Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490
Les Affaires – Cyber sécurité
- 10 décembre 2018Protéger votre entreprise des cybermenaces
Vol de données, fraude, piratage informatique, rançongiciel… Savez-vous que chaque jour votre entreprise peut être confrontée …
- 30 novembre 2018Jusqu'à 500 millions de clients touchés par un piratage du groupe hôtelier Marriott
Le géant mondial de l’hôtellerie Marriott a annoncé vendredi le piratage d’une base de données pouvant contenir les informations d’environ 500 millions de …
- 29 novembre 2018Le compte Twitter du secrétaire au Trésor américain piraté?
Le secrétaire américain au Trésor Steven Mnuchin a été contraint mercredi de supprimer un tweet envoyé par une personne inconnue qui a eu un …
- 28 novembre 2018Le PDG de Google devant le Congrès américain le 5 décembre
Le PDG de Google, Sundar Pichai, témoignera lors d’une audition au Congrès la semaine prochaine où les parlementaires américains l’interpelleront sur la …
- 28 novembre 2018É-U: deux inculpations pour des cyberattaques contre des hôpitaux
Deux Iraniens ont été inculpés aux États-Unis pour avoir attaqué depuis l’Iran les systèmes informatiques de villes et d’institutions …
- 27 novembre 2018Des employés de Google rejettent le projet de moteur de recherche en Chine
Une centaine d’employés de Google ont publiquement exigé mardi que le géant d’internet abandonne un projet de moteur de recherche en Chine respectant les règles …
- 27 novembre 2018Google accusé de manipulation pour espionner des utilisateurs
Sept organisations européennes de consommateurs ont saisi mardi des régulateurs nationaux en reprochant à Google de manipuler ses utilisateurs pour «espionner» …
- 3 octobre 2018La cybersécurité, une opportunité ?
- 17 novembre 2016Cyberattaques: l'escalade continue
L’énorme panne informatique du 21 octobre dernier, une cyberattaque qui a paralysé quelques dizaines des sites Web parmi les plus …
- 17 novembre 2016Faire des affaires en ligne à l'ère du président Trump
L’élection de Donald Trump à la présidence américaine ne calmera pas le secteur déjà chaud de la cybersécurité. On peut …
- 17 novembre 2016Cinq façons de préparer votre entreprise face aux cybermenaces
Elles sont nombreuses, elles sont partout… mais elles peuvent être déjouées assez simplement. Qu’il s’agisse de protéger ses données …
- 17 novembre 2016Cyberattaques: l'escalade continue
- 2 février 2023Netflix’s US Password-Sharing Crackdown Isn’t Happening—Yet
Accidental revisions to a US Help Center page sparked confusion about the streamer’s next moves. But restrictions on account sharing are still coming soon. - 1 février 2023Enter the Hunter Satellites Preparing for Space War
True Anomaly, a startup backed by US senator JD Vance’s VC firm, plans to launch prototype pursuit satellites on a SpaceX flight later this year. - 31 janvier 2023You Really Need to Update Firefox and Android Right Now
January saw a slew of security patches for iOS, Chrome, Windows, and more. - 30 janvier 2023The Untold Story of a Crippling Ransomware Attack
More than two years ago, criminals crippled the systems of London’s Hackney Council. It’s still fighting to recover. - 28 janvier 2023A Link to News Site Meduza Can (Technically) Land You in Russian Prison
Plus: Hive ransomware gang gets knocked offline, FBI confirms North Korea stole $100 million, and more. - 27 janvier 2023ADS-B Exchange, the Flight Tracker That Powered @ElonJet, Sold to Jetnet
ADS-B Exchange, beloved for resisting censorship, was sold to a company owned by private equity—and now even its biggest fans are bailing. - 26 janvier 2023Most Criminal Cryptocurrency Funnels Through Just 5 Exchanges
The crypto money-laundering market is tighter than at any time in the past decade, and the few big players are moving a “shocking” amount of currency. - 26 janvier 2023The Best Personal Safety Devices, Apps, and Alarms (2023)
Your smartphone or wearable could help you out in a truly dangerous situation. Here are some options to consider. - 24 janvier 2023The Unrelenting Menace of the LockBit Ransomware Gang
The notorious Russian-speaking cybercriminals grew successful by keeping a low profile. But now they have a target on their backs. - 23 janvier 2023Flaw in Diksha App Exposed the Data of Millions of Indian Students
A mandatory app exposed the personal information of students and teachers across the country for over a year. - 2 février 2023Study: Companies have upwards of 1,000 apps but only a third are integrated
A new study by Salesforce’s MuleSoft suggests more isn’t necessarily better if an organization’s applications are not playing well together. Unfortunately, more than 70% remain disconnected from one another and the core business. The post Study: Companies have upwards of 1,000 apps but only a third are integrated appeared first on TechRepublic. … - 2 février 2023Prilex POS malware evolves to block contactless transactions
A new version of the Prilex POS malware has found a novel way to steal your credit card information.
The post Prilex POS malware evolves to block contactless transactions appeared first on TechRepublic.
- 2 février 2023Lifetime VPNSecure subscriptions are now just $39.99
Secure your internet connection now with VPNSecure while it’s still on sale.
The post Lifetime VPNSecure subscriptions are now just $39.99 appeared first on TechRepublic.
- 1 février 2023The headache of changing passwords
Change Your Password Day — an annual reminder of just how bad passwords really are.
The post The headache of changing passwords appeared first on TechRepublic.
- 1 février 2023New cybersecurity BEC attack mimics vendors
A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post New cybersecurity BEC attack mimics vendors appeared first on TechRepublic. … - 1 février 2023OneNote documents spread malware in several countries
A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post OneNote documents spread malware in several countries appeared first on TechRepublic. … - 1 février 2023Access management policy
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy … The post Access management policy appeared first on … - 31 janvier 2023CIOs hold greater organizational leadership status
Foundry’s study found the role has been significantly elevated because of the economy, and CIOs are recognized as strategic business partners by their LOB peers. The post CIOs hold greater organizational leadership status appeared first on TechRepublic. … - 31 janvier 2023IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from TechRepublic Premium offers guidelines for governing access to critical systems and confidential data. From the policy: SUMMARY IT … The post I … - 30 janvier 2023Get nine ethical hacking courses for just $30
Learn some of today’s most popular attacks and how to mitigate them with The All-in-One Ethical Hacking & Penetration Testing Bundle.
The post Get nine ethical hacking courses for just $30 appeared first on TechRepublic.
- 13 janvier 2023Hacked! My Twitter user data is out on the dark web — now what?
Your Twitter user data may now be out there too, including your phone number. Here’s how to check and what you can do about it. - 15 décembre 2022Windows: Still insecure after all these years
OPINION: With every Windows release, Microsoft promises better security. And, sometimes, it makes improvements. But then, well then, we see truly ancient security holes show up yet again. - 16 novembre 2022Stop using Twitter to log in to other websites
With Twitter’s growing technical problems, you can’t rely on it as your single sign-on for other sites. - 9 novembre 2022How to keep your home secure when you travel
With travel stressful enough, you don’t need the anxiety of wondering if your home is protected. - 1 novembre 2022OpenSSL dodges a security bullet
The critical security vulnerability turned out to be two serious vulnerabilities. Still, they need patching ASAP. - 8 août 2022How to find out if you are involved in a data breach — and what to do next
Here’s a guide highlighting the tools you can use to determine if your account is at risk. - 23 juillet 2022Here are the top phone security threats in 2022 and how to avoid them
Your handset is always at risk of being exploited. Here’s what to look out for. - 22 juillet 2022How to find and remove spyware from your phone
Surveillance apps are becoming more advanced. Here’s what to do if you think you’re being tracked. - 5 juillet 2022Google to wipe user location history for visits to healthcare clinics, domestic violence shelters
Even if location history is enabled, visits to locations considered sensitive will be removed from logs. - 5 juillet 2022This WhatsApp scam promises big, but just sends you into a spiral
Worker shortages are the hook for the phoney government’s ‘offer.’
Wired
Cyber defense magazine
Erreur: Il y a un erreur avec ce flux.
CIO
Aucun contenu.
Tech Republic
ZDnet