Petya Ransomware: 3 Things To Limit Your Exposure
From the router that provides access to the Internet in the home to the infrastructure of the top modern cities, the best security practices should be applied to protect data, information and privacy. The threat of cyber-attacks on infrastructure is increasing, whether from terrorists, commecial hackers seeking valuable information, or simply bored people seeking a… Lire la suite Cyber-Security: 5 Types of Security Incidents You Should Know
Microsoft could have slowed the devastating spread of ransomware WannaCry to businesses, reports the Financial Times. Instead, it held back a free repair update on machines running older software like Windows XP.
Protecting a company is not a project; it is a process. The technologies used to protect endpoints should be evaluated on an ongoing basis by a security team, as should the protection of the perimeter and servers.
Multiven Summary on WannaCrypt Malware ( Last updated: 15th of May 2017)
Cisco fixes CIA Exploit in IOS and IOS-XE
Highly classified hacking tools used to break into various Microsoft systems, along with what it said was evidence that the N.S.A. had infiltrated the backbone of the Middle East’s banking infrastructure.
"All I can say is that there are many ways to spy. You can put someone under surveillance with your phone, your television, there are plenty of ways to do it. [...] and microwaves that turn into cameras. That, as we know, is a fact of modern life. " This is the response of Kellyanne… Lire la suite Wikileaks : Your microwave is spying on you !