14:17:38+00:00 https://www.techrepublic.com/article/how-to-create-a-kubernetes-replicaset/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1805910 False Tool Uber None Security Affairs - Blog Secu How to Extend Security Across Your Kubernetes Infrastructure 2020-07-15T14:13:58+00:00 https://securityaffairs.co/wordpress/105944/security/extend-security-kubernetes-infrastructure.html?utm_source=rss&utm_medium=rss&utm_campaign=extend-security-kubernetes-infrastructure www.secnews.physaphae.fr/article.php?IdArticle=1805948 False None Uber None Wired Threat Level - Security News Massachusetts Launches Uber and Lyft\'s Latest Legal Headache 2020-07-14T21:40:25+00:00 https://www.wired.com/story/massachusetts-launches-uber-lyft-legal-headache www.secnews.physaphae.fr/article.php?IdArticle=1804663 False None Uber None Bleeping Computer - Magazine Américain Uber Eats outage in multiple countries, \'Internal Server Error" reports 2020-07-10T14:06:37+00:00 https://www.bleepingcomputer.com/news/technology/uber-eats-outage-in-multiple-countries-internal-server-error-reports/ www.secnews.physaphae.fr/article.php?IdArticle=1801208 True None Uber 2.0000000000000000 Bleeping Computer - Magazine Américain Uber Eats outage reported in multiple countries 2020-07-10T14:06:37+00:00 https://www.bleepingcomputer.com/news/technology/uber-eats-outage-reported-in-multiple-countries/ www.secnews.physaphae.fr/article.php?IdArticle=1801061 False None Uber None Wired Threat Level - Security News 13 YouTube Channels We Geek Out Over in Quarantine 2020-07-10T11:00:00+00:00 https://www.wired.com/story/our-favorite-youtube-channels www.secnews.physaphae.fr/article.php?IdArticle=1800290 False None Uber None TechRepublic - Security News US How to create a Kubernetes namespace 2020-07-09T15:06:18+00:00 https://www.techrepublic.com/article/how-to-create-a-kubernetes-namespace/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1798984 False None Uber None Wired Threat Level - Security News Uber Moves Stealthily to Gain Allies in a Fight With Cities 2020-07-09T11:00:00+00:00 https://www.wired.com/story/uber-moves-stealthily-gain-allies-fight-cities www.secnews.physaphae.fr/article.php?IdArticle=1798398 False None Uber None TechRepublic - Security News US How to install Lens and connect it to your Kubernetes cluster 2020-07-07T14:36:53+00:00 https://www.techrepublic.com/article/how-to-install-lens-and-connect-it-to-your-kubernetes-cluster/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1795058 False None Uber None Wired Threat Level - Security News Seattle\'s Uber and Lyft Drivers Make $23.25 an Hour-or $9.73 2020-07-06T19:18:53+00:00 https://www.wired.com/story/seattles-uber-lyft-drivers-make-2325-hour-973 www.secnews.physaphae.fr/article.php?IdArticle=1793715 False Studies Uber None Security Affairs - Blog Secu Microsoft discovers cryptomining campaign targeting Kubeflow tool for Kubernetes clusters 2020-06-11T18:09:02+00:00 https://securityaffairs.co/wordpress/104618/cyber-crime/cryptomining-campaign-targets-kubernetes-kubeflow.html?utm_source=rss&utm_medium=rss&utm_campaign=cryptomining-campaign-targets-kubernetes-kubeflow www.secnews.physaphae.fr/article.php?IdArticle=1762407 False Tool Uber None IT Security Guru - Blog Sécurité Cryptomining Gang Hijacking ML-focused Kubernetes Clusters 2020-06-11T10:30:36+00:00 https://www.itsecurityguru.org/2020/06/11/cryptomining-gang-hijacking-ml-focused-kubernetes-clusters/?utm_source=rss&utm_medium=rss&utm_campaign=cryptomining-gang-hijacking-ml-focused-kubernetes-clusters www.secnews.physaphae.fr/article.php?IdArticle=1761377 False None Uber None ZD Net - Magazine Info Microsoft discovers cryptomining gang hijacking ML-focused Kubernetes clusters 2020-06-11T07:55:00+00:00 https://www.zdnet.com/article/microsoft-discovers-cryptomining-gang-hijacking-ml-focused-kubernetes-clusters/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1761138 False None Uber None Wired Threat Level - Security News Covid-19 Opens the Door for Gig Workers to Win Sick Pay 2020-06-07T11:00:00+00:00 https://www.wired.com/story/covid-opens-door-gig-workers-sick-pay www.secnews.physaphae.fr/article.php?IdArticle=1754563 False None Uber 5.0000000000000000 Wired Threat Level - Security News Curfews Halt Transit Services-and Leave Riders Stranded 2020-06-04T17:14:22+00:00 https://www.wired.com/story/protest-curfews-ride-share www.secnews.physaphae.fr/article.php?IdArticle=1750722 False None Uber 3.0000000000000000 TechRepublic - Security News US Security at the network edge: Inside software-defined networking and Kubernetes 2020-05-29T17:36:43+00:00 https://www.techrepublic.com/article/security-at-the-network-edge-inside-software-defined-networking-and-kubernetes/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1740467 False None Uber None Graham Cluley - Blog Security Pablo Escobar\'s brother says FaceTime flaw revealed his address, sues Apple for a publicity stunt (and $2.6 billion) 2020-05-29T15:31:16+00:00 https://hotforsecurity.bitdefender.com/blog/pablo-escobars-brother-says-facetime-flaw-revealed-his-address-sues-apple-for-a-publicity-stunt-and-2-6-billion-23408.