Tout ce qu’il ne fallait pas manquer aujourd’hui dans votre veille #Cybersécurité. Bonne lecture !
—
Hackers Unveil Their Plan to Change Email Forever
« They’re going to keep coming after us,” Ladar Levison, creator of an encrypted email service used by Edward Snowden, said at Defcon on Friday The creator of an ultra-secure email service once said to be used by Edward Snowden unveiled his next project at a major hacker conference Friday: he
http://time.com/3096341/email-encryption-hackers/
Vendor Sues Gartner Over Magic Quadrant ‘Pay to Play’ Model
A computer performance management provider seeks monetary damages in a lawsuit filed this week against Gartner Inc. after the IT research giant named the vendor a « challenger » and not a « leader » in one of its Magic Quadrant industry reports. NetScout Systems, based in Westford, Mass.
http://www.cmswire.com/cms/information-management/vendor-sues-gartner-over-magic-quadrant-pay-to-play-model-026133.php
Russian accused of hacking is arraigned in Seattle
SEATTLE (AP) – A Russian lawmaker’s son accused of hacking computers at hundreds of U.S. businesses and stealing credit card information pleaded not guilty to 29 charges Friday. U.S. District Judge John L.
http://m.apnews.com/ap/db_268789/contentdetail.htm
La NSA aurait des difficultés à recruter depuis l’affaire Snowden
Révélés par Edward Snowden, les programmes de surveillance de masse sont désormais connus de tous.
http://www.numerama.com/magazine/30229-la-nsa-aurait-des-difficultes-a-recruter-depuis-l-affaire-snowden.html
Defining Cyber threats: Understanding is the Key to Defense
Share this content Defining Cyber threats: Understanding is the Key to Defense Hide details E.J.
https://www.brighttalk.com/webcast/288/120177
Why Even the Definition of “Cyber Attack” Matters
Although definitional debates can sometimes seem pedantic, debates over the term “cyber attack” are an important exception. How “cyber attack” is defined has real consequences. Take the recent reporting about a cyber incident affecting NASDAQ, for instance.
http://oti.newamerica.net/blogposts/2014/why_even_the_definition_of_cyber_attack_matters-120120
10 Commandments of Secure Engineering
Back in May, the National Institute of Standards and Technology (NIST) released a draft publication on systems security engineering.
http://www.eweek.com/security/slideshows/10-commandments-of-secure-engineering.html
Def Con: The good, the bad and ‘the Feds’
The kids, aged between seven and 10 or so, are sat around in a semi-circle, as if ready to hear a bedtime story. This room, set up to inspire kids into a career as a hacker, is a fringe event of Def Con, one of the biggest – and certainly the most notorious – hacking conferences in the world.
http://www.bbc.co.uk/news/technology-28739324
Blackberry gets good news from an unlikely ally, the U.S. defense department
Las Vegas — Beleagured Blackberry went to Black Hat last week and wanted to talk security. As in Blackberry security offerings.
http://venturebeat.com/2014/08/11/blackberry-gets-good-news-from-an-unlikely-ally-the-u-s-defense-department/
Appel public à commentaires sur le référentiel d’exigences applicables aux prestataires de services sécurisés d’informatique en nuage
Les prestataires de services d’informatique en nuage fournissent une externalisation du stockage et du traitement des données de tous les types d’entités (administrations, collectivités territoriales, opérateurs d’importance vitale, entreprises, etc.).
http://www.ssi.gouv.fr/fr/menu/actualites/appel-commentaires-referentiel-d-exigences-informatique-nuage.html
The Snowden Leaks Have Been Very Good for Business of Computer Security Firms
At this week’s Def Con hacker gathering in Las Vegas, Tess Schrodinger sounded almost annoyed.
http://www.matthewaid.com/post/94424810536
Incident Response: Beyond the Breach
When the organizers of the just-concluded Black Hat USA conference wanted to explore incident response, they turned to Bruce Schneier, the cryptographer, author, blogger and cybersecurity expert, to make a presentation.
http://www.inforisktoday.com/blogs/incident-response-beyond-breach-p-1720
Defcon : Un collectif exhorte l’industrie automobile à sécuriser les systèmes embarqués
Selon le collectif qui se fait appeler « I Am The Cavalry », les systèmes qui font tourner les appareils médicaux, les terminaux pour la maison, les systèmes embarqués dans les automobiles et ceux des infrastructures publiques doivent être mieux protégés contre les cyberattaques.
http://www.lemondeinformatique.fr/actualites/lire-defcon-un-collectif-exhorte-l-industrie-automobile-a-securiser-les-systemes-embarques-58296.html
July 2014 Cyber Attacks Statistics
It’s time to aggregate the data of the timelines of July (Part II and Part II) into (hopefully) meaning stats.
http://hackmageddon.com/2014/08/11/july-2014-cyber-attacks-statistics
Atos a réussi son OPA sur Bull
La SSII Atos détiendra 84,25% du capital de Bull au 18 août prochain. Avec ce rapprochement, le groupe va développer trois axes : le cloud, la sécurité et le big data.
http://www.lemondeinformatique.fr/actualites/lire-atos-a-reussi-son-opa-sur-bull-58298.html
U.S defense giants are hiring the best hackers they can find (with a few caveats)
Las Vegas — If you’re a hacker, a really good one, you now have even more career choices awaiting you — assuming you’re not a convicted felon.
http://venturebeat.com/2014/08/11/u-s-defense-giants-are-hiring-the-best-hackers-they-can-find-with-a-few-caveats/
Le smartphone sécurisé Blackphone piraté en 5 minutes ?
Avec les révélations d’Edward Snowden sur l’espionnage massif de la NSA, plusieurs acteurs se sont penchés sur la sécurité des smartphones. L’objectif est de pouvoir créer un terminal ultra-sécurisé capable d’éviter les écoutes indiscrètes des gouvernements.
http://www.silicon.fr/smartphone-blackphone-pirate-en-5-minutes-96072.html
—
Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié :
https://www.cyber-securite.fr/category/veille-cyber/feed
Vous aimerez aussi cet article: