Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490
Les Affaires – Cyber sécurité
- 10 décembre 2018Protéger votre entreprise des cybermenaces
Vol de données, fraude, piratage informatique, rançongiciel… Savez-vous que chaque jour votre entreprise peut être confrontée …
- 30 novembre 2018Jusqu'à 500 millions de clients touchés par un piratage du groupe hôtelier Marriott
Le géant mondial de l’hôtellerie Marriott a annoncé vendredi le piratage d’une base de données pouvant contenir les informations d’environ 500 millions de …
- 29 novembre 2018Le compte Twitter du secrétaire au Trésor américain piraté?
Le secrétaire américain au Trésor Steven Mnuchin a été contraint mercredi de supprimer un tweet envoyé par une personne inconnue qui a eu un …
- 28 novembre 2018Le PDG de Google devant le Congrès américain le 5 décembre
Le PDG de Google, Sundar Pichai, témoignera lors d’une audition au Congrès la semaine prochaine où les parlementaires américains l’interpelleront sur la …
- 28 novembre 2018É-U: deux inculpations pour des cyberattaques contre des hôpitaux
Deux Iraniens ont été inculpés aux États-Unis pour avoir attaqué depuis l’Iran les systèmes informatiques de villes et d’institutions …
- 27 novembre 2018Des employés de Google rejettent le projet de moteur de recherche en Chine
Une centaine d’employés de Google ont publiquement exigé mardi que le géant d’internet abandonne un projet de moteur de recherche en Chine respectant les règles …
- 27 novembre 2018Google accusé de manipulation pour espionner des utilisateurs
Sept organisations européennes de consommateurs ont saisi mardi des régulateurs nationaux en reprochant à Google de manipuler ses utilisateurs pour «espionner» …
- 3 octobre 2018La cybersécurité, une opportunité ?
- 17 novembre 2016Cyberattaques: l'escalade continue
L’énorme panne informatique du 21 octobre dernier, une cyberattaque qui a paralysé quelques dizaines des sites Web parmi les plus …
- 17 novembre 2016Faire des affaires en ligne à l'ère du président Trump
L’élection de Donald Trump à la présidence américaine ne calmera pas le secteur déjà chaud de la cybersécurité. On peut …
- 17 novembre 2016Cinq façons de préparer votre entreprise face aux cybermenaces
Elles sont nombreuses, elles sont partout… mais elles peuvent être déjouées assez simplement. Qu’il s’agisse de protéger ses données …
- 17 novembre 2016Cyberattaques: l'escalade continue
- 24 avril 2024'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks
Sources suspect China is behind the targeted exploitation of two zero-day vulnerabilities in Cisco’s security appliances. - 24 avril 20245 Best VPN Services (2024): For Routers, PC, iPhone, Android, and More
It won’t solve all of your privacy problems, but a virtual private network can make you a less tempting target for hackers. - 24 avril 2024ShotSpotter Keeps Listening for Gunfire After Contracts Expire
Internal emails suggest that the company continued to provide gunshot data to police in cities where its contracts had been canceled. - 23 avril 2024Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak
The company belatedly conceded both that it had paid the cybercriminals extorting it and that patient data nonetheless ended up on the dark web. - 22 avril 2024The Next US President Will Have Troubling New Surveillance Powers
Over the weekend, President Joe Biden signed legislation not only reauthorizing a major FISA spy program but expanding it in ways that could have major implications for privacy rights in the US. - 22 avril 2024North Koreans Secretly Animated Amazon and Max Shows, Researchers Say
Thousands of exposed files on a misconfigured North Korean server hint at one way the reclusive country may evade international sanctions. - 20 avril 2024AI-Controlled Fighter Jets Are Dogfighting With Human Pilots Now
Plus: New York’s legislature suffers a cyberattack, police disrupt a global phishing operation, and Apple removes encrypted messaging apps in China. - 19 avril 2024The Biggest Deepfake Porn Website Is Now Blocked in the UK
The world’s most-visited deepfake website and another large competing site are stopping people in the UK from accessing them, days after the UK government announced a crackdown. - 18 avril 2024The Trump Jury Has a Doxing Problem
One juror in former US president Donald Trump’s criminal case in New York has been excused over fears she could be identified. It could get even messier. - 18 avril 2024The Real-Time Deepfake Romance Scams Have Arrived
Watch how smooth-talking scammers known as “Yahoo Boys” use widely available face-swapping tech to carry out elaborate romance scams. - 25 avril 2024Get a Lifetime Subscription of FastestVPN for just $40
In the market for a new VPN? The top-rated FastestVPN has been reduced to just $39.99 for a lifetime subscription at TechRepublic Academy. - 24 avril 2024Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape
A new report by cyber security firm Radware identifies the four main impacts of AI on the threat landscape emerging this year. - 23 avril 2024Grab 9 Ethical Hacking Courses for $30 and Improve Your Business Security
Your customers expect you to keep their data secure, and this collection of video courses covers everything you need to know about cybersecurity. - 23 avril 2024Can a VPN Be Hacked?
Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security. - 22 avril 2024NIST Cybersecurity Framework: A Cheat Sheet for Professionals (Free PDF)
The tech world has a problem: Security fragmentation. There’s no standard set of rules or even language for mitigating cyber risk used to address the growing threats of hackers, ransomware and stolen data, and the threat to data only continues to grow. President Barack Obama recognized the cyber threat in 2013, which led to his … - 22 avril 2024Server Inventory Checklist (Free Download)
Threats from malware, cryptographic infections and compromised networks have never been greater. Headlines regularly attest to such widespread problems, from infection-felled organizations to dangerous vulnerabilities in popular tools. Companies can’t protect their technological infrastructure, though, without a solid grasp of the actual equipment in play. A checklist, like the one created by Erik … - 22 avril 2024The 7 Best iPhone VPNs (Recommended for 2024)
Which VPN works best on iPhones? Use our guide to compare the pricing and features of the 7 best VPNs for iPhone. - 19 avril 2024Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy
Oxford University researchers used an approach dubbed “blind quantum computing” to connect two quantum computing entities in a way that is completely secure. - 18 avril 2024Kaspersky Study: Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020
Nearly 10 million devices were infected with data-stealing malware in 2023, with criminals stealing an average of 50.9 credentials per device. - 18 avril 2024TechRepublic’s Review Methodology for Password Managers
Our review methodology for password managers involves extensive research, expert analysis and first-hand experience. - 26 mars 2024Everything you need to know about the Microsoft Exchange Server hack
Updated: A new critical vulnerability impacting Exchange Server is being exploited in the wild. - 8 février 20243 million smart toothbrushes were not used in a DDoS attack after all, but it could happen
[UPDATED] What’s next, malware-infected dental floss? But seriously: It’s a reminder that even the smallest smart home devices can be a threat. Here’s how to protect yourself. - 20 octobre 2023How to find and remove spyware from your phone
iPhone and Android users alike are facing more sophisticated surveillance threats than ever before. Suspect you’re being tracked? Here’s what to do right now. - 31 mai 2023Were you caught up in the latest data breach? Here's how to find out
Wondering if your information is posted online from a data breach? Here’s how to check if your accounts are at risk and what to do next. - 6 avril 2023How to delete yourself from internet search results and hide your identity online
Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely. - 13 janvier 2023Hacked! My Twitter user data is out on the dark web — now what?
Your Twitter user data may now be out there too, including your phone number. Here’s how to check and what you can do about it. - 15 décembre 2022Windows: Still insecure after all these years
OPINION: With every Windows release, Microsoft promises better security. And, sometimes, it makes improvements. But then, well then, we see truly ancient security holes show up yet again. - 16 novembre 2022Stop using Twitter to log in to other websites
With Twitter’s growing technical problems, you can’t rely on it as your single sign-on for other sites. - 9 novembre 2022How to keep your home secure when you travel
With travel stressful enough, you don’t need the anxiety of wondering if your home is protected. - 1 novembre 2022OpenSSL dodges a security bullet
The critical security vulnerability turned out to be two serious vulnerabilities. Still, they need patching ASAP.
Wired
Cyber defense magazine
Erreur: Il y a un erreur avec ce flux.
CIO
Aucun contenu.
Tech Republic
ZDnet