Magazines

Retour à Sécurité

Les Affaires – Cyber sécurité

    Wired

    Cyber defense magazine

      • Germany’ BSI chief says ‘No Evidence’ of Huawei spying 18 décembre 2018
        The head of Germany’s BSI admitted that since now there is no proof espionage activity conducted through Huawei technology. US first, and many other countries after, have decided to ban network equipment manufactured by the Chinese telecom giant Huawei. In November 2018, the Wall Street Journal reported that the US Government is urging its allies, including Germany, to exclude Huawei from cr …

      • Twitter fixed a bug that could have exposed Direct Messages to third-party apps 17 décembre 2018
        Researcher Terence Eden discovered that the permissions dialog when authorizing certain apps to Twitter could expose direct messages to the third-party. The flaw is triggered when apps that require a PIN to complete the authorization process instead of the using the OAuth protocol. The expert discovered that some permissions such as that to access direct messages, remained hidden to the Twitter us …

      • Cyber attack hit the Italian oil and gas services company Saipem 13 décembre 2018
        Some of the servers of the Italian oil and gas services company Saipem were hit by a cyber attack early this week. Saipem has customers in more than 60 countries, including Saudi Arabian oil and gas giant Saudi Aramco. It could be considered a strategic target for a broad range of threat actors. The attack has been identified out of India on Monday and primarily affected the servers in the Middle …

      • RSA® CONFERENCE ANNOUNCES INITIAL 2019 KEYNOTE SPEAKERS 12 décembre 2018
        Information on additional speakers and session content coming in the new year BEDFORD, MA – Dec. 12, 2018 – RSA Conference, the world’s leading information security conferences and expositions, today announces its initial line-up of keynote speakers for the 2019 Conference, which begins Monday, March 4 and runs through Friday, March 8 in San Francisco, CA. The keynote program will culminate with a …

      • News Alert: December Patch Tuesday 11 décembre 2018
        Updates for Windows, Office, .Net Framework, Adobe, Firefox and More by Chris Goettl, Director of Product Management, Security, Ivanti If you saw the Patch Tuesday forecast for December, the reality turned out to be fairly close to what I predicted. There are only a few surprises and additional concerns to note. December Patch Tuesday Summary: Microsoft released a total of 17 updates resolving 39 …

      • WordPress botnet composed of +20k installs targets other sites 11 décembre 2018
        Experts from security firm Wordfence discovered a Botnet of 20,000 WordPress Sites Infecting other WordPress installs. Experts from security firm Wordfence uncovered a botnet composed of over 20,000 WordPress sites that is being used to compromise other websites running on the popular CMS and recruit them. “The threat actors (hackers) use a group of four command and control (C2) servers to s …

      • Risk Management of Third-Party Vendors: The Devil is in the Details 10 décembre 2018
        Third-party vendors are critical assets to business practices. However, without the proper risk assessment policies in place, they can also represent some of the largest potential threats to an organization’s security posture. In fact, many of the famous data breaches (e.g., Target in 2013) originated through third-party vendor access. For this reason, security teams must efficiently manage vendor …

      • Evidence in Marriott’s subsidiary Starwood hack points out to China intel 10 décembre 2018
        According to a report published by the Reuters, the massive Marriott data breach was carried out by Chinese state-sponsored hackers. According to the Reuters, people investigating the Marriot data breach believe that it is the result of a cyberattack carried out by Chinese hackers. Last week Marriott International announced that hackers compromised guest reservation database at its subsidiary Star …

      • Email accounts of top NRCC officials were hacked in 2018 7 décembre 2018
        Threat actors had access to the email accounts of at least four NRCC aides and spied on thousands of sent and received emails for several months. The email system at the National Republican Congressional Committee (NRCC), the Republican Party’s campaigning arm, was hacked. The news was first reported by Politico, later the committee admitted the intrusion and confirmed that attackers had acc …

