US energy minister calls Russia and China threats
Dans sa demande dCybersecurity
038
Following the decree of the Trump administration on the protection of the American electricity production system, the Department of Energy made a request
Samsung Business TV BET: pro screens at the best price to communicate
Samsung Business TV BET: pro screens at the best price to communicateCybersecurity
029
Visual communication has become essential and takes place in our daily lives through multiple screens. The reception, the meeting room, the cafeteria
The Covid-19 pandemic significantly increases the health sector’s vulnerability to DNS attacks –
The Covid-19 pandemic significantly increases the health sector's vulnerability to DNS attacks -Cybersecurity
031
According to the 2020 report on DNS attacks around the world, 65% of respondents working in the health sector believe that DNS security is extremely important
Google opens its Tsunami vulnerability scanner to open source
Google opens its Tsunami vulnerability scanner to open sourceCybersecurity
029
Google has developed a vulnerability scanner for corporate networks made up of thousands, if not millions, of systems connected to the Internet.
KingComposer fixes an XSS flaw affecting 100,000 WordPress sites
KingComposer fixes an XSS flaw affecting 100,000 WordPress sitesCybersecurity
035
A XSS (Reflect Cross-Site Scripting) vulnerability affecting 100,000 websites has been fixed in the WordPress plugin of KingComposer. KingComposer is a
Connected watches pointed to for major security breaches
Connected watches pointed to for major security breachesCybersecurity
036
Untouchable connected watches? Not really, as a recently published study proves. It highlights a series of critical security problems in connected watch
Google bans ads for harassing software
Google interdit les publicités pour les logiciels de harcèlementCybersecurity
032
Google announced this week that it intends to ban ads that promote harassing software, spyware and other forms of surveillance technology that can be used
Zoom is working on the fix for a “zero-day” flaw disclosed on Windows
Zoom will deploy end-to-end encryption, but not for everyoneCybersecurity
032
Zoom videoconferencing software is working to fix a zero-day vulnerability that was revealed online earlier today in a blog post by cybersecurity company
More services for BMWs, 53 million tonnes of electronic waste, Android launches its AirDrop … It’s the ZD Brief!
Smartphones victims of the pandemic, traffic on business Wikipedia pages, cybersecurity in teleworking ... This is the ZD Brief!Cybersecurity
029
Summary: Always more services for BMWs More cybersecurity tools for less efficiency 53 million tonnes of electronic waste The key figure: 9 consequences
essentials in a post-Covid-19 world –
essentials in a post-Covid-19 world -Cybersecurity
035
In an uncertain context, digital transformation appears to be essential to ward off future crises. But what about AI and automation? Even if companies