Veille #Cybersécurité du 11/08/2014

Tout ce qu'il ne fallait pas manquer aujourd'hui dans votre veille #Cybersécurité. Bonne lecture !

---

Hackers Unveil Their Plan to Change Email Forever

"They’re going to keep coming after us,” Ladar Levison, creator of an encrypted email service used by Edward Snowden, said at Defcon on Friday The creator of an ultra-secure email service once said to be used by Edward Snowden unveiled his next project at a major hacker conference Friday: he

http://time.com/3096341/email-encryption-hackers/

Vendor Sues Gartner Over Magic Quadrant 'Pay to Play' Model

A computer performance management provider seeks monetary damages in a lawsuit filed this week against Gartner Inc. after the IT research giant named the vendor a "challenger" and not a "leader" in one of its Magic Quadrant industry reports. NetScout Systems, based in Westford, Mass.

http://www.cmswire.com/cms/information-management/vendor-sues-gartner-over-magic-quadrant-pay-to-play-model-026133.php

Russian accused of hacking is arraigned in Seattle

SEATTLE (AP) - A Russian lawmaker's son accused of hacking computers at hundreds of U.S. businesses and stealing credit card information pleaded not guilty to 29 charges Friday. U.S. District Judge John L.

http://m.apnews.com/ap/db_268789/contentdetail.htm

La NSA aurait des difficultés à recruter depuis l'affaire Snowden

Révélés par Edward Snowden, les programmes de surveillance de masse sont désormais connus de tous.

http://www.numerama.com/magazine/30229-la-nsa-aurait-des-difficultes-a-recruter-depuis-l-affaire-snowden.html

Defining Cyber threats: Understanding is the Key to Defense

Share this content Defining Cyber threats: Understanding is the Key to Defense Hide details E.J.

https://www.brighttalk.com/webcast/288/120177

Why Even the Definition of “Cyber Attack” Matters

Although definitional debates can sometimes seem pedantic, debates over the term “cyber attack” are an important exception. How “cyber attack” is defined has real consequences. Take the recent reporting about a cyber incident affecting NASDAQ, for instance.

http://oti.newamerica.net/blogposts/2014/why_even_the_definition_of_cyber_attack_matters-120120

10 Commandments of Secure Engineering

Back in May, the National Institute of Standards and Technology (NIST) released a draft publication on systems security engineering.

http://www.eweek.com/security/slideshows/10-commandments-of-secure-engineering.html

Def Con: The good, the bad and 'the Feds'

The kids, aged between seven and 10 or so, are sat around in a semi-circle, as if ready to hear a bedtime story. This room, set up to inspire kids into a career as a hacker, is a fringe event of Def Con, one of the biggest - and certainly the most notorious - hacking conferences in the world.

http://www.bbc.co.uk/news/technology-28739324

Blackberry gets good news from an unlikely ally, the U.S. defense department

Las Vegas — Beleagured Blackberry went to Black Hat last week and wanted to talk security. As in Blackberry security offerings.

http://venturebeat.com/2014/08/11/blackberry-gets-good-news-from-an-unlikely-ally-the-u-s-defense-department/

Appel public à commentaires sur le référentiel d’exigences applicables aux prestataires de services sécurisés d’informatique en nuage

Les prestataires de services d’informatique en nuage fournissent une externalisation du stockage et du traitement des données de tous les types d’entités (administrations, collectivités territoriales, opérateurs d’importance vitale, entreprises, etc.).

http://www.ssi.gouv.fr/fr/menu/actualites/appel-commentaires-referentiel-d-exigences-informatique-nuage.html

The Snowden Leaks Have Been Very Good for Business of Computer Security Firms

At this week’s Def Con hacker gathering in Las Vegas, Tess Schrodinger sounded almost annoyed.

http://www.matthewaid.com/post/94424810536

Incident Response: Beyond the Breach

When the organizers of the just-concluded Black Hat USA conference wanted to explore incident response, they turned to Bruce Schneier, the cryptographer, author, blogger and cybersecurity expert, to make a presentation.

http://www.inforisktoday.com/blogs/incident-response-beyond-breach-p-1720

Defcon : Un collectif exhorte l'industrie automobile à sécuriser les systèmes embarqués

Selon le collectif qui se fait appeler « I Am The Cavalry », les systèmes qui font tourner les appareils médicaux, les terminaux pour la maison, les systèmes embarqués dans les automobiles et ceux des infrastructures publiques doivent être mieux protégés contre les cyberattaques.

http://www.lemondeinformatique.fr/actualites/lire-defcon-un-collectif-exhorte-l-industrie-automobile-a-securiser-les-systemes-embarques-58296.html

July 2014 Cyber Attacks Statistics

It’s time to aggregate the data of the timelines of July (Part II and Part II) into (hopefully) meaning stats.

http://hackmageddon.com/2014/08/11/july-2014-cyber-attacks-statistics

Atos a réussi son OPA sur Bull

La SSII Atos détiendra 84,25% du capital de Bull au 18 août prochain. Avec ce rapprochement, le groupe va développer trois axes  : le cloud, la sécurité et le big data.

http://www.lemondeinformatique.fr/actualites/lire-atos-a-reussi-son-opa-sur-bull-58298.html

U.S defense giants are hiring the best hackers they can find (with a few caveats)

Las Vegas — If you’re a hacker, a really good one, you now have even more career choices awaiting you — assuming you’re not a convicted felon.

http://venturebeat.com/2014/08/11/u-s-defense-giants-are-hiring-the-best-hackers-they-can-find-with-a-few-caveats/

Le smartphone sécurisé Blackphone piraté en 5 minutes ?

Avec les révélations d’Edward Snowden sur l’espionnage massif de la NSA, plusieurs acteurs se sont penchés sur la sécurité des smartphones. L’objectif est de pouvoir créer un terminal ultra-sécurisé capable d’éviter les écoutes indiscrètes des gouvernements.

http://www.silicon.fr/smartphone-blackphone-pirate-en-5-minutes-96072.html

---

Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié : http://www.cyber-securite.fr/category/veille-cyber/feed

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont indiqués avec *

This site uses Akismet to reduce spam. Learn how your comment data is processed.