ZD Tech: All about cybersecurity in less than 3 minutes!


Let’s Ecrypt, botnets, 0 day flaws, SecNumCloud, supply chain attacks, attribution, ransomware and insurance, Heartbleed; the turn of what counted cybersec side in 2021.

Understand everything to botnets

It is a network of computers infected with the same malware and controlled by one person. This allows the cybercriminal to use the compromised devices for generally illegal purposes.

What are 0 day faults?

These flaws of a somewhat special kind are the nightmare of publishers and manufacturers like Apple, but also of their users. And they sometimes sell for millions of euros, for the benefit of intelligence services and cybercriminals who want to use them.

Why has Let’s Ecrypt changed the face of the web?

In just under 10 years of existence, this project has democratized encryption. His secret weapon to achieve this? Offer free AND automated electronic certificates. And therefore allow anyone to encrypt the traffic of their websites.

Why should your boss take cybersecurity a little more seriously?

If until then computer attacks decimated computers, they will kill human beings of flesh and bones by 2025. This is in any case one of the forecasts of the analysis firm Gartner, which takes stock of this. which will arrive in the field of cybersecurity in the coming months.

SecNumCloud, the qualification of Anssi

This is the name given to a qualification awarded by Anssi to attest to good technical and legal security practices for cloud hosts.

Attacks on the software supply chain

Attacks on the supply chain, or “supply chain attacks” are now legion. Among the best known, we can cite the Solarwinds attack, or the one targeting Kaseya.

Cybersecurity threatened by quantum computing?

Today, we know that the computing power required to break an encryption greatly exceeds the capacities of traditional supercomputers. But the arrival within five years of a reliable and functional quantum computer could be a game-changer.

Computer attacks, who is responsible?

Tracing back to the perpetrators of a computer attack is complicated. But not impossible. By investigating the characteristics of the attack, it is possible to collect certain clues.

Ransomware: the insurers will decide

Negligence in cybersecurity is now pushing back insurers who, for several years, have been trying to develop products that cover companies’ IT damage. When they don’t give up, they demand higher and higher policy amounts.

Heartbleed, what is it?

This is the name given to a security vulnerability discovered in the OpenSSL project. And OpenSSL is free software providing essential tools for setting up data encryption on the internet. Founded in 1998, OpenSSL has seen its popularity grow as the internet grows and secure exchanges gain in importance.

Find ZD Tech on podcast platforms

  • To subscribe to Le ZD Tech on Apple Podcast, click here
  • To subscribe to Le ZD Tech on Spotify, it’s here
  • To subscribe to Le ZD Tech on Deezer, it’s here
  • To subscribe to Le ZD Tech on Podcast Addict, click here
  • To subscribe to Le ZD Tech on Amazon Music, click here
  • To subscribe to Le ZD Tech on Google Podcast, click here
  • To subscribe to Le ZD Tech on Pocket Casts, click here
  • To subscribe to Le ZD Tech on Castbox, click here
  • To subscribe to Le ZD Tech on Overcast, click here
  • To subscribe to Le ZD Tech on Castro, click here
  • To subscribe to Le ZD Tech on Podtail, click here
  • To subscribe to Le ZD Tech on TuneIn, click here
  • To subscribe to Le ZD Tech on Podnews, it’s here
  • To subscribe to Le ZD Tech on Listen Notes, it’s here
  • To subscribe to Le ZD Tech on Chartable, click here
  • To subscribe to Le ZD Tech on Cast Box, click here
  • To subscribe to Le ZD Tech on Android, it’s here





Source link -97