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=1740384 False None Uber 4.0000000000000000 Wired Threat Level - Security News Everyone\'s Ordering Delivery, but Apps Aren\'t Making Money 2020-05-29T12:00:00+00:00 https://www.wired.com/story/everyones-ordering-delivery-apps-not-making-money www.secnews.physaphae.fr/article.php?IdArticle=1739968 False None Uber None Malwarebytes Labs - MalwarebytesLabs Coalition Against Stalkerware bulks up global membership The Coalition Against Stalkerware brought aboard 11 new organizations to address the potentially dangerous capabilities of stalkerware. Categories: Stalkerware Tags: (Read more...) ]]> 2020-05-27T15:00:32+00:00 https://blog.malwarebytes.com/stalkerware/2020/05/coalition-against-stalkerware-bulks-up-global-membership/ www.secnews.physaphae.fr/article.php?IdArticle=1736633 False None Uber None IT Security Guru - Blog Sécurité Securing Docker with CIS Controls 2020-05-22T14:50:33+00:00 https://www.itsecurityguru.org/2020/05/22/securing-docker-with-cis-controls/?utm_source=rss&utm_medium=rss&utm_campaign=securing-docker-with-cis-controls www.secnews.physaphae.fr/article.php?IdArticle=1726039 False None Uber None TechRepublic - Security News US How PowerDNS turned \'abysmal failure\' into open source success 2020-05-18T15:46:05+00:00 https://www.techrepublic.com/article/how-powerdns-turned-abysmal-failure-into-open-source-success/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1716388 False None Uber None TechRepublic - Security News US How to install the Kubebox Kubernetes console interface 2020-05-13T14:44:41+00:00 https://www.techrepublic.com/article/how-to-install-the-kubebox-kubernetes-console-interface/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1706976 False None Uber None Wired Threat Level - Security News How Will We Dine and Uber in the Post-Pandemic City? 2020-05-08T12:00:00+00:00 https://www.wired.com/story/gadget-lab-podcast-454 www.secnews.physaphae.fr/article.php?IdArticle=1698375 False None Uber None TechRepublic - Security News US How Tesla uses open source to generate resilience in modern electric grids 2020-05-06T22:53:53+00:00 https://www.techrepublic.com/article/how-tesla-uses-open-source-to-generate-resilience-in-modern-electric-grids/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1695371 False None Uber None TechRepublic - Security News US Mobility companies pivot to helping critical workers as everyone else stays at home 2020-05-06T18:21:00+00:00 https://www.techrepublic.com/article/mobility-companies-pivot-to-helping-critical-workers-as-everyone-else-stays-at-home/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1694916 False None Uber None Wired Threat Level - Security News California Sues Uber and Lyft to Classify Drivers as Employees 2020-05-05T21:31:58+00:00 https://www.wired.com/story/california-sues-uber-lyft-classify-drivers-employees www.secnews.physaphae.fr/article.php?IdArticle=1693139 False Guideline Uber None InformationSecurityBuzzNews - Site de News Securite Cracking The Code To Balance Kubernetes Security With Operational Pace Cracking The Code To Balance Kubernetes Security With Operational Pace]]> 2020-05-04T14:50:47+00:00 https://www.informationsecuritybuzz.com/articles/cracking-the-code-to-balance-kubernetes-security-with-operational-pace/ www.secnews.physaphae.fr/article.php?IdArticle=1690285 False None Uber None TechRepublic - Security News US Couchbase automates management with 2.0 release of Operator for Kubernetes 2020-04-30T15:13:42+00:00 https://www.techrepublic.com/article/couchbase-automates-management-with-2-0-release-of-operator-for-kubernetes/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1683874 False None Uber None InformationSecurityBuzzNews - Site de News Securite What Are The Top 5 Kubernetes Security Challenges And Risks? What Are The Top 5 Kubernetes Security Challenges And Risks?]]