Catégorie : #SECURITE
L’actualité de la sécurité informatique et de la cybersécurité, traitant de l’actualité francophone et anglophone de la sécurité informatique, du hacking et des programmes informatiques à visée malveillante.
Cybersécurité : création du BlackBerry Labs centré sur le machine learning et la datascience
Pour répondre aux enjeux en matière de cybersécurité, BlackBerry vient d’annoncer la création du BlackBerry Advanced Technology Development Labs. Cette business unit sera centrée sur la datascience et le machine learning au service de la cybersécurité. Plus de 120 experts composeront cette unité. Source : https://www.actuia.com/actualite/cybersecurite-creation-du-blackberry-labs-centre-sur-le-machine-learning-et-la-datascience/ Date : October 2,…
#Privacy: FBI warns US organisations not to pay ransomware demands
The US Federal Bureau of Investigation (FBI) has issued a public service announcement informing organisations about high-impact ransomware attacks. Source : https://gdpr.report/news/2019/10/03/privacy-fbi-warns-us-organisations-not-to-pay-ransomware-demands/ Date : October 3, 2019 at 04:52PM Tag(s) : #RGPD ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Comment l’IA transforme la cybersécurité
L’Intelligence Artificielle promet de révolutionner la perception de la cybersécurité au coeur des entreprises, mais pas uniquement. Ce changement de paradigme engage, en effet, une redéfinition complète des règles du jeu pour les DSI et les RSSI, ainsi que l’ensemble des acteurs de la sécurité. Source : https://www.linformaticien.com/services/livres-blancs/id/51768/comment-l-ia-transforme-la-cybersecurite.aspx Date :…
Cisco Releases Security Updates
Original release date: October 3, 2019 Cisco has released security updates to address vulnerabilities affecting multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. Source : https://www.us-cert.gov/ncas/current-activity/2019/10/03/cisco-releases-security-updates Date : October 3, 2019 at 05:10PM Tag(s) : US GOV Share this……
How to Create an Anonymous Digital Identity Using Cryptocurrency
If you could go back in time and do the internet all over again, what would you change? Would you think twice about joining Facebook, decline to upload those fancy dress photos from ‘09 and delete that rhetoric-laden blog post instead of hitting ‘Publish’? It’s too late to undo the…
How to Prepare Your Security Operations for the Continuing IoT Upsurge
Source : https://securityboulevard.com/2019/10/how-to-prepare-your-security-operations-for-the-continuing-iot-upsurge/ Date : October 3, 2019 at 08:55AM Tag(s) : #IOT ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Hospital ‘had to find scrap of paper’ to confirm disabled boy’s surgery after cyber attack
The mother of a 12-year-old boy with cerebral palsy says he’s only been able to receive a medical procedure because hospital staff found her contact details on « a scrap of paper ». Source : https://it.einnews.com/article/498183807/uUfMqswboAspeFCZ?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : October 3, 2019 at 11:18AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter…
Trend Micro to Demonstrate the Art of Cybersecurity at GITEX Technology Week 2019
… , and South Asia, especially as cyber-attacks caused USD 12.5 billion … Source : https://it.einnews.com/article/498181435/ei3MogIMIHYwG69P?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : October 3, 2019 at 10:48AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Communications-Ministry-Launches-Two-Cyber-Security-Platforms
… regionally and globally. He said cyber attacks were likely to escalate in … Source : https://it.einnews.com/article/498188632/08rAz4Eg35ONg0Ax?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : October 3, 2019 at 12:19PM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Cyber Bill seeks to safeguard citizens
… Zimbabweans are safe online. « Cyber attacks threaten and cost our economy … Source : https://it.einnews.com/article/498193591/fBAL_ZN0HdsEU9YX?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : October 3, 2019 at 01:20PM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
#SECURITY: Non-disclosure of Data Breaches Negatively Affects Acquisitions and Mergers
A recent study has shown that a company’s cybersecurity program, and how it has handled any history of data breaches, has a significant impact on its monetary sales value. Source : https://gdpr.report/news/2019/10/03/security-non-disclosure-of-data-breaches-negatively-affects-acquisitions-and-mergers/ Date : October 3, 2019 at 12:57PM Tag(s) : #RGPD ENG Share this… Email Facebook Twitter Linkedin Whatsapp…
Google propose de simplifier la confidentialité et la sécurité pour tous
Dans un nouveau billet publié sur son blog, Google France rappelle que l’entreprise avait déjà – au cours de l’année 2019 – commencé à proposer plus de moyens pour protéger ses données, notamment en facilitant l’accès aux paramètres de contrôle, en déployant le mode navigation privée sur d’autres services Google…
Les PDF chiffrés vulnérables à deux types d’attaques, les données exfiltrables
Des chercheurs allemands ont trouvé le moyen de récupérer des données dans des PDF chiffrés et protégés par des mots de passe. Plutôt que de devoir percer les défenses ou contourner … Source : https://www.nextinpact.com/brief/les-pdf-chiffres-vulnerables-a-deux-types-d-attaques–les-donnees-exfiltrables-9858.htm Date : October 3, 2019 at 10:09AM Tag(s) : Médias spécialisés Share this… Email Facebook…
Enterprises Are Leaving IoT Devices Vulnerable to Cybersecurity Threats, Finds nCipher Security
Source : https://www.businesswire.com/news/home/20191003005008/en/Enterprises-Leaving-IoT-Devices-Vulnerable-Cybersecurity-Threats Date : October 3, 2019 at 10:27AM Tag(s) : #IOT ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Cybersecurity masterplan launched
Cyber-attacks comprise one-fifth of overall … Source : https://it.einnews.com/article/498172834/gkrpKFSHmjAI32ZP?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : October 3, 2019 at 08:15AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
How an unopened email started a ‘sophisticated’ cyber attack on ANU
Source : https://it.einnews.com/article/498146081/ndMCN5JHEqe9imVr?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : October 3, 2019 at 02:43AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Gone phishing: How easy is it to fall for a fake email?
Phishing emails are a major concern in cyber security. Source : https://www.cityam.com/how-easy-to-fall-for-fake-phishing-email/ Date : October 3, 2019 at 01:06AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Secure sensitive data with Cisco’s extended security pack
Cisco Webex was architected with a 360 approach to security. Source : https://blogs.cisco.com/collaboration/do-the-impossible-deliver-the-best-collaboration-experience-and-secure-sensitive-data-with-ciscos-extended-security-pack Date : October 3, 2019 at 01:06AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Learning cybersecurity is as easy as playing a game
Why gamification can make security less of a chore. Source : https://newsroom.cisco.com/feature-content?type=webcontent&articleId=2017217&utm_source=newsroom.cisco.com&utm_campaign=Feature_2017217&utm_medium=RSS Date : October 3, 2019 at 01:06AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
The value of threat hunting
Threat hunting: A security practice where you look for threats that managed to get past your defenses & have hidden themselves within your environmen Source : https://blogs.cisco.com/security/the-value-of-threat-hunting Date : October 3, 2019 at 01:06AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print