Les Affaires – Cyber sécurité
- 10 décembre 2018Protéger votre entreprise des cybermenaces
Vol de données, fraude, piratage informatique, rançongiciel… Savez-vous que chaque jour votre entreprise peut être confrontée …
- 30 novembre 2018Jusqu'à 500 millions de clients touchés par un piratage du groupe hôtelier Marriott
Le géant mondial de l’hôtellerie Marriott a annoncé vendredi le piratage d’une base de données pouvant contenir les informations d’environ 500 millions de …
- 29 novembre 2018Le compte Twitter du secrétaire au Trésor américain piraté?
Le secrétaire américain au Trésor Steven Mnuchin a été contraint mercredi de supprimer un tweet envoyé par une personne inconnue qui a eu un …
- 28 novembre 2018Le PDG de Google devant le Congrès américain le 5 décembre
Le PDG de Google, Sundar Pichai, témoignera lors d’une audition au Congrès la semaine prochaine où les parlementaires américains l’interpelleront sur la …
- 28 novembre 2018É-U: deux inculpations pour des cyberattaques contre des hôpitaux
Deux Iraniens ont été inculpés aux États-Unis pour avoir attaqué depuis l’Iran les systèmes informatiques de villes et d’institutions …
- 27 novembre 2018Des employés de Google rejettent le projet de moteur de recherche en Chine
Une centaine d’employés de Google ont publiquement exigé mardi que le géant d’internet abandonne un projet de moteur de recherche en Chine respectant les règles …
- 27 novembre 2018Google accusé de manipulation pour espionner des utilisateurs
Sept organisations européennes de consommateurs ont saisi mardi des régulateurs nationaux en reprochant à Google de manipuler ses utilisateurs pour «espionner» …
- 3 octobre 2018La cybersécurité, une opportunité ?
- 17 novembre 2016Cyberattaques: l'escalade continue
L’énorme panne informatique du 21 octobre dernier, une cyberattaque qui a paralysé quelques dizaines des sites Web parmi les plus …
- 17 novembre 2016Faire des affaires en ligne à l'ère du président Trump
L’élection de Donald Trump à la présidence américaine ne calmera pas le secteur déjà chaud de la cybersécurité. On peut …
- 17 novembre 2016Cinq façons de préparer votre entreprise face aux cybermenaces
Elles sont nombreuses, elles sont partout… mais elles peuvent être déjouées assez simplement. Qu’il s’agisse de protéger ses données …
- 17 novembre 2016Cyberattaques: l'escalade continue
- 8 août 2022Github Moves to Guard Open Source Against Supply Chain Attacks
The popular Microsoft-owned code repository plans to roll out code signing, which will help beef up the security of open source projects. - 8 août 2022A Phone Carrier That Doesn’t Track Your Browsing or Location
The new Pretty Good Phone Privacy service for Android hides the data linking you to your mobile device. - 7 août 2022How to Use Lockdown Mode in iOS 16 to Make Your Phone More Secure
Whether you want to turn off link previews or block unwanted FaceTime calls, here’s what you need to know. - 6 août 2022The US Emergency Alert System Has Dangerous Flaws
Plus: A crypto-heist extravaganza, a peek at an NSO spyware dashboard, and more. - 6 août 2022An ISP Settled Piracy Lawsuits. Could Users Take the Hit?
Now that Charter has reached settlements with major record labels, it’s unclear whether the cable provider will pull the plug on users who pirate music. - 5 août 2022A Slack Bug Exposed Some Users’ Hashed Passwords for 5 Years
The exposure of cryptographically scrambled passwords isn’t a worst-case scenario—but it isn’t great, either. - 5 août 2022All the Data Amazon's Ring Cameras Collect About You
The popular security devices are tracking (and sharing) more than you might think. - 4 août 2022An Attack on Albanian Government Suggests New Iranian Aggression
A Tehran-linked hack of a NATO member marks a significant escalation against the backdrop of US-Iran nuclear talks. - 3 août 2022The Microsoft Team Racing to Catch Bugs Before They Happen
What’s it like to be responsible for a billion people’s digital security? Just ask the company’s Morse researchers. - 3 août 2022A New Attack Easily Knocked Out a Potential Encryption Algorithm
SIKE was a contender for post-quantum-computing encryption. It took researchers an hour and a single PC to break it. - 8 août 2022Why Physical Security Should Be Part of a Cybersecurity Strategy
By David Weingot, Founder and CEO, DMAC Security Our modern world is full of various types of physical […] The post Why Physical Security Should Be Part of a Cybersecurity Strategy appeared first on Cyber Defense Magazine. … - 7 août 2022Cybersecurity: Why We’re Stronger Together
Advocating for greater security collaboration between businesses, law enforcement, and government By Nicole Mills, Exhibition Director at Infosecurity […] The post Cybersecurity: Why We’re Stronger Together appeared first on Cyber Defense Magazine. … - 6 août 2022Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World
By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a mantra popularized […] The post Great Power Brings Great Responsibility: How to Keep Cloud Databases Secure in an Uncertain World appeared first on Cyber Defense Magazine. … - 5 août 2022To Secure Saas, Combine Top Compliance Frameworks with An SSPM
The explosion in the number and variety of SaaS apps used by enterprises has created both opportunities and […] The post To Secure Saas, Combine Top Compliance Frameworks with An SSPM appeared first on Cyber Defense Magazine. … - 4 août 2022Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity
By Sydney Asensio, Head of Operations at 2020 Partners As a woman who has recently entered the cybersecurity […] The post Barriers To Entry Must Be Brought Down If More Women Are to Enter Cybersecurity appeared first on Cyber Defense Magazine. … - 3 août 2022The greatest threat to our critical infrastructure: Fortune 1000 employees
A new SpyCloud report finds critical infrastructure companies struggle with password hygiene and rampant malware infections. By Joel […] The post The greatest threat to our critical infrastructure: Fortune 1000 employees appeared first on Cyber Defense Magazine. … - 3 août 2022eSentire Discovers Hackers Spearphishing Hiring Managers with Resumes Poisoned with More_Eggs Malware
By Keegan Keplinger, Research and Reporting Lead, Threat Response Unit, eSentire In March eSentire’s security research team, the […] The post eSentire Discovers Hackers Spearphishing Hiring Managers with Resumes Poisoned with More_Eggs Malware appeared first on Cyber Defense Magazine. … - 2 août 2022What Makes A USB Bad – And How Should Organizations Resolve This Risk?
