Crash di sistema. Cosa nutre l’oligopolio che controlla i data center pubblici
▻https://irpimedia.irpi.eu/oligopolio-data-center
Attorno alla manutenzione dei centri di elaborazione dati ruotano centinaia di milioni di euro l’anno. Un settore nevralgico per il Paese, che però da tempo è controllato dai big dell’informatica. Il caso è finito all’Antitrust. L’articolo Crash di sistema. Cosa nutre l’oligopolio che controlla i data center pubblici proviene da IrpiMedia.
]]>Un nuovo episodio dello scontro tra Viminale-Garante della privacy
▻https://irpimedia.irpi.eu/sorveglianze-craim-riconoscimento-facciale-social-network
Il Craim, un centro tecnologico della polizia, dispone di vari sistemi per aiutare le indagini. Tra le attività che svolge sui social c’è anche il riconoscimento facciale. Il Viminale prima di ogni sperimentazione in materia dovrebbe chiedere un parere al Garante, ma non l’ha fatto L’articolo Un nuovo episodio dello scontro tra Viminale-Garante della privacy proviene da IrpiMedia.
]]>Lancement aujourd’hui du premier ISAC dédié aux domaines de premier niveau ▻https://www.afnic.fr/observatoire-ressources/actualites/lancement-du-premier-isac-dedie-aux-domaines-de-premier-niveau
Launch today of the First Top-Level Domain ISAC on ▻https://www.tld-isac.eu
More info on ▻https://www.afnic.fr/en/observatory-and-resources/news/launch-of-the-first-top-level-domain-isac
#cybersécurité #cybersecurity #security #DNS #Europe #Internet
]]>Vasileiadis A. (Cyberkid) 🛡 : « Networking Essentials #infose… » - Framapiaf
▻https://framapiaf.org/@Cyberkid1987@defcon.social/110818266944688664
Networking Essentials
]]>🗓️ L’Afnic sera présente au FIC Europe 2023 (Forum Internet de la Cybersécurité) à Lille du 5 au 7 Avril.
Toutes les infos sur ▻https://www.afnic.fr/observatoire-ressources/agenda/fic-europe-2023-forum-internet-de-la-cybersecurite
#Cybersécurité #FIC2023 #Cybersecurity #Cloud #Afnic #Internet #Numérique #Sécurité #Lille
]]>Today at IGF-Ethiopia 2022 don’t miss the “Security Meets Responsibility: Connected Everything’s Resilience” session at 12:00 UTC with Lucien Castex, Rayna Stamboliyska and Samih Souissi ! ▻https://lnkd.in/dBD3S35U
#IGF2022 #Internet #IoT #Cybersecurity #resilience #Governance #Afnic
]]>Dès aujourd’hui et jusqu’à jeudi, retrouvez l’Afnic sur le stand D36 du Cinov Numerique au #FIC2021 ! Toutes les infos sur ▻https://www.forum-fic.com #CyberSecurity #cybersecurité #sécurité #Lille
]]>Distinguer les noms de domaine détournés des noms de domaine enregistrés aux fins d’actes de malveillance à l’aide de COMAR : principaux résultats et perspectives d’avenir ▻https://www.afnic.fr/observatoire-ressources/papier-expert/distinguer-les-noms-de-domaine-detournes-des-noms-de-domaine-enregistres-aux-f #Cybersécurité
Distinguishing exploited from malicious domain names using COMAR : key findings and future directions ▻https://www.afnic.fr/en/observatory-and-resources/expert-papers/distinguishing-exploited-from-malicious-domain-names-using-comar-key-findings- #DNS #Afnic #ccTLDs #gTLDs #CyberSecurity #Internet #Security
]]>What’s most interesting about the Florida water system hack? That w...
▻https://diasp.eu/p/12440938
What’s most interesting about the Florida water system hack? That we heard about it at all | #water #cybersecurity #scada #hack
]]>Hacker increased chemical level at Oldsmar’s city water system, she...
▻https://diasp.eu/p/12435641
Hacker increased chemical level at Oldsmar’s city water system, sheriff says | #cybersecurity #water
]]>IT-Ausfall an Uniklinik Düsseldorf betrifft immer mehr Patienten
▻https://diasp.eu/p/11652238
IT-Ausfall an Uniklinik Düsseldorf betrifft immer mehr Patienten
Der IT-Ausfall an der Uniklinik Düsseldorf hat gravierende Folgen für immer mehr Patienten. Experten gehen von einem Hackerangriff auf. IT-Ausfall an Uniklinik Düsseldorf betrifft immer mehr Patienten #Cybersecurity #Düsseldorf #Hacking #Klinik
]]>FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… #cybersecurity #datasec
▻https://mobile.twitter.com/K1ng0fNo0b/status/1269978213360570370?p=v
FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… #cybersecurity #datasec
]]>Five Fields Where 5G Will Make A Difference
With the advent of the 5G wireless technology at the horizon, some industries can’t wait to implement the new network so they can move forward with developing new equipment. 5G stands at the precipic…
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
#cybersecurity #datasec
MIT: If chips can’t get smaller, then coders have to get smarter
Digital transformation trends in 2020: What to expect Many of the tech devices we take for granted are made possible because of improvements in computing power over the years that have not only made …
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
#marketing #cybersecurity
FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… Merci à @JayDubcity16 #cybersecurity #cloud
▻https://mobile.twitter.com/K1ng0fNo0b/status/1268528669330464773?p=v
FreshNewsHardware est en ligne! paper.li/K1ng0fNo0b/141… Merci à @JayDubcity16 #cybersecurity #cloud
]]>Computer science student discovers privacy flaws in security and doorbell cameras
Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to systemic design flaws discovered by Florida Tech computer science student…
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
#nintendo #cybersecurity
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=1d9dcf10-a33f-11ea-be0f-0cc47a0d1609 … #nintendo #cybersecurity
▻https://twitter.com/K1ng0fNo0b/status/1267079247488864256
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=1d9dcf10-a33f-11ea-be0f-0cc47a0d1609 … #nintendo #cybersecurity
]]>FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=ca1b1200-a1ac-11ea-be0f-0cc47a0d1609 … #cybersecurity #phishing
▻https://twitter.com/K1ng0fNo0b/status/1266354483967246336
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=ca1b1200-a1ac-11ea-be0f-0cc47a0d1609 … #cybersecurity #phishing
]]>Arizona AG Sues Google Over Claims It Illegally Tracked Smartphone Users For Profit
Google is in hot water after allegedly violating Arizona’s consumer protection laws by recording smartphone users’ location data even after they explicitly requested it not be recorded. Arizona Repub…
Partagé par Race War
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
#cybersecurity #phishing
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e277cab0-9dbe-11ea-aa42-0cc47a0d1609 … Merci à @LiveSquawk #cybersecurity #divsecurity
▻https://twitter.com/K1ng0fNo0b/status/1264542410698342412
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e277cab0-9dbe-11ea-aa42-0cc47a0d1609 … Merci à @LiveSquawk #cybersecurity #divsecurity
]]>9 of the Best Selling Computers of All Time
So what are 9 of the best selling computers of all time? We are glad you asked. There’s a lot of ground to cover so we’ll just jump in. The following are in order of sales, more or less (information …
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
Merci à
@LiveSquawk
#cybersecurity #divsecurity
Why PS5 is winning the next gen console war so far - Reader’s Feature
A reader analyses the Unreal Engine 5 tech demo and looks at Microsoft and Sony’s differing approaches to marketing their next gen consoles. The gaming industry has a history of being dishonest about…
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525…
#ps5 #cybersecurity #Sony
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e3fb9d00-9907-11ea-aa42-0cc47a0d1609 … #ps5 #cybersecurity
▻https://twitter.com/K1ng0fNo0b/status/1262368077666234368
FreshNewsHardware est en ligne! ►https://paper.li/K1ng0fNo0b/1418475525?edition_id=e3fb9d00-9907-11ea-aa42-0cc47a0d1609 … #ps5 #cybersecurity
]]>European power grid organization says its IT network was hacked (ht...
▻https://diasp.eu/p/10590063
European power grid organization says its IT network was hacked | #cybersecurity #energy #ENTSO #europe #hack #power
]]>“Technologists have historically failed to evaluate the effectiveness of authentication requirements against all reasonable attacks, to disclose the shortcomings of these requirements, and to account for and acknowledge their negative impact on users.” Excellent article about #2FA but the lessons about #cybersecurity are more general.
▻https://medium.com/@stuartschechter/before-you-turn-on-two-factor-authentication-27148cc5b9a1
]]>What are the Primary #security Architectures in use Today?
▻https://hackernoon.com/what-are-the-primary-security-architectures-in-use-today-ded1080e7e5e?so
What are the Primary Security Architectures in Use Today?Photo by Rubén Bagüés on UnsplashIn my latest article about “The Rise Of Zero Trust #architecture”, I wrote about the broad and rapid adoption of this relatively new concept in the world of #cybersecurity. However, there are still several other security architectures which are in use today:Traditional Network Perimeter SecurityTraditional network perimeter security is made up of many different parts, all of which work together to provide a security solution for the network.Traditionally, network security will begin with the authentication of the user, generally by using a username and password. This method is also referred to as one-factor authentication, with two-factor authentication there will be another item that needs to verified, (...)
]]>What’s the Number One Concern Keeping Hotel Group CIOs Up at Night?
▻https://hackernoon.com/whats-the-number-one-concern-keeping-hotel-group-cios-up-at-night-ae4dd9
“People trust us to allow them to sleep safely and securely. There’s a longstanding tradition of an innkeeper, that we fulfill that commitment to them. Has it extended naturally, with the same diligence, to the digital environment? Not always.” — John Burns, President of #hospitality #technology Consulting.Last November’s news that the private information of approximately 500 million Marriott International guests had been leaked was a sobering reminder of the catastrophic #security vulnerabilities that exist in the hospitality industry.Cyber attacks on hotels are particularly prevalent because of the vast amount of personal data stored, with PwC’s Hotels Outlook Report 2018–2022 indicating that the hospitality industry suffers from the second highest number of data breaches across all sectors.But (...)
]]>Ditch your SSH keys and enable #aws SSM!
▻https://hackernoon.com/ditch-your-ssh-keys-and-enable-aws-ssm-ec1c2b27350c?source=rss----3a8144
Photo by marcos mayer on UnsplashIf you manage AWS for an organization, big or small, chances are you have several Secure Shell (SSH) keys laying around you hardly use, OR WORSE, you don’t recall the account the key was made for. SSH key management is a rabbit hole in itself and most people understand the #security concerns that arise with improper SSH key hygiene. Luckily for us, there is a way to bid farewell to the the cumbersome practice of using SSH to remote into an EC2 instance. Allow me to introduce you the AWS service, Systems Manager (SSM).I will teach you the following in this guide:Identify SSM Remote Session Manager requirements-including for an enterpriseEnable Remote Session Manager for all EC2 instancesEnable Remote Session Manager loggingLock down Remote Session Manager (...)
]]>What is the Best Free #privacy Software?
▻https://hackernoon.com/what-is-the-best-free-privacy-software-3b427ce871e2?source=rss----3a8144
Free and open source tools are the most trusted and respected privacy tools available. Since anyone can view the source code behind them…Continue reading on Hacker Noon »
#best-privacy-software #cybersecurity #free-privacy-software #security
]]>How Software #security Vulnerabilities Work And What You Can Do To Stay Safe
▻https://hackernoon.com/how-software-security-vulnerabilities-work-and-what-you-can-do-to-stay-s
Most crucial aspects of our life including our finance, identity, and healthcare now depend on code. Software security is now a critical aspect for not just companies, but individuals as well.In the latest circumstances, we see that software security concepts should be understood at least on a basic level by anyone who is using modern software products and services. And for any developer that works on designing, creating or maintaining these products and services, a comprehensive understanding of security vulnerabilities and security best practices is a must to avoid security breaches that may now cost much more than ever.Most of the time, security vulnerabilities seem to us far and unfamiliar; they are potential issues to us that are not entirely tangible; thus easy to neglect. (...)