> 2020-04-30T14:34:09+00:00 https://www.informationsecuritybuzz.com/articles/what-are-the-top-5-kubernetes-security-challenges-and-risks/ www.secnews.physaphae.fr/article.php?IdArticle=1683805 False None Uber None The Last Watchdog - Blog Sécurité de Byron V Acohido BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps What’s driving  ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of designing, prototyping, testing and delivering new … (more…) ]]> 2020-04-30T10:42:19+00:00 https://www.lastwatchdog.com/best-practices-how-testing-for-known-memory-vulnerabilities-can-strengthen-devsecops/ www.secnews.physaphae.fr/article.php?IdArticle=1683228 False None Uber None TechRepublic - Security News US How to scale a deployment within a Kubernetes cluster 2020-04-29T17:05:12+00:00 https://www.techrepublic.com/article/how-to-scale-a-deployment-within-a-kubernetes-cluster/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1682204 False None Uber None TechRepublic - Security News US Red Hat Summit 2020 virtual conference introduces advanced OpenShift capabilities 2020-04-28T16:06:09+00:00 https://www.techrepublic.com/article/red-hat-summit-2020-virtual-conference-introduces-advanced-openshift-capabilities/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1679876 False None Uber None TechRepublic - Security News US How and when to use operators in Kubernetes 2020-04-27T15:08:19+00:00 https://www.techrepublic.com/article/how-and-when-to-use-operators-in-kubernetes/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1677948 False None Uber None TechRepublic - Security News US Container security meets Kubernetes: What IT pros need to know 2020-04-27T12:57:06+00:00 https://www.techrepublic.com/article/container-security-meets-kubernetes-what-it-pros-need-to-know/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1677747 False None Uber None InformationSecurityBuzzNews - Site de News Securite Why Kubernetes Needs More Network Visibility And Protection Why Kubernetes Needs More Network Visibility And Protection]]> 2020-04-26T19:35:37+00:00 https://www.informationsecuritybuzz.com/articles/why-kubernetes-needs-more-network-visibility-and-protection/ www.secnews.physaphae.fr/article.php?IdArticle=1676669 False None Uber None TechRepublic - Security News US How to install Terraform on Ubuntu Server 2020-04-14T16:57:49+00:00 https://www.techrepublic.com/article/how-to-install-terraform-on-ubuntu-server/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1654578 False None Uber None TechRepublic - Security News US Kubernetes problems? These container management tools might help 2020-04-14T01:19:34+00:00 https://www.techrepublic.com/article/kubernetes-problems-these-container-management-tools-might-help/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1653484 False None Uber None TechRepublic - Security News US How to scale Kubernetes: 3 factors 2020-04-13T16:54:40+00:00 https://www.techrepublic.com/article/how-to-scale-kubernetes-3-factors/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1652978 False None Uber None TechRepublic - Security News US How to use port forwarding with containers deployed in a Kubernetes cluster 2020-04-10T14:47:27+00:00 https://www.techrepublic.com/article/how-to-use-port-forwarding-with-containers-deployed-in-a-kubernetes-cluster/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1646793 False Tool Uber None TechRepublic - Security News US How to secure a Kubernetes cluster by preventing unwanted modules from loading 2020-04-09T20:33:46+00:00 https://www.techrepublic.com/article/how-to-secure-a-kubernetes-cluster-by-preventing-unwanted-modules-from-loading/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1645424 False None Uber None TechRepublic - Security News US How to patch a running Kubernetes pod 2020-04-06T20:57:26+00:00 https://www.techrepublic.com/article/how-to-patch-a-running-kubernetes-pod/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1641705 False None Uber None TechRepublic - Security News US Windows containers can run in Kubernetes--but there is a catch 2020-04-06T19:23:03+00:00 https://www.techrepublic.com/article/windows-containers-can-run-in-kubernetes-but-there-is-a-catch/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1641655 False None Uber None Wired Threat Level - Security News Delivery Apps Offer Restaurants a Lifeline-at a Cost 2020-04-03T11:00:00+00:00 https://www.wired.com/story/delivery-apps-offer-restaurants-lifeline-cost www.secnews.physaphae.fr/article.php?IdArticle=1635814 False None Uber None AlienVault Lab Blog - AlienVault est un acteur de defense majeur dans les IOC SIEM and security monitoring for Kubernetes explained Posted by: Ashley Graves Read full post        ]]> 2020-03-27T22:46:00+00:00 https://feeds.feedblitz.com/~/610876466/0/alienvaultotx~SIEM-and-security-monitoring-for-Kubernetes-explained www.secnews.physaphae.fr/article.php?IdArticle=1887378 False None Uber None TechRepublic - Security News US Kubernetes version 1.18 has 38 enhancements 2020-03-25T22:00:08+00:00 https://www.techrepublic.com/article/kubernetes-version-1-18-has-38-enhancements/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1620041 False None Uber None TechRepublic - Security News US How to create a Kubernetes security policy 2020-03-20T16:56:10+00:00 https://www.techrepublic.com/article/how-to-create-a-kubernetes-security-policy/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1609725 False None Uber None TechRepublic - Security News US How to deploy a Kubernetes cluster with Multipass 2020-03-17T20:07:00+00:00 https://www.techrepublic.com/article/how-to-deploy-a-kubernetes-cluster-with-multipass/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1603447 False None Uber None NoticeBored - Experienced IT Security professional NBlog March 12 - reflecting on privacy Anyone who read Orwell's masterpiece or saw the film "1984" appreciates the threat of mass surveillance by the state a.k.a. Big Brother. Anyone who has followed Ed Snowden's revelations knows that mass surveillance is no longer fanciful fiction. There are clearly privacy impacts from surveillance with implications for personal freedoms, assurance and compliance. At the same time, surveillance offers significant social benefits too, in other words, pros and cons which vary with one's perspective. Big Brother sees overwhelming benefits from mass surveillance and has the power, capability and (these days) the technology to conduct both overt and covert mass or targeted surveillance more or less at will. The same thing applies to other forms of surveillance and other contexts: many of us gleefully carry surveillance devices with us wherever we go, continuously transmitting information about our activities, conversations, locations, contacts and more. We may call them 'smartphones' but is that really a smart thing to do? Drug dealers and other criminals appreciate the value of burner phones, essentially buying a modicum of privacy. What about the rest of us? Are we wise to rely on the technologies, the phone companies and the authorities not to invade our privacy? Some of us are introducing IoT things into our homes, seduced by the convenience of being able to tell our smart TV to order a pizza without even getting up from the sofa. Evidently people either don't even consider the privacy implications, or accept them presumably on the basis that they own and chose to introduce the surveillance devices, and could just as easily stop and remove them (fine in theory, doesn't happen in practice).Then there are the surveillance devices we use to monitor, track or snoop on various others: baby monitors, nanny-cams, commercial and home CCTV systems, webcams, dashcams, audio bugs, covert cameras, spyware, keyloggers and more. Surveillance tech is big business, both retail, commercial and governmental/military. Need to know where a recent arrival from China has been? Simply collect the surveillance jigsaw pieces into a credible sequence and despatch the hazmat teams.Overt surveillance in the form of obvious CCTV camera installations are just the tip of the iceberg. Covert cams and bugs are already snooping on us in changing rooms, toilets, video-conference facilities, courts and mor]]> 2020-03-12T09:41:18+00:00 http://feedproxy.google.com/~r/NoticeBored/~3/c_5LUN7g-EU/nblog-march-12-reflecting-on-privacy.html www.secnews.physaphae.fr/article.php?IdArticle=1779397 False Threat Uber None Wired Threat Level - Security News Coronavirus Exposes Workers to the Risks of the Gig Economy 2020-03-11T11:00:00+00:00 https://www.wired.com/story/coronavirus-exposes-workers-risks-gig-economy www.secnews.physaphae.fr/article.php?IdArticle=1592054 False None Uber None Graham Cluley - Blog Security Police raid tech support scam centre who had their CCTV hacked by vigilantes 2020-03-04T12:26:32+00:00 https://www.grahamcluley.com/police-raid-tech-support-scam-centre/ www.secnews.physaphae.fr/article.php?IdArticle=1580651 False Hack Uber None Wired Threat Level - Security News Your Ad Here-Uber Moves Into Car-Top Digital Billboards 2020-02-26T13:00:00+00:00 https://www.wired.com/story/your-ad-here-uber-car-top-digital-billboards www.secnews.physaphae.fr/article.php?IdArticle=1566748 False None Uber None TechRepublic - Security News US Security concerns hampering adoption of containers and Kubernetes 2020-02-19T14:00:08+00:00 https://www.techrepublic.com/article/security-concerns-hampering-adoption-of-containers-and-kubernetes/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1551862 False None Uber None Wired Threat Level - Security News New Uber Rules, Bomber-Inspired Jet Design, and More News 2020-02-18T22:59:04+00:00 https://www.wired.com/story/uber-rule-changes-airbus-maverick www.secnews.physaphae.fr/article.php?IdArticle=1550319 False None Uber None TechRepublic - Security News US Python, microservices, and more tech trends for 2020, according to O\'Reilly 2020-02-18T12:30:06+00:00 https://www.techrepublic.com/article/python-microservices-and-more-tech-trends-for-2020-according-to-oreilly/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1549077 False None Uber None Wired Threat Level - Security News Uber Changes Its Rules, and Drivers Adjust Their Strategies 2020-02-18T12:00:00+00:00 https://www.wired.com/story/uber-changes-rules-drivers-adjust-strategies