When ransomware can attack organizations via USB drives and cables, best practice backup and security becomes even more […] The post What Makes A USB Bad – And How Should Organizations Resolve This Risk? appeared first on Cyber Defense Magazine. … - 1 août 2022Why Aren’t More Companies Capitalizing on Packet Capture?
By Cary Wright, VP of Product Management, Endace In a threat landscape that is now changing more rapidly […] The post Why Aren’t More Companies Capitalizing on Packet Capture? appeared first on Cyber Defense Magazine. … - 31 juillet 2022aiXDR Brief
By Randy Blasik, V.P. of Technology Solutions, Seceon Inc. Introduction. aiXDR with its, novel approach focusing on detecting […] The post aiXDR Brief appeared first on Cyber Defense Magazine. … - 8 août 2022How older security vulnerabilities continue to pose a threat
Security flaws dating back more than 10 years are still around and still pose a risk of being freely exploited, says Rezilion. The post How older security vulnerabilities continue to pose a threat appeared first on TechRepublic. … - 8 août 2022How to protect your organization from the top malware strains
A joint advisory from the U.S. and Australia offers tips on combating the top malware strains of 2021, including Agent Tesla, LokiBot, Qakbot, TrickBot and GootLoader. The post How to protect your organization from the top malware strains appeared first on TechRepublic. … - 8 août 2022The metaverse faces more than 8 potential cyberthreats
As technologies, hardware and infrastructure mature, metaverse-like apps will converge and with that comes the potential for cyberthreats, a new report from Trend Micro finds. The post The metaverse faces more than 8 potential cyberthreats appeared first on TechRepublic. … - 8 août 2022Deepfake attacks and cyber extortion are creating mounting risks
Email is the top delivery method used by cybercriminals deploying geopolitically-motivated attacks to try and move laterally inside networks, a new VMware report finds. The post Deepfake attacks and cyber extortion are creating mounting risks appeared first on TechRepublic. … - 5 août 2022TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project. The post TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download appeared first on TechRepublic. … - 5 août 20227 best Acronis integrations and features
Choosing additional security functionality for your software has never been easier. Here are some of the best Acronis integrations and features for your solutions. The post 7 best Acronis integrations and features appeared first on TechRepublic. … - 5 août 2022How to use Authy: A guide for beginners
Learn how to set up and sync Authy on all your devices for easy two-factor authentication.
The post How to use Authy: A guide for beginners appeared first on TechRepublic.
- 4 août 2022Protect your data and work from anywhere with this docking station
Ensure your data receives maximum protection with the 13-in-1 Docking Station with Dual HDMI.
The post Protect your data and work from anywhere with this docking station appeared first on TechRepublic.
- 4 août 2022Verizon: Mobile attacks up double digits from 2021
With more people using their mobile devices for work and personal use, hackers are exploiting the vulnerabilities these activities create. The post Verizon: Mobile attacks up double digits from 2021 appeared first on TechRepublic. … - 4 août 2022One in three organizations now hit by weekly ransomware attacks
More than 40% of IT pros surveyed by Menlo Security said they worry about ransomware evolving beyond their knowledge and skills. The post One in three organizations now hit by weekly ransomware attacks appeared first on TechRepublic. … - 8 août 2022How to find out if you are involved in a data breach — and what to do next
Here’s a guide highlighting the tools you can use to determine if your account is at risk. - 23 juillet 2022Here are the top phone security threats in 2022 and how to avoid them
Your handset is always at risk of being exploited. Here’s what to look out for. - 22 juillet 2022How to find and remove spyware from your phone
Surveillance apps are becoming more advanced. Here’s what to do if you think you’re being tracked. - 7 juillet 2022How to keep your home secure when you travel
With travel stressful enough, you don’t need the anxiety of wondering if your home is protected. - 5 juillet 2022Google to wipe user location history for visits to healthcare clinics, domestic violence shelters
Even if location history is enabled, visits to locations considered sensitive will be removed from logs. - 5 juillet 2022This WhatsApp scam promises big, but just sends you into a spiral
Worker shortages are the hook for the phoney government’s ‘offer.’ - 5 juillet 2022Ukrainian police takes down phishing gang behind payments scam
Gang may have defrauded 5,000 people with promises of EU support. - 4 juillet 2022Virtual-world tech company owner arrested over alleged $45m investment fraud scheme
Investment fraud scheme defrauded more than 10,000 victims, says Department of Justice. - 4 juillet 2022The British Army is investigating after its Twitter and YouTube accounts were hijacked
The hijackers used the accounts to promote cryptocurrency and NFTs. - 29 juin 2022Period tracking apps are no longer safe. Delete them
Opinion: The convenience isn’t worth the risk.
Wired
Cyber defense magazine
CIO
Aucun contenu.
Tech Republic
ZDnet