Seenthis
•
 
Identifiants personnels
  • [mot de passe oublié ?]

 
  • #c
  • #cyber
RSS: #cybersecurity

#cybersecurity

  • #cybersecurity-jobs
  • #cybersecurity-field
0 | 25 | 50 | 75 | 100
  • @oanth_rss
    oAnth_RSS @oanth_rss via RSS CC BY 12/02/2021

    What’s most interesting about the Florida water system hack? That w...
    ▻https://diasp.eu/p/12440938

    What’s most interesting about the Florida water system hack? That we heard about it at all | #water #cybersecurity #scada #hack

    oAnth_RSS @oanth_rss via RSS CC BY
    Écrire un commentaire

  • @oanth_rss
    oAnth_RSS @oanth_rss via RSS CC BY 11/02/2021

    Hacker increased chemical level at Oldsmar’s city water system, she...
    ▻https://diasp.eu/p/12435641

    Hacker increased chemical level at Oldsmar’s city water system, sheriff says | #cybersecurity #water

    oAnth_RSS @oanth_rss via RSS CC BY
    Écrire un commentaire

  • @oanth_rss
    oAnth_RSS @oanth_rss CC BY 15/09/2020

    IT-Ausfall an Uniklinik Düsseldorf betrifft immer mehr Patienten
    ▻https://diasp.eu/p/11652238

    IT-Ausfall an Uniklinik Düsseldorf betrifft immer mehr Patienten

    Der IT-Ausfall an der Uniklinik Düsseldorf hat gravierende Folgen für immer mehr Patienten. Experten gehen von einem Hackerangriff auf. IT-Ausfall an Uniklinik Düsseldorf betrifft immer mehr Patienten #Cybersecurity #Düsseldorf #Hacking #Klinik

    oAnth_RSS @oanth_rss CC BY
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 9/06/2020

    FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… #cybersecurity #datasec
    ▻https://mobile.twitter.com/K1ng0fNo0b/status/1269978213360570370?p=v

    FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… #cybersecurity #datasec

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 8/06/2020

    Five Fields Where 5G Will Make A Difference

    With the advent of the 5G wireless technology at the horizon, some industries can’t wait to implement the new network so they can move forward with developing new equipment. 5G stands at the precipic…

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
    #cybersecurity #datasec

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 6/06/2020

    MIT: If chips can’t get smaller, then coders have to get smarter

    Digital transformation trends in 2020: What to expect Many of the tech devices we take for granted are made possible because of improvements in computing power over the years that have not only made …

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
    #marketing #cybersecurity

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 4/06/2020

    FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… Merci à @JayDubcity16 #cybersecurity #cloud
    ▻https://mobile.twitter.com/K1ng0fNo0b/status/1268528669330464773?p=v

    FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… Merci à @JayDubcity16 #cybersecurity #cloud

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 31/05/2020

    Computer science student discovers privacy flaws in security and doorbell cameras

    Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to systemic design flaws discovered by Florida Tech computer science student…

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
    #nintendo #cybersecurity

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 31/05/2020

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=1d9dcf10-a33f-11ea-be0f-0cc47a0d1609 … #nintendo #cybersecurity
    ▻https://twitter.com/K1ng0fNo0b/status/1267079247488864256

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=1d9dcf10-a33f-11ea-be0f-0cc47a0d1609 … #nintendo #cybersecurity

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 29/05/2020

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=ca1b1200-a1ac-11ea-be0f-0cc47a0d1609 … #cybersecurity #phishing
    ▻https://twitter.com/K1ng0fNo0b/status/1266354483967246336

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=ca1b1200-a1ac-11ea-be0f-0cc47a0d1609 … #cybersecurity #phishing

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 29/05/2020

    Arizona AG Sues Google Over Claims It Illegally Tracked Smartphone Users For Profit

    Google is in hot water after allegedly violating Arizona’s consumer protection laws by recording smartphone users’ location data even after they explicitly requested it not be recorded. Arizona Repub…
    Partagé par Race War

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
    #cybersecurity #phishing

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 24/05/2020

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e277cab0-9dbe-11ea-aa42-0cc47a0d1609 … Merci à @LiveSquawk #cybersecurity #divsecurity
    ▻https://twitter.com/K1ng0fNo0b/status/1264542410698342412

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e277cab0-9dbe-11ea-aa42-0cc47a0d1609 … Merci à @LiveSquawk #cybersecurity #divsecurity

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 24/05/2020

    9 of the Best Selling Computers of All Time

    So what are 9 of the best selling computers of all time? We are glad you asked. There’s a lot of ground to cover so we’ll just jump in. The following are in order of sales, more or less (information …

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…

    Merci à
    @LiveSquawk
    #cybersecurity #divsecurity

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 18/05/2020

    Why PS5 is winning the next gen console war so far - Reader’s Feature

    A reader analyses the Unreal Engine 5 tech demo and looks at Microsoft and Sony’s differing approaches to marketing their next gen consoles. The gaming industry has a history of being dishonest about…