www.secnews.physaphae.fr/article.php?IdArticle=1549099 False None Uber None Wired Threat Level - Security News Uber and Lyft\'s Financials Reveal Two Ride-Hailing Strategies 2020-02-12T22:30:42+00:00 https://www.wired.com/story/uber-lyfts-financials-reveal-two-ride-hailing-strategies www.secnews.physaphae.fr/article.php?IdArticle=1538154 False None Uber None TechRepublic - Security News US 3 tips to keep Kubernetes safe at scale 2020-02-12T14:47:02+00:00 https://www.techrepublic.com/article/3-tips-to-keep-kubernetes-safe-at-scale/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1537469 False None Uber None TechRepublic - Security News US Kubernetes rollouts: 5 security best practices 2020-02-10T21:45:28+00:00 https://www.techrepublic.com/article/kubernetes-rollouts-5-security-best-practices/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1534274 False None Uber None Wired Threat Level - Security News Uber in Vancouver, a Vehicle Ban in SF, and Other Car News 2020-02-02T14:00:00+00:00 https://www.wired.com/story/uber-vancouver-vehicle-ban-other-car-news www.secnews.physaphae.fr/article.php?IdArticle=1522825 False None Uber None Wired Threat Level - Security News Vancouver Wants to Avoid Other Cities\' Mistakes With Uber and Lyft 2020-02-01T12:00:00+00:00 https://www.wired.com/story/vancouver-wants-avoid-other-cities-mistakes-uber-lyft www.secnews.physaphae.fr/article.php?IdArticle=1522207 False None Uber 5.0000000000000000 TechRepublic - Security News US Why Kubernetes job searches grew by 2,125% in 4 years 2020-01-30T14:00:02+00:00 https://www.techrepublic.com/article/why-kubernetes-job-searches-grew-by-more-than-2000-in-4-years/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1518373 False None Uber None Errata Security - Errata Security There\'s no evidence the Saudis hacked Jeff Bezos\'s iPhone public report behind the U.N.'s accusations. That report failed to find evidence proving the theory, but instead simply found unknown things it couldn't explain, which it pretended was evidence.This is a common flaw in such forensics reports. When there's evidence, it's usually found and reported. When there's no evidence, investigators keep looking. Todays devices are complex, so if you keep looking, you always find anomalies you can't explain. There's only two results from such investigations: proof of bad things or anomalies that suggest bad things. There's never any proof that no bad things exist (at least, not in my experience).Bizarre and inexplicable behavior doesn't mean a hacker attack. Engineers trying to debug problems, and support technicians helping customers, find such behavior all the time. Pretty much every user of technology experiences this. Paranoid users often think there's a conspiracy against them when electronics behave strangely, but "behaving strangely" is perfectly normal.When you start with the theory that hackers are involved, then you have an explanation for the all that's unexplainable. It's all consistent with the theory, thus proving it. This is called "confirmation bias". It's the same thing that props up conspiracy theories like UFOs: space aliens can do anything, thus, anything unexplainable is proof of space aliens. Alternate explanations, like skunkworks testing a new jet, never seem as plausible.The investigators were hired to confirm bias. Their job wasn't to do an unbiased investigation of the phone, but instead, to find evidence confirming the suspicion that the Saudis hacked Bezos.Remember the story started in February of 2019 when the National Inquirer tried to extort Jeff Bezos with sexts between him and his paramour Lauren Sanchez. Bezos immediately accused the Saudis of being involved. Even after it was revealed that the sexts came from Michael Sanchez, the paramour's brother, Bezos's team double-downed on their accusations the Saudi's hacked Bezos's phone.The FTI report tells a story beginning with Saudi Crown Prince sending Bezos a message using WhatsApp containing a video. The story goes:The downloader that delivered the 4.22MB video was encrypted, delaying or preventing further study of the code delivered along with the video. It should be noted that the encrypted WhatsApp file sent from MBS' account was slightly larger than the video itself.This story is invalid. Such messages use end-to-end encryption, which means that while nobody in between can decrypt them (not even WhatsApp), anybody with possession of the ends can. That's how the technology is supposed to work. If Bezos loses/breaks his phone and needs to restore a backup onto a new phone, the backup needs to have the keys used to decrypt the WhatsApp messages.Thus, the forensics image taken by the investigators had the necessary keys to decrypt the video -- the investigators simply didn't know about them. In a previous blogpost I explain these magical WhatsApp keys and where to find them so that anybody, even you at home, can forensics their own iPhone, retrieve these keys, and decrypt their own videos.]]