In a legal extradition tug-of-war between the United States and Russia, it seems France has won the game, surprisingly. A Greek court has ruled to extradite the Russian cybercrime suspect and the former operator of now-defunct BTC-e crypto exchange to France, instead of the United States or to his native Russia, according to multiple Russian news outlets. Alexander Vinnik, 38, has been


Source de l’article sur The Hacker News

A 21-year-old New Jersey woman has been charged with hacking into the email accounts of pop star and actress Selena Gomez, stealing her personal photos, and then leaked them to the Internet. Susan Atrach of Ridgefield Park was charged Thursday with 11 felony counts—five counts of identity theft, five counts of accessing and using computer data to commit fraud or illegally obtain money,


Source de l’article sur The Hacker News

Protonmail se fait étriller par un concurrent qui, dans un long poste de blog, accuse la société de messagerie chiffrée d’être à la botte d’une société de datamining. Une accusation étayée par une démonstration un peu légère, et que Protonmail est venue démentir.
Source de l’article sur ZDNet

As it was speculated that the author of LuminosityLink RAT was arrested last year, a plea agreement made available to the public today confirmed the news. Back in September last year, Europol’s European Cybercrime Centre (EC3) and National Crime Agency began the crackdown on the LuminosityLink RAT, targeting sellers and users of the malware, which resulted in the seizure of a considerable


Source de l’article sur The Hacker News

Orange s’empare de Basefarm, acteur européen des infrastructures et services cloud qui pèse 100 millions d’euros de chiffre d’affaires.
Source de l’article sur ITEXPRESSO

Et voici une nouvelle version de l’hyperviseur Xen. Et c’est beaucoup plus qu’une mise à jour mineure.
Source de l’article sur ZDNet

As a consultant, I get to see a lot of different organizations and work with a variety of teams. By now, virtually everyone has at least heard of Agile and read the Manifesto. We also seem to have, in technology adoption terms, crossed the chasm, and so adoption by more traditional, sometimes slower moving, global scale organizations is well underway. Agile has finally been vetted by the early adopters and is now becoming mainstream.

I, like others, talk about the difference between "doing Agile" and "being agile" — differing the big "A" Agile and the little "a" agile is intentional [BC1]. From an intellectual perspective, the notion of Agile being a mindset and a different way of seeing and acting in the world rather than a methodology or a process usually resonates. Still, though, I see a tendency to want an "Agile checklist"; a tendency toward Agile for the sake of being able to say "we’re Agile" rather than genuinely zeroing in on value and excellence. I cannot tell you how many times I’ve heard, "It’s not ‘Agile’ if you aren’t doing <insert practice here>."

Source de l’article sur DZone (Agile)

Spring Security provides comprehensive security services for J2EE-based enterprise software applications. It is powerful, flexible, and pluggable. It is not like a Proxy server, firewall, OS level Security, Intrusion Detection System, or JVM Security.

OAuth is an open-authorization protocol that allows accessing resources of the resource owner by enabling the client applications on HTTP services, such as Gmail, GitHub, etc.

Source de l’article sur DZONE

The hype around the use of artificial intelligence in decision-making might make you think it could pilot your company automatically, talk to your suppliers, chase late invoices, and open parcels arriving in the mail room, all while making you a nice cup of tea.

In practice, AI is a precision tool that should be used judiciously to achieve specific goals. Implementing it takes foresight and a vision, along with a healthy understanding of the technical challenges involved.


Source de l’article sur DZONE (AI)

Les services secrets ukrainiens annoncent avoir détecté et bloqué une infection par le malware VPNFilter, qui visait une usine de traitement de l’eau basée en Ukraine. Le renseignement ukrainien accuse la Russie d’être derrière cette opération.
Source de l’article sur ZDNet