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
    #ps5 #cybersecurity #Sony

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @k1ng0fno0b
    K1ng0fNo0b @k1ng0fno0b 18/05/2020

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e3fb9d00-9907-11ea-aa42-0cc47a0d1609 … #ps5 #cybersecurity
    ▻https://twitter.com/K1ng0fNo0b/status/1262368077666234368

    FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e3fb9d00-9907-11ea-aa42-0cc47a0d1609 … #ps5 #cybersecurity

    K1ng0fNo0b @k1ng0fno0b
    Écrire un commentaire

  • @oanth_rss
    oAnth_RSS @oanth_rss CC BY 14/03/2020

    European power grid organization says its IT network was hacked (ht...
    ▻https://diasp.eu/p/10590063

    European power grid organization says its IT network was hacked | #cybersecurity #energy #ENTSO #europe #hack #power

    oAnth_RSS @oanth_rss CC BY
    Écrire un commentaire

  • @stephane
    Stéphane Bortzmeyer @stephane CC BY-SA 7/06/2019

    “Technologists have historically failed to evaluate the effectiveness of authentication requirements against all reasonable attacks, to disclose the shortcomings of these requirements, and to account for and acknowledge their negative impact on users.” Excellent article about #2FA but the lessons about #cybersecurity are more general.

    ▻https://medium.com/@stuartschechter/before-you-turn-on-two-factor-authentication-27148cc5b9a1

    #authentication #security_compromises

    Stéphane Bortzmeyer @stephane CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 22/04/2019

    What are the Primary #security Architectures in use Today?
    ▻https://hackernoon.com/what-are-the-primary-security-architectures-in-use-today-ded1080e7e5e?so

    https://cdn-images-1.medium.com/max/1024/1*jzdAoBA9zlXX0Ggzec-ylw.jpeg

    What are the Primary Security Architectures in Use Today?Photo by Rubén Bagüés on UnsplashIn my latest article about “The Rise Of Zero Trust #architecture”, I wrote about the broad and rapid adoption of this relatively new concept in the world of #cybersecurity. However, there are still several other security architectures which are in use today:Traditional Network Perimeter SecurityTraditional network perimeter security is made up of many different parts, all of which work together to provide a security solution for the network.Traditionally, network security will begin with the authentication of the user, generally by using a username and password. This method is also referred to as one-factor authentication, with two-factor authentication there will be another item that needs to verified, (...)

    #data #network-security

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 20/04/2019

    What’s the Number One Concern Keeping Hotel Group CIOs Up at Night?
    ▻https://hackernoon.com/whats-the-number-one-concern-keeping-hotel-group-cios-up-at-night-ae4dd9

    https://cdn-images-1.medium.com/max/1024/1*IKnSi5-_qI9MWABbQ4OPQQ.jpeg

    “People trust us to allow them to sleep safely and securely. There’s a longstanding tradition of an innkeeper, that we fulfill that commitment to them. Has it extended naturally, with the same diligence, to the digital environment? Not always.” — John Burns, President of #hospitality #technology Consulting.Last November’s news that the private information of approximately 500 million Marriott International guests had been leaked was a sobering reminder of the catastrophic #security vulnerabilities that exist in the hospitality industry.Cyber attacks on hotels are particularly prevalent because of the vast amount of personal data stored, with PwC’s Hotels Outlook Report 2018–2022 indicating that the hospitality industry suffers from the second highest number of data breaches across all sectors.But (...)

    #travel #cybersecurity

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 17/04/2019

    Ditch your SSH keys and enable #aws SSM!
    ▻https://hackernoon.com/ditch-your-ssh-keys-and-enable-aws-ssm-ec1c2b27350c?source=rss----3a8144

    https://cdn-images-1.medium.com/max/1024/1*fN8Ho-PT_2sxP70EFcYatA.jpeg

    Photo by marcos mayer on UnsplashIf you manage AWS for an organization, big or small, chances are you have several Secure Shell (SSH) keys laying around you hardly use, OR WORSE, you don’t recall the account the key was made for. SSH key management is a rabbit hole in itself and most people understand the #security concerns that arise with improper SSH key hygiene. Luckily for us, there is a way to bid farewell to the the cumbersome practice of using SSH to remote into an EC2 instance. Allow me to introduce you the AWS service, Systems Manager (SSM).I will teach you the following in this guide:Identify SSM Remote Session Manager requirements-including for an enterpriseEnable Remote Session Manager for all EC2 instancesEnable Remote Session Manager loggingLock down Remote Session Manager (...)