      • Bug Bounty Hackers Bill Introduced into the US Senate 7 décembre 2018
        A bipartisan pair of US Senators introduced a bill that would require the US Department of Homeland Security to create an ongoing program to allow security experts to report bugs on agency websites. The Public-Private Cybersecurity Cooperation Act, introduced Thursday by Sen. Rob Portman, R-Ohio, and Maggie Hassan, D-N.H., requires Homeland Security to create a vulnerability disclosure program so …

    CIO

      • 3 ways Mastercard uses AI to fight fraud 3 décembre 2018
        Credit card giant Mastercard envisions a future where consumers make purchases not only from smartphones, but via virtual assistants, cars and other connected machines. But with hackers trolling the dark corners of the web to grab financial gain with minimal effort, Mastercard must also be able to vet and secure purchases in mere milliseconds.To facilitate its vision for a veritable Cambrian explo …

      • Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95 13 novembre 2018
        iDrive has activated a significant discount on their Remote access software RemotePC in these days leading into Black Friday. RemotePC by iDrive is a full-featured remote access solution that lets you connect to your work, home or office computer securely from anywhere, and from any iOS or Android device. Right now, their 50 computer package is 90% off or just $6.95 for your 1st year. If you’ve be …

      • IDG Contributor Network: Unique collaboration turned a governor’s vision of a cyber center into reality 25 octobre 2018
        A recent McKinsey article states that cyberattacks are costly, and they appear to be broadening in scope. Every corporate boardroom and even federal, state and local government agencies are discussing how to avert cyber threats. The State of Georgia is addressing this issue.Governor Nathan Deal announced his vision for a Cyber Center in his State of the State Address on January 11, 2017. It was mo …

      • IDG Contributor Network: Lack of C-suite collaboration hampering cybersecurity, report finds 9 octobre 2018
        Today’s businesses depend on constant, intimate digital relationships with suppliers, partners, and customers to remain top of mind and competitive. Intelligent technologies and big data often play a critical role across business operations—from C-suite decision-making to generating customized offers for online shoppers. Countless terabytes of data are stored in the cloud and more work is performe …

      • The 6 best password managers 25 mai 2017
        Thanks to the continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager. It’s one of the easiest too.A password manager is an excellent first step in securing your online identity, hel …

      • Network monitoring tools: Features users love and hate 1 mai 2017
        Managing the health of the corporate network will directly affect the productivity of every user of that network. So network administrators need a robust network monitoring tool that helps them manage the network, identify problems before they cause downtime, and quickly resolve issues when something goes wrong.Five of the top network monitoring products on the market, according to users in the IT …

      • Fight firewall sprawl with AlgoSec, Tufin, Skybox suites 10 avril 2017
        New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren’t perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving.The problem network administr …

      • Backup software features that IT managers love and hate 5 avril 2017
        With corporate data more important than ever, selecting the best data backup and recovery software for the organization would be a career-enhancing move. According to online reviews by enterprise users in the IT Central Station community, three of the top backup and recovery products on the market are Veeam Backup, HP Enterprise’s Data Protector, and Altaro VM Backup. What do enterprise users real …

      • Zix wins 5-vendor email encryption shootout 13 mars 2017
        Email encryption products have made major strides since we last looked at them nearly two years ago. They have gotten easier to use and deploy, thanks to a combination of user interface and encryption key management improvements, and are at the point where encryption can almost be called effortless on the part of the end user. Our biggest criticism in 2015 was that the products couldn’t cover mult …

      • 5 open source security tools too good to ignore 21 février 2017
        Open source is a wonderful thing. A significant chunk of today’s enterprise IT and personal technology depends on open source software. But even while open source software is widely used in networking, operating systems, and virtualization, enterprise security platforms still tend to be proprietary and vendor-locked. Fortunately, that’s changing.  If you haven’t been looking to open source to help …

    Tech Republic

    ZDnet