> 2020-01-28T16:53:00+00:00 https://blog.erratasec.com/2020/01/theres-no-evidence-saudis-hacked-jeff.html www.secnews.physaphae.fr/article.php?IdArticle=1515208 False Hack Uber None Wired Threat Level - Security News A New Law for Gig Workers Reaches Beyond Ride-Hail Drivers 2020-01-10T12:00:00+00:00 https://www.wired.com/story/law-gig-workers-reaches-beyond-rideshare www.secnews.physaphae.fr/article.php?IdArticle=1500101 False None Uber 3.0000000000000000 TechRepublic - Security News US Hyundai Motor and Uber release full-scale air taxi model at CES 2020-01-07T20:05:45+00:00 https://www.techrepublic.com/article/hyundai-motor-and-uber-release-full-scale-air-taxi-model-at-ces/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1498346 False None Uber None Wired Threat Level - Security News Now the Courts Will Decide Whether Uber Drivers Are Employees 2020-01-03T18:43:16+00:00 https://www.wired.com/story/courts-decide-uber-drivers-employees www.secnews.physaphae.fr/article.php?IdArticle=1496142 False None Uber None TechRepublic - Security News US How to install the Kubernetes package manager Helm 2020-01-02T16:36:00+00:00 https://www.techrepublic.com/article/how-to-install-the-kubernetes-package-manager-helm/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1495481 False None Uber None Wired Threat Level - Security News Cities Struggle to Boost Ridership With \'Uber for Transit\' Schemes 2020-01-02T13:00:00+00:00 https://www.wired.com/story/cities-on-demand-transit-buses www.secnews.physaphae.fr/article.php?IdArticle=1495545 False None Uber None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC Google Cloud Platform security monitoring with USM Anywhere™ 2019 Cyber Security Report published by the International Information System Security Certification Consortium, 93 percent of organizations say they are concerned about cloud security and 28 percent admit to having experienced cloud security incidents during the past year. The reality is, most companies lack the specialized knowledge and skills needed to provide that customer data stored in the cloud is protected Cloud service providers (CSPs) do provide extra security layers, such as automating threat detection, with the intent of making their customers feel more confident in the security of the cloud. However, the number of cloud breaches that are being reported shows that CSPs and organizations alike continue to struggle with cloud security. Much of this is due to a lack of unified visibility not just in the cloud, but across an organization’s entire network, siloed teams and technologies, lack of threat intelligence, and partnerships with third-parties whose security controls are not up to snuff. To address these challenges, many in the industry are advocating for organizations to simplify and unify their security approach, i.e. bring as many controls as possible into a single solution in order to break down the silos between security teams and technologies and to give greater visibility across the organization. We at AT&T Cybersecurity help organizations to accomplish this with our Unified Security Management™ (USM) Anywhere platform.  Of course, the effectiveness of any security solution is largely determined by the threat intelligence underpinning it. In any environment, we need to identify the common tactics, techniques, and procedures (TTPs) adversaries are using in their attacks. Below, we provide an overview of the latest threat intelligence from Alien Labs™ for Google Cloud Platform (GCP), which helps security practitioners to discover issues in their cloud workloads and detect adversaries exploiting attack vectors commonly seen in cloud environments. Google Cloud Platform integration in USM This summer, AT&T Cybersecurity launched the USM Anywhere™ integration with GCP. Through the USM Anywhere Alien App for GCP, USM can now consume all logging information managed by the Stackdriver utility in a configurable and intuitive way. Google Cloud Platform logs are provided through three major channels: Audit Logs. Record all events impacting objects within the environment. These logs are used to monitor any cloud assets, presenting a solid baseline for security detection. VPC Flow Logs. Half way between resource monitoring and cloud infrastructure security, these logs are the delights of NIDS enthusiasts. Firewall Logs. These help with auditing firewall rules events, and they are useful in detecting risky open ports and other configuration issues. In USM, these channels are processed by different plugins, which extract pieces of intelligence and map them to variables that are easy to steer into orchestration rules. The correlation engine allows for the combination of detections from different channels into a single orchestration rule, scaling GCP security to a new level. To prevent an intrusion from being recorded or triggering a notification, adversaries may try to disable audit logging once they get the necessary permissions. To protect against that, the product has out of the box correlation rules to generate an alert if any of the logging features is disabled. ]]> 2019-12-11T14:00:00+00:00 https://feeds.feedblitz.com/~/612840892/0/alienvault-blogs~Google-Cloud-Platform-security-monitoring-with-USM-Anywhere%e2%84%a2 www.secnews.physaphae.fr/article.php?IdArticle=1493780 False Tool,Threat,Guideline Uber None Wired Threat Level - Security News Uber\'s Alarming Crime Report, T-Mobile\'s 5G Test, and More News 2019-12-06T22:47:08+00:00 https://www.wired.com/story/uber-sexual-assault-report-tmobile-5g-nationwide www.secnews.physaphae.fr/article.php?IdArticle=1493680 False None Uber None Wired Threat Level - Security News Uber\'s Crime Report Is \'Highly Alarming,\' Says a Criminologist 2019-12-06T18:54:15+00:00 https://www.wired.com/story/criminologist-uber-crime-report-highly-alarming www.secnews.physaphae.fr/article.php?IdArticle=1493683 False None Uber None TechRepublic - Security News US KubeCon highlights huge growth in the adoption of Kubernetes 2019-12-06T17:33:43+00:00 https://www.techrepublic.com/article/kubecon-highlights-huge-growth-in-the-adoption-of-kubernetes/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1493538 False None Uber None BBC - BBC News - Technology HackerOne pays $20,000 bug bounty after \'sloppy\' breach 2019-12-05T14:54:47+00:00 https://www.bbc.co.uk/news/technology-50670433 www.secnews.physaphae.fr/article.php?IdArticle=1493657 False None Uber None Checkpoint - Fabricant Materiel Securite How is your Kubernetes Security Posture? 2019-12-04T15:23:27+00:00 https://blog.checkpoint.com/2019/12/04/how-is-your-kubernetes-security-posture/ www.secnews.physaphae.fr/article.php?IdArticle=1493488 False Guideline Uber None Wired Threat Level - Security News Yet Another Challenge for Air Travelers: Finding Your Uber 2019-11-28T12:00:00+00:00 https://www.wired.com/story/challenge-air-travelers-finding-your-uber www.secnews.physaphae.fr/article.php?IdArticle=1491655 False None Uber None Wired Threat Level - Security News Uber\'s London Rivals Are Plotting Its Downfall 2019-11-27T15:00:00+00:00 https://www.wired.com/story/uber-london-rivals-plotting-its-downfall www.secnews.physaphae.fr/article.php?IdArticle=1489956 False None Uber None Wired Threat Level - Security News London Could Ban Uber; Women and Climate Change; and More News 2019-11-25T23:19:30+00:00 https://www.wired.com/story/uber-ban-london-climate-change-women www.secnews.physaphae.fr/article.php?IdArticle=1486525 False None Uber None Wired Threat Level - Security News Uber May Be Banned From London, One of Its Biggest Markets 2019-11-25T20:56:41+00:00 https://www.wired.com/story/uber-banned-london-biggest-markets www.secnews.physaphae.fr/article.php?IdArticle=1486328 False None Uber None Wired Threat Level - Security News Feds Pin Uber Crash on Human Operator, Call for Better Rules 2019-11-20T00:38:05+00:00 https://www.wired.com/story/feds-blame-uber-crash-on-human-driver-call-for-better-rules www.secnews.physaphae.fr/article.php?IdArticle=1476898 False None Uber None Wired Threat Level - Security News Uber\'s Mistakes, \'Ford v Ferrari,\' and More Car News 2019-11-16T14:00:00+00:00 https://www.wired.com/story/ubers-mistakes-ford-v-ferrari-and-more-car-news www.secnews.physaphae.fr/article.php?IdArticle=1470593 False None Uber None Wired Threat Level - Security News Every Tech Company Wants to Be a Bank-Someday, At Least 2019-11-16T12:00:00+00:00 https://www.wired.com/story/tech-companies-banks www.secnews.physaphae.fr/article.php?IdArticle=1470458 False None Uber None Wired Threat Level - Security News The Uber CEO\'s Mistaken Notion of What a Mistake Is 2019-11-12T01:58:13+00:00 https://www.wired.com/story/uber-ceos-mistaken-notion-of-what-mistake-is www.secnews.physaphae.fr/article.php?IdArticle=1461677 False None Uber None Wired Threat Level - Security News The Failure of Uber\'s Self-Driving Car, Polestar\'s Debut, and More Car News This Week 2019-11-10T14:00:00+00:00 https://www.wired.com/story/uber-self-driving-crash-volvo-polestar-1-roundup www.secnews.physaphae.fr/article.php?IdArticle=1458623 False None Uber None Wired Threat Level - Security News What Keeps NSA Cybersecurity Boss Anne Neuberger Up at Night 2019-11-08T21:02:45+00:00 https://www.wired.com/story/anne-neuberger-national-security-agency-wired25 www.secnews.physaphae.fr/article.php?IdArticle=1455081 False None Uber None TechRepublic - Security News US How to install Kubernetes on CentOS 8 2019-11-08T20:30:47+00:00 https://www.techrepublic.com/article/how-to-install-kubernetes-on-centos-8/#ftag=RSS56d97e7 www.secnews.physaphae.fr/article.php?IdArticle=1455038 False None Uber None Graham Cluley - Blog Security Smashing Security #153: Cybercrime doesn\'t pay (but Uber does) 2019-11-07T01:00:50+00:00 https://www.grahamcluley.com/smashing-security-153-cybercrime-doesnt-pay-but-uber-does/ www.secnews.physaphae.fr/article.php?IdArticle=1450650 False None Uber None Wired Threat Level - Security News A Mind-Boggling Uber Oversight, a Firefox Scam, and More News 2019-11-06T22:42:50+00:00 https://www.wired.com/story/uber-self-driving-arizona-crash-firefox-scam www.secnews.physaphae.fr/article.php?IdArticle=1450484 False None Uber None Wired Threat Level - Security News Uber\'s Self-Driving Car Didn\'t Know Pedestrians Could Jaywalk 2019-11-06T02:22:42+00:00 https://www.wired.com/story/ubers-self-driving-car-didnt-know-pedestrians-could-jaywalk www.secnews.physaphae.fr/article.php?IdArticle=1448451 False None Uber None Wired Threat Level - Security News Here\'s How to Watch the WIRED25 Summit Live 2019-11-05T13:00:00+00:00 https://www.wired.com/story/wired25-livestream-2019 www.secnews.physaphae.fr/article.php?IdArticle=1446764 False None Uber None Wired Threat Level - Security News Drones That Work for Food, a Self-Landing Plane, and More News This Week 2019-11-03T14:00:00+00:00 https://www.wired.com/story/drones-work-food-self-landing-plane www.secnews.physaphae.fr/article.php?IdArticle=1442564 False None Uber 4.0000000000000000 Wired Threat Level - Security News Uber and Lyft Fight a Law They Say Doesn\'t Apply to Them 2019-11-01T00:06:26+00:00 https://www.wired.com/story/uber-lyft-fight-law-say-doesnt-apply www.secnews.physaphae.fr/article.php?IdArticle=1437600 False None Uber None Graham Cluley - Blog Security Men who were paid $100,000 by Uber to hush-up hack plead guilty to extortion scheme 2019-10-31T22:20:11+00:00 https://www.tripwire.com/state-of-security/featured/men-paid-100k-by-uber-to-hush-up-hack-plead-guilty-to-extortion-scheme/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=1437506 True Hack,Guideline Uber None The State of Security - Magazine Américain Men paid $100K by Uber to hush up hack plead guilty to extortion scheme Read More ]]> 2019-10-31T18:10:27+00:00 https://www.tripwire.com/state-of-security/featured/men-paid-100k-by-uber-to-hush-up-hack-plead-guilty-to-extortion-scheme/ www.secnews.physaphae.fr/article.php?IdArticle=1437202 False Hack,Guideline Uber None Wired Threat Level - Security News Come Hang Out With WIRED at Our 2-Day Festival 2019-10-31T11:00:00+00:00 https://www.wired.com/story/come-hang-out-with-wired-at-our-2-day-festival www.secnews.physaphae.fr/article.php?IdArticle=1436500 False None Uber None Security Affairs - Blog Secu Hackers behind Uber and Lynda hacks plead guilty in data breaches 2019-10-31T10:02:37+00:00 https://securityaffairs.co/wordpress/93220/security/uber-hackers-plead-guilty.html www.secnews.physaphae.fr/article.php?IdArticle=1436351 False Guideline Uber None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Two Hackers Who Extorted Money From Uber and LinkedIn Plead Guilty ]]> 2019-10-31T01:08:58+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/W0D_76DhJng/hackers-extorted-money.html www.secnews.physaphae.fr/article.php?IdArticle=1436217 False Guideline Uber None ZD Net - Magazine Info Hackers who extorted Uber and LinkedIn plead guilty 2019-10-30T20:55:26+00:00 https://www.zdnet.com/article/hackers-who-extorted-uber-and-linkedin-plead-guilty/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1435729 False None Uber None Malwarebytes Labs - MalwarebytesLabs Stalkerware developer dealt new blow by FTC A new government front has emerged against stalkerware-the US Federal Trade Commission. Following enforcement against Retina-X and its founder, what's next? Categories: Stalkerware Tags: (Read more...) ]]> 2019-10-29T15:56:37+00:00 https://blog.malwarebytes.com/stalkerware/2019/10/stalkerware-developer-dealt-new-blow-by-ftc/ www.secnews.physaphae.fr/article.php?IdArticle=1433405 False None Uber,Equifax None Wired Threat Level - Security News Uber Eats Hopes Drones Can Lift It to Profitability 2019-10-29T00:23:13+00:00 https://www.wired.com/story/uber-eats-drones-lift-profitability www.secnews.physaphae.fr/article.php?IdArticle=1432145 False None Uber None Wired Threat Level - Security News California\'s Wildfires Are the Doom of Our Own Making 2019-10-28T23:43:45+00:00 https://www.wired.com/story/californias-wildfires-are-the-doom-of-our-own-making www.secnews.physaphae.fr/article.php?IdArticle=1432045 False None Uber None Wired Threat Level - Security News Uber Tipping Behavior Revealed, Apple App Store Malware, and More News 2019-10-25T21:25:28+00:00 https://www.wired.com/story/uber-tipping-apple-malware-app-store www.secnews.physaphae.fr/article.php?IdArticle=1427093 True None Uber None