    #cybersecurity #devops #devsecops

    • #AWS
    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 15/04/2019

    What is the Best Free #privacy Software?
    ▻https://hackernoon.com/what-is-the-best-free-privacy-software-3b427ce871e2?source=rss----3a8144

    Free and open source tools are the most trusted and respected privacy tools available. Since anyone can view the source code behind them…Continue reading on Hacker Noon »

    #best-privacy-software #cybersecurity #free-privacy-software #security

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 12/04/2019

    How Software #security Vulnerabilities Work And What You Can Do To Stay Safe
    ▻https://hackernoon.com/how-software-security-vulnerabilities-work-and-what-you-can-do-to-stay-s

    https://cdn-images-1.medium.com/max/1024/1*uXgkKmzNen16KNbQoc4D8A.jpeg

    Most crucial aspects of our life including our finance, identity, and healthcare now depend on code. Software security is now a critical aspect for not just companies, but individuals as well.In the latest circumstances, we see that software security concepts should be understood at least on a basic level by anyone who is using modern software products and services. And for any developer that works on designing, creating or maintaining these products and services, a comprehensive understanding of security vulnerabilities and security best practices is a must to avoid security breaches that may now cost much more than ever.Most of the time, security vulnerabilities seem to us far and unfamiliar; they are potential issues to us that are not entirely tangible; thus easy to neglect. (...)

    #cybersecurity #hacking #software-development #software-engineering

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 8/04/2019

    Why #decentralization Still Matters and How The World Got Carried Away
    ▻https://hackernoon.com/why-decentralization-still-matters-and-how-the-world-got-carried-away-28

    https://cdn-images-1.medium.com/max/1024/1*Bpit_aeXGKmqpwmbfYNHuA.jpeg

    By Mathias Klenk, the founder of PassbaseThe Internet is a playground — one that has enabled some of the biggest innovations across recent decades. With the ability to access a number of products and services instantly from any connected device, it’s no wonder it has become a mainstay of most households and businesses around the globe.Why decentralization still matters.An enhanced digital experience is largely powered by tapping into data — data that can help companies decode user preferences, shopping patterns, payment choices, and other related transactions that have simplified our lives. A major part of this was enabled by centralized services. Although centralization proved to be useful for many, there are a number of evangelists who still believe decentralization matters.Tech entrepreneur (...)

    #security #blockchain #cybersecurity #digital-identity

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 29/03/2019

    Why You Should Never Save #passwords on #chrome or Firefox
    ▻https://hackernoon.com/why-you-should-never-save-passwords-on-chrome-or-firefox-96b770cfd0d0?so

    https://cdn-images-1.medium.com/max/1024/1*VZxVMuHcQiTcxpDiQ5KeYQ.png

    Extracting Your Passwords in Cleartext with 12 Lines of CodeIn this article I will demonstrate how easy it is for hackers to extract every username and password saved on your Chrome profile. One would think that Chrome would have safety measures to encrypt your password, but apparently that is not the case — sorta. My Chrome profile, like many others, is set up so that there is another encryption password that I have to enter in order to sync all my passwords, bookmarks, settings, browser history, and etc. so it was pretty shocking to me how easy it was for me to extract and decrypt my passwords. Twelve lines of code easy.Demonstration and Proof of ConceptBefore we get started, I should mention that I have not tested this on macOS or any Linux distributions. To replicate this demonstration, (...)

    #identity-theft #security #cybersecurity

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

  • @hackernoon
    Hacker Noon @hackernoon CC BY-SA 27/03/2019

    #russia’s #internet Crackdown
    ▻https://hackernoon.com/russias-internet-crackdown-a03a762584a6?source=rss----3a8144eabfe3---4

    https://cdn-images-1.medium.com/max/1024/1*xXLTxJenzdHsXdit9UXLFA.jpeg

    President Putin sees his country’s control of the internet as an important step for Russia’s technological autonomy away from his rivals the United States and China. For scores of protestors, however, this is a step too far.Photo by Tom Grimbert (@tomgrimbert) on UnsplashNew LawFor many, especially in the West, it comes as no surprise: Vladimir Putin, Russia’s autocratic leader, seems to be taking his rule, and policies, into an even greater authoritarian direction than in previous years, with his lawmakers trying to put through a new bill which, if successfully implemented, will reduce internet #freedom within the country.In retaliation to this, activists have begun a number of demonstrations against the new legislation. They see it as their government’s attempt to curb open criticism of (...)

    #cybersecurity #politics

    Hacker Noon @hackernoon CC BY-SA
    Écrire un commentaire

0 | 25 | 50 | 75 | 100

Thèmes liés

  • #security
  • #hacking
  • #privacy
  • #blockchain
  • #phishing
  • #technology
  • #iot
  • industryterm: healthcare
  • #business
  • #cybercrime
  • country: united states
  • #cryptocurrency
  • #hacker
  • #internet-of-things
  • organization: european union
  • #ransomware
  • #gdpr
  • #ux
  • #bitcoin
  • #data
  • #authentication
  • #tech
  • technology: smartphones
  • #healthcare
  • #online-security
  • #artificial-intelligence
  • #software-engineering
  • operatingsystem: android
  • industryterm: finance
  • position: ceo
  • technology: android
  • #digital-identity
  • technology: linux
  • #javascript
  • continent: europe
  • position: general data protection regulation
  • industryterm: banking
  • programminglanguage: javascript
  • technology: wi-fi
  • #crypto