dguenaux

2,720 Flips | 6 Magazines | 19 Likes | 1 Following | 69 Followers | @dguenaux | Keep up with dguenaux on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “dguenaux”

Let's Encrypt Now Trusted by All Major Root Programs

<b>Let’s Encrypt root, ISRG Root X1, is now trusted by all major root programs, including Microsoft, Google, Apple, Mozilla, Oracle, and …

Information Security

New genre of artificial intelligence programs take computer hacking to another level

SAN FRANCISCO (Reuters) - The nightmare scenario for computer security - artificial intelligence programs that can learn how to evade even the best defenses - may already have arrived.<p>FILE PHOTO: Servers for data storage are seen at Advania's Thor Data Center in Hafnarfjordur, Iceland August 7, …

Artificial Intelligence

5 méthodes « low tech » un peu étranges pour pénétrer les entreprises

Le vaste terrain de jeu du piratage informatique n'est pas réservé à quelques <i>script-kiddies</i> et autres no-life qui séviraient de leur chambre …

Informatique

L’optimisation des configurations, un des points clé de la sécurité

Dans un contexte toujours plus menaçant, le système d’information est soumis à rude épreuve. Il est devenu obligatoire aujourd’hui de mettre tout en …

Informatique

Voyage en Colombie sans bouger de chez toi grâce à ces conseils culturels

Tu as toujours rêvé de rejoindre les jaguars de Colombie ? Ou ta seule connaissance de ce pays se résume à la musique de Shakira ? Voici de quoi …

Colombie

Gironde : le Groupe Serma s’apprête à acheter NES, et donc à doubler ses effectifs pessacais

Le Groupe Serma, un des leaders indépendants français des services d’expertise dans le domaine des technologies, des systèmes d’information et des …

Nouvelle-Aquitaine

Medical Records of 90 Million People Left Vulnerable to Critical Security Flaws

Security researchers have found more than 20 bugs in the world’s most popular open source software for managing medical records. Many of the …

Information Security

Raspberry Pi Receives Official TensorFlow Artificial Intelligence Framework Support

Raspberry Pi enthusiasts may be interested to know that the Google Machine learning software TensorFlow offering and artificial intelligence …

Machine Learning

Linux kernel bug: TCP flaw lets remote attackers stall devices with tiny DoS attack

'SegmentSmack' Linux bug gives a remote attacker the means to knock out a system with minimal traffic.<p><i>Video: The 2013 flaw that's still used to turn</i> …

Information Security

6 Steps to Make Your Strategic Plan Really Strategic

Why is it that when a group of managers gets together for a strategic planning session they often emerge with a document that’s devoid of “strategy”, and often not even a plan?<p>I have one such document in front of me as I write this. It starts with a “vision” statement, moves on to “strategic …

Management

What are phishing kits? Web components of phishing attacks explained

Phishing is a social attack, directly related to social engineering. Commonly centered around email, criminals use phishing to obtain access or …

Cybersecurity

Industrial controls systems a specialised cyber target

Un terrible "effet domino" menace de transformer notre planète en une étuve

Même si l'humanité réduit les émissions de gaz à effet de serre la planète elle-même pourrait perturber les efforts des hommes et basculer dans un …

Climat

Mac for Hackers: How to Set Up a MacOS System for Wi-Fi Packet Capturing

MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi …

Linux

Singapore explores virtual browsers following SingHealth data breach

Health Ministry is piloting the use of quarantined servers as part of efforts to "reduce the number of potential attack points", following last …

Cybersecurity

Cyber report details tricks used by hackers to target critical infrastructure

A cybersecurity firm says it uncovered the methods and tools hackers use to target critical infrastructure organizations, activity it observed by …

Cybersecurity

Special report: America’s greatest threat is a hurricane-force cyberattack

<b>For the past month,</b> Axios has been interviewing people trusted with the nation’s most sensitive secrets. We wanted to know, in this time of acute …

Cybersecurity

Dents in major cybercrime gang

<i>With help from Eric Geller, Martin Matishak and Cristiano Lima</i><p><b>YOU’RE FIN-ISHED —</b> European police have arrested three alleged senior members of the FIN7 hacking group, which was responsible for a string of major breaches at companies like Saks Fifth Avenue, Whole Foods and Chipotle, the DOJ …

Cybersecurity

Under GDPR, Data Breach Reports in UK Have Quadrupled

Privacy Regulator Sees 1,750 Breach Reports in June, Up From 400 in April Mathew J. Schwartz (euroinfosec) • July 25, 2018<p>The scale of data breaches …

Personal Data

Ransomware attack forces town's employees to go back to typewriters

A borough and a town in Alaska have been hit by a devastating ransomware attack, forcing employees to completely forego computers and go back to …

My Health Record: Deleting personal information from databases is harder than it sounds

Since the period for opting out of My Health Record began on July 16, experts in health, privacy and IT have raised concerns about the security and …

Privacy

The Wild Inner Workings of a Billion-Dollar Hacking Group

The Fin7 hacking group has leeched, by at least one estimate, well over a billion dollars from companies around the world. In the United States …

U.S. Department of Justice

Firms Are Ill-Prepared For Email Attacks: Study

IT personnel are greatly worried about email phishing attacks. But only 29% say their firms are taking serious steps to prevent them, and a minority …

Cybersecurity

Security Think Tank: Top things to consider in security outsourcing

Follow:<p>Outsourcing cyber security operations is not only possible, but highly attractive – especially in the face of increasing complexity, the …

Outsourcing

Shipping Giant Cosco Hit by Ransomware Attack

Networks in Eight North and South America Countries Offline Mathew J. Schwartz (euroinfosec) • July 26, 2018<p><i>(Update: In a July 30 statement, Cosco</i> …

Ransomware

Pourquoi les e-commerçants vont se doter d'un service de cyber-renseignement

Demain, les e-commerçants choisiront de fermer boutique quatre heures en plein boom de Noël, car ils sauront qu'une cyberattaque les cible à ce …

Blockchain

Iowa Health Group Data Breach Hits 1.4 Million Patients

UnityPoint Health Says Hackers' Likely Goal Was Business Email Compromise Fraud Jeremy Kirk (jeremy_kirk) • July 31, 2018<p>A large Midwestern health …

Cybersecurity

Report: The SamSam Ransomware Has Extorted $5.9 Million, and One Person Might Be Behind It

A recent review by UK cybersecurity firm Sophos in partnership with cryptocurrency firm Neutrino has concluded that the crew—or possibly one …

New Mexico

WATCH Live: DHS National Cybersecurity Summit

By SecurityWeek Video on July 31, 2018<p>The DHS National Cybersecurity Summit will bring together a diverse group of stakeholders across government, …

Cybersecurity

After Cyberattack, Cosco Uses Yahoo Mail to Communicate

Chinese state-owned shipping conglomerate Cosco announced Monday that its North American operations have "totally recovered" from last week's …

Yahoo Mail