#cybersecurity #hacking #software-development #software-engineering
]]>Why #decentralization Still Matters and How The World Got Carried Away
▻https://hackernoon.com/why-decentralization-still-matters-and-how-the-world-got-carried-away-28
By Mathias Klenk, the founder of PassbaseThe Internet is a playground — one that has enabled some of the biggest innovations across recent decades. With the ability to access a number of products and services instantly from any connected device, it’s no wonder it has become a mainstay of most households and businesses around the globe.Why decentralization still matters.An enhanced digital experience is largely powered by tapping into data — data that can help companies decode user preferences, shopping patterns, payment choices, and other related transactions that have simplified our lives. A major part of this was enabled by centralized services. Although centralization proved to be useful for many, there are a number of evangelists who still believe decentralization matters.Tech entrepreneur (...)
]]>Why You Should Never Save #passwords on #chrome or Firefox
▻https://hackernoon.com/why-you-should-never-save-passwords-on-chrome-or-firefox-96b770cfd0d0?so
Extracting Your Passwords in Cleartext with 12 Lines of CodeIn this article I will demonstrate how easy it is for hackers to extract every username and password saved on your Chrome profile. One would think that Chrome would have safety measures to encrypt your password, but apparently that is not the case — sorta. My Chrome profile, like many others, is set up so that there is another encryption password that I have to enter in order to sync all my passwords, bookmarks, settings, browser history, and etc. so it was pretty shocking to me how easy it was for me to extract and decrypt my passwords. Twelve lines of code easy.Demonstration and Proof of ConceptBefore we get started, I should mention that I have not tested this on macOS or any Linux distributions. To replicate this demonstration, (...)
]]>#russia’s #internet Crackdown
▻https://hackernoon.com/russias-internet-crackdown-a03a762584a6?source=rss----3a8144eabfe3---4
President Putin sees his country’s control of the internet as an important step for Russia’s technological autonomy away from his rivals the United States and China. For scores of protestors, however, this is a step too far.Photo by Tom Grimbert (@tomgrimbert) on UnsplashNew LawFor many, especially in the West, it comes as no surprise: Vladimir Putin, Russia’s autocratic leader, seems to be taking his rule, and policies, into an even greater authoritarian direction than in previous years, with his lawmakers trying to put through a new bill which, if successfully implemented, will reduce internet #freedom within the country.In retaliation to this, activists have begun a number of demonstrations against the new legislation. They see it as their government’s attempt to curb open criticism of (...)
]]>#privacy : What You Need To Know
▻https://hackernoon.com/privacy-what-you-need-to-know-e183ef3563c1?source=rss----3a8144eabfe3---
If you share something with more than 5 people, you should not consider it private anymore. This is Entropy’s Law of Privacy, known as gossip.Here is how it works. Researcher and social psychologist, Dr. Cazzell (Stanford, Queensland, BYU, Yale), excellently described this in her Behavioral #economics article with the Game of Clue. Here is how it works:When you reveal your card, that Professor Plum did not commit the murder, then the other person also learns that information. This seems obvious, but when you contrast that with physical things, it is oddly different. If I give you money, a cake, a car, or anything else, then I lose it and you gain it. This is not true with information, both people gain knowledge win+win — at no loss. Think how silly it would be if your brain forgot the card (...)
]]>The Rise of Zero-Trust #architecture
▻https://hackernoon.com/the-rise-of-zero-trust-architecture-17464e6cbf30?source=rss----3a8144eab
What is Zero-Trust Architecture and why is it Relevant Today?Breaking Down Zero Trust Architecture:Zero Trust architecture is an option to be considered by organizations who want a more reliable way of preventing leaks of confidential data and lowering the risk of modern #cyber-attacks against their network. Zero Trust was initially developed by the analytics firm, Forrester Research and it is marketed as an alternative to traditional #security architectures.The majority of businesses use traditional security architecture, which functions using the now incorrect theory that anything which is contained within their own network can be considered trustworthy. In the modern day, security threats can arise internally and with even more intelligence than ever before.New security methods need to (...)
