21st Century Inno...
Follow
Find tag "Cybersecurity"
37.1K views | +4 today
21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Everything from new developments and discoveries in the Technology world:science,ICT,medicine,pharma...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Microsoft kauft Cloud-Security-Spezialist Adallom | Acquisitions

Microsoft kauft Cloud-Security-Spezialist Adallom | Acquisitions | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
Microsoft bezahlt rund 320 Millionen US-Dollar für den israelischen Cloud-Security-Anbieter Adallom. Die Lösung des Unternehmens soll unerwünschte Zugriffe auf Cloud-Dienste erkennen und blockieren.


Mehr erfahren / Learn more:


http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Acquisitions


Gust MEES's insight:
Microsoft bezahlt rund 320 Millionen US-Dollar für den israelischen Cloud-Security-Anbieter Adallom. Die Lösung des Unternehmens soll unerwünschte Zugriffe auf Cloud-Dienste erkennen und blockieren.


Mehr erfahren / Learn more:


http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Acquisitions


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple fixes FREAK in iOS, OS X and Apple TV - and numerous other holes besides | CyberSecurity

Apple fixes FREAK in iOS, OS X and Apple TV - and numerous other holes besides | CyberSecurity | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it


Apple's latest security fixes are out. 


The FREAK bug is now fixed, but so are numerous other holes worth patching in their own right.







Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Apple's latest security fixes are out. 


The FREAK bug is now fixed, but so are numerous other holes worth patching in their own right.



Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
Gust MEES's curator insight, March 13, 5:44 PM

Apple's latest security fixes are out. 


The FREAK bug is now fixed, but so are numerous other holes worth patching in their own right.



Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

Anonymous journalist Barrett Brown sentenced to 63 months in jail

Anonymous journalist Barrett Brown sentenced to 63 months in jail | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it




Barrett Brown has been sentenced to 63 months in prison on charges related to the Stratfor hack.





Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Jail...


http://www.scoop.it/t/securite-pc-et-internet/?tag=Prison


Gust MEES's insight:

Barrett Brown has been sentenced to 63 months in prison on charges related to the Stratfor hack.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Jail...


http://www.scoop.it/t/securite-pc-et-internet/?tag=Prison


more...
Gust MEES's curator insight, January 23, 3:37 PM

Barrett Brown has been sentenced to 63 months in prison on charges related to the Stratfor hack.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Jail...


http://www.scoop.it/t/securite-pc-et-internet/?tag=Prison

Scooped by Gust MEES
Scoop.it!

Why cybercriminals want your personal data

Why cybercriminals want your personal data | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
Over the past few years, the personal data theft landscape has changed as online behaviors and activities evolve.

 

To better understand this crime, it helps to understand what personal data is worth to an identity thief. The average identity thief doesn’t steal data to use for him or herself. In most cases, they take the personal information and sell it on the online black market. It can be surprising what an individual’s personal information is worth.

Based off of what we’ve seen at CSID, a credit card number, name and date of birth can sell for $13. A Social Security Number can go for $20. A bank account with a balance of $10,000 goes for an average cost of $625. Even the value of a person’s social media account has worth. According to RSA, 10,000 followers on Twitter sell for $15. 1,000 likes on Facebook sell for $15.


Gust MEES's insight:

 

Based off of what we’ve seen at CSID, a credit card number, name and date of birth can sell for $13. A Social Security Number can go for $20. A bank account with a balance of $10,000 goes for an average cost of $625. Even the value of a person’s social media account has worth. According to RSA, 10,000 followers on Twitter sell for $15. 1,000 likes on Facebook sell for $15.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cybercrime...

 

more...
Gust MEES's curator insight, November 12, 2013 10:08 AM

 

Based off of what we’ve seen at CSID, a credit card number, name and date of birth can sell for $13. A Social Security Number can go for $20. A bank account with a balance of $10,000 goes for an average cost of $625. Even the value of a person’s social media account has worth. According to RSA, 10,000 followers on Twitter sell for $15. 1,000 likes on Facebook sell for $15.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cybercrime...

 

Scooped by Gust MEES
Scoop.it!

Credit card has built-in keyboard

Credit card has built-in keyboard | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
A credit card with a built-in LCD screen and keyboard is announced by Mastercard in an effort to simplify secure online banking.

