Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490
Les Affaires – Cyber sécurité
- 10 décembre 2018Protéger votre entreprise des cybermenaces
Vol de données, fraude, piratage informatique, rançongiciel… Savez-vous que chaque jour votre entreprise peut être confrontée …
- 30 novembre 2018Jusqu'à 500 millions de clients touchés par un piratage du groupe hôtelier Marriott
Le géant mondial de l’hôtellerie Marriott a annoncé vendredi le piratage d’une base de données pouvant contenir les informations d’environ 500 millions de …
- 29 novembre 2018Le compte Twitter du secrétaire au Trésor américain piraté?
Le secrétaire américain au Trésor Steven Mnuchin a été contraint mercredi de supprimer un tweet envoyé par une personne inconnue qui a eu un …
- 28 novembre 2018Le PDG de Google devant le Congrès américain le 5 décembre
Le PDG de Google, Sundar Pichai, témoignera lors d’une audition au Congrès la semaine prochaine où les parlementaires américains l’interpelleront sur la …
- 28 novembre 2018É-U: deux inculpations pour des cyberattaques contre des hôpitaux
Deux Iraniens ont été inculpés aux États-Unis pour avoir attaqué depuis l’Iran les systèmes informatiques de villes et d’institutions …
- 27 novembre 2018Des employés de Google rejettent le projet de moteur de recherche en Chine
Une centaine d’employés de Google ont publiquement exigé mardi que le géant d’internet abandonne un projet de moteur de recherche en Chine respectant les règles …
- 27 novembre 2018Google accusé de manipulation pour espionner des utilisateurs
Sept organisations européennes de consommateurs ont saisi mardi des régulateurs nationaux en reprochant à Google de manipuler ses utilisateurs pour «espionner» …
- 3 octobre 2018La cybersécurité, une opportunité ?
- 17 novembre 2016Cyberattaques: l'escalade continue
L’énorme panne informatique du 21 octobre dernier, une cyberattaque qui a paralysé quelques dizaines des sites Web parmi les plus …
- 17 novembre 2016Faire des affaires en ligne à l'ère du président Trump
L’élection de Donald Trump à la présidence américaine ne calmera pas le secteur déjà chaud de la cybersécurité. On peut …
- 17 novembre 2016Cinq façons de préparer votre entreprise face aux cybermenaces
Elles sont nombreuses, elles sont partout… mais elles peuvent être déjouées assez simplement. Qu’il s’agisse de protéger ses données …
- 17 novembre 2016Cyberattaques: l'escalade continue
- 16 mars 2024Automakers Are Telling Your Insurance Company How You Really Drive
Plus: The operator of a dark-web cryptocurrency “mixing” service is found guilty, and a US senator reveals that popular safes contain secret backdoors. - 15 mars 2024Sinking Section 702 Wiretap Program Offered One Last Lifeboat
For months, US lawmakers have examined every side of a historic surveillance debate. With the introduction of the SAFE Act, all that’s left to do now is vote. - 13 mars 2024The ‘Emergency Powers’ Risk of a Second Trump Presidency
Every US president has the ability to invoke “emergency powers” that could give an authoritarian leader the ability to censor the internet, restrict travel, and more. - 13 mars 2024There Are Dark Corners of the Internet. Then There's 764
A global network of violent predators is hiding in plain sight, targeting children on major platforms, grooming them, and extorting them to commit horrific acts of abuse. - 13 mars 2024Porn Sites Need Age-Verification Systems in Texas, Court Rules
The US Court of Appeals for the 5th Circuit has vacated an injunction against an age-verification requirement to view internet porn in Texas. - 12 mars 2024US Lawmaker Cited NYC Protests in a Defense of Warrantless Spying
A closed-door presentation for House lawmakers late last year portrayed American anti-war protesters as having possible ties to Hamas in an effort to kill privacy reforms to a major US spy program. - 12 mars 2024Binance’s Top Crypto Crime Investigator Is Being Detained in Nigeria
Tigran Gambaryan, a former crypto-focused US federal agent, and a second Binance executive, Nadeem Anjarwalla, have been held in Abuja without passports for two weeks. - 11 mars 2024The 4 Big Questions the Pentagon’s New UFO Report Fails to Answer
The Pentagon says it’s not hiding aliens, but it stops notably short of saying what it is hiding. Here are the key questions that remain unanswered—some answers could be weirder than UFOs. - 11 mars 2024Airbnb Bans All Indoor Security Cameras
Starting at the end of April, Airbnb will no longer allow hosts to have security cameras inside their rental properties, citing a commitment to prioritizing guest privacy. - 11 mars 2024Google Is Getting Thousands of Deepfake Porn Complaints
Content creators are using copyright laws to get nonconsensual deepfakes removed from the web. With the complaints covering nearly 30,000 URLs, experts say Google should do more to help. - 19 mars 2024NVIDIA GTC Keynote: Blackwell Architecture Will Accelerate AI Products in Late 2024
Developers can now take advantage of NVIDIA NIM packages to deploy enterprise generative AI, said NVIDIA CEO Jensen Huang. - 18 mars 2024Get on CompTIA Certification Track With These $30 Study Guides
Kickstart a lucrative career in IT with this extensive bundle that includes 10 study guides on CompTIA and more of today’s leading IT certifications. - 17 mars 2024Remote Access Policy
Secure remote access to company systems and networks is now a way of life for most organizations. As corporate conglomerates, small businesses and brick-and-mortar shops fade away in favor of a distributed offsite workforce, companies and employees can profit from the greater convenience and efficiency provided by remote access. Combined with a bring your own … - 16 mars 2024BeyondTrust vs. CyberArk (2024): IAM Solutions Comparison
In this comparison, we analyze CyberArk and BeyondTrust features, pros and cons to help you make an informed decision about your organization’s IAM needs. - 15 mars 20245 Best VPNs for Travel in 2024 (Free & Paid VPNs)
What’s the best VPN to use when traveling? Our in-depth guide helps you understand what to look for in a VPN and find the best solution for your needs. - 15 mars 2024Okta vs Duo (2024): Which IAM Tool Is Best for Your Business?
Okta and Duo provide solutions for maintaining data security. Compare the features of Okta and Duo to help you choose the best option for your identity and access management needs. - 15 mars 2024Sophos: Cyber Security Professional Burnout Is Widespread, Creating Risk for APAC Organisations
Burnout and fatigue among cyber professionals are leading to flow-on consequences like more data breaches, employee apathy to cyber duties and turnover of cyber workforces during a skills crisis. - 15 mars 2024MFA vs 2FA: Which Is Best for Your Business?
Learn the key differences between multi-factor authentication (MFA) and two-factor authentication (2FA) and find out which one is best for your business needs. - 15 mars 20246 Best VPNs for Gaming in 2024
Here are the top VPNs for gaming. They offer fast speeds, reliable connections and enhanced security to enhance your gaming experience. - 14 mars 2024Hiring Kit: Cryptographer
In the modern digital era, where businesses experience constant and persistent attacks on their information technology infrastructure from malicious and criminal third parties, data security must be a vital part of any enterprise security strategy. The attachment of substantial financial consequences for security breaches and data loss by regulatory agencies only increases that urgency. Businesses … - 8 février 20243 million smart toothbrushes were not used in a DDoS attack after all, but it could happen
[UPDATED] What’s next, malware-infected dental floss? But seriously: It’s a reminder that even the smallest smart home devices can be a threat. Here’s how to protect yourself. - 20 octobre 2023How to find and remove spyware from your phone
iPhone and Android users alike are facing more sophisticated surveillance threats than ever before. Suspect you’re being tracked? Here’s what to do right now. - 31 mai 2023Were you caught up in the latest data breach? Here's how to find out
Wondering if your information is posted online from a data breach? Here’s how to check if your accounts are at risk and what to do next. - 6 avril 2023How to delete yourself from internet search results and hide your identity online
Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely. - 13 janvier 2023Hacked! My Twitter user data is out on the dark web — now what?
Your Twitter user data may now be out there too, including your phone number. Here’s how to check and what you can do about it. - 15 décembre 2022Windows: Still insecure after all these years
OPINION: With every Windows release, Microsoft promises better security. And, sometimes, it makes improvements. But then, well then, we see truly ancient security holes show up yet again. - 16 novembre 2022Stop using Twitter to log in to other websites
With Twitter’s growing technical problems, you can’t rely on it as your single sign-on for other sites. - 9 novembre 2022How to keep your home secure when you travel
With travel stressful enough, you don’t need the anxiety of wondering if your home is protected. - 1 novembre 2022OpenSSL dodges a security bullet
The critical security vulnerability turned out to be two serious vulnerabilities. Still, they need patching ASAP. - 5 juillet 2022Google to wipe user location history for visits to healthcare clinics, domestic violence shelters
Even if location history is enabled, visits to locations considered sensitive will be removed from logs.
Wired
Cyber defense magazine
Erreur: Il y a un erreur avec ce flux.
CIO
Aucun contenu.
Tech Republic
ZDnet