]]>A rhetorical question about the effectiveness of our #security solutions
▻https://hackernoon.com/a-rhetorical-question-about-the-effectiveness-of-our-security-solutions-
If our approach to cyber security is working, why in 2019, are we reading about hacking, social engineering and data breaches every day? Every day?I know it’s easier to attack than it is to defend, but we all know in the industry that many of the successful attacks can be prevented. Unfortunately, “PEOPLE” are the weakest link in the chain of our security solutions. And unfortunately, telling PEOPLE not to open emails from people they don’t recognize doesn’t stop them from… you know,… opening emails from people they don’t recognize. And telling them to “check the URL” is the single worst piece of advice you can give to anyone.Below are domains that are available right now for purchase. Buy one and then get yourself a free SSL cert from Let’s Encrypt. That will fool 99.9% of everyone you test, (...)
]]>CTO #TechMind: Making Your #security “Too Expensive To Hack” Can Save You Millions
▻https://hackernoon.com/cto-techmind-making-your-security-too-expensive-to-hack-can-save-you-mil
What is the first thing you do when you wake up in the morning? If you’re anything like me, you either turn off the alarm and go back to sleep, or you reach out to your phone and check on your social profiles. Nothing like a few likes to start your day… right?Thousands of Facebook, Instagram and Whatsapp users woke up on Wednesday with that same intention: checking on their precious social profiles and messages. With one little exception: they couldn’t.While company quickly confirmed the outage was not related to malicious efforts, questions had already begun swimming around inside users’ minds… “Was Facebook hacked? Was I hacked? Is the world ending?” These questions kept me thinking.As someone who has worked with high-end technologies his entire adult life, I’ve been able to collect some (...)
]]>Comparing three popular wallets. The differences are greater than you might think.
▻https://hackernoon.com/comparing-three-popular-wallets-the-differences-are-greater-than-you-mig
Wallets are gateways to cryptocurrencies and, as the #blockchain space has grown, the variety of wallets available has also grown. Most people who want to dabble with a small amount of crypto, start off their crypto journey by setting up hot wallets in the form of phone, desktop, or web application. Hot wallets focus primarily on convenience and are great for making coin transfers on the go.While hot wallets may be convenient, they force users to sacrifice #security and the underlying basis of crypto: having complete control of one’s wealth. Thus, as people get a stronger grasp of blockchain technology and understand how to improve security of their Crypto assets, they either opt for hardware wallets, or even brain wallets.User Experience is ImportantGiven that wallets are gateways to (...)
]]>CCPA: What You Need to Know
▻https://hackernoon.com/ccpa-what-you-need-to-know-aede1acb792a?source=rss----3a8144eabfe3---4
CCPA: What you need to knowThe California Consumer #privacy Act takes effect on January 1st, 2020. If you’re a dev or work for a software company, this affects you.he California Consumer Privacy Act takes effect on January 1st, 2020. But it has provisions that reach back to January 1st, 2019. If you’re a software developer or work for a software company, it’s reasonably likely that CCPA is going to impact your roadmap, your website, and existing or planned features in the near future.DISCLAIMER: This is not legal advice and does not substitute for it. We are not lawyers.BackgroundThe California Consumer Privacy Act (aka CCPA or AB 375) of 2018 shot through the California legislature in seven days. It was going to be on the November ballot, and legislators feared it would become #law without (...)
]]>How to deploy honeypots in your network
▻https://hackernoon.com/how-to-deploy-honeypots-in-your-network-91fe428d43fd?source=rss----3a814
What’s a honeypot what what it’s purpose ?It’s basically a computer or Virtual Machine emulating some services (ex: ssh, ftp, telnet, netbios, https, samba server etc) and accepting, logging and sending warnings of all incoming connections. You can use it as intrusion detection or early warning system but it also might go a little further and allow one to get inside the intruders ”head” since you get to log every interaction.How and where should it be placed?Let’s start with “where”. I usually place them in specific areas to get an idea how/or if the network is tested from outside or inside. So I have about three major areas; behind firewalls, in “sensible zones” where only pre-defined machines should have access and in the “public zone” such as administrative/general network.Placing a honeypot (...)
]]>