 

Read more:

http://www.bbc.co.uk/news/technology-20250441

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Les cyber-risques, tout le monde en parle enfin !

Les cyber-risques, tout le monde en parle enfin ! | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it

La médiatisation a néanmoins favorisé la prise de conscience des dangers liés à ces nouvelles technologies et l'émergence de solutions.

 

Il est désormais possible de faire surveiller son réseau informatique comme on fait surveiller ses locaux et d'intervenir en temps réel pour se protéger des malveillances détectées. Il est également devenu possible de s'assurer contre les conséquences financières de ces intrusions et malveillances.

 

Plusieurs assureurs proposent depuis peu des contrats spécifiques pour garantir les cyber-risques.

 

Cependant tant la nature des garanties, que leur montant et les primes sont très dépendants du niveau de prévention mis en place par l'entreprise.

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Des missiles à la cybersécurité: l’Américain Raytheon prend le contrôle de Websense | Acquisitions

Des missiles à la cybersécurité: l’Américain Raytheon prend le contrôle de Websense | Acquisitions | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
La société californienne d'aérospatiale et de défense Raytheon se renforce sur la cybersécurité. Elle vient de débourser 1,9 milliard de dollars pour acquérir Websense, a indiqué l'agence Reuters samedi 18 avril, citant des sources proches du dossier et confirmant une information du site spécialisé dans la high-tech CRN. Websense, spécialisée dans la sécurité des réseaux informatiques, appartenait précédemment au fonds de capital-investissement Vista Equity Partners. Ce fonds conserve toutefois 20% du capital. « Raytheon paie l’équivalent de plus de quatre à cinq fois le chiffre d’affaires annuel de Websense » a précisé le Wall Street Journal ce lundi.

En savoir plus sur http://frenchweb.fr/des-missiles-a-la-cybersecurite-lamericain-raytheon-prend-le-controle-de-websense/191376#gs161oa2U9Uvgpes.99


Gust MEES's insight:
La société californienne d'aérospatiale et de défense Raytheon se renforce sur la cybersécurité. Elle vient de débourser 1,9 milliard de dollars pour acquérir Websense, a indiqué l'agence Reuters samedi 18 avril, citant des sources proches du dossier et confirmant une information du site spécialisé dans la high-tech CRN. Websense, spécialisée dans la sécurité des réseaux informatiques, appartenait précédemment au fonds de capital-investissement Vista Equity Partners. Ce fonds conserve toutefois 20% du capital. « Raytheon paie l’équivalent de plus de quatre à cinq fois le chiffre d’affaires annuel de Websense » a précisé le Wall Street Journal ce lundi.

En savoir plus sur http://frenchweb.fr/des-missiles-a-la-cybersecurite-lamericain-raytheon-prend-le-controle-de-websense/191376#gs161oa2U9Uvgpes.99


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

16 million mobile devices hit by malware in 2014: Alcatel-Lucent | Mobile Security

16 million mobile devices hit by malware in 2014: Alcatel-Lucent | Mobile Security | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
Around 16 million mobile devices worldwide was hit by malware as at the end of 2014, while attacks on communications networks rose during the year, according to new research by Alcatel-Lucent.

.

Less than 1 percent of infections came from iPhone and Blackberry smartphones. Although, new vulnerabilities, such as the 'Find My iPhone' exploit discovered last year, have emerged in the past 12 months, showing that they are not immune from malware threats.

Gust MEES's insight:
Around 16 million mobile devices worldwide was hit by malware as at the end of 2014, while attacks on communications networks rose during the year, according to new research by Alcatel-Lucent.

.

Less than 1 percent of infections came from iPhone and Blackberry smartphones. Although, new vulnerabilities, such as the 'Find My iPhone' exploit discovered last year, have emerged in the past 12 months, showing that they are not immune from malware threats.

more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Same Security Threats, Different Devices: Wearables and Watchables

Same Security Threats, Different Devices: Wearables and Watchables | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.


“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.”


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=wearables





Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=wearables


more...
Gust MEES's curator insight, September 15, 2014 11:25 AM

“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.”


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Scooped by Gust MEES
Scoop.it!

NSA Reportedly Broke Privacy Rules Thousands Of Times Per Year

NSA Reportedly Broke Privacy Rules Thousands Of Times Per Year | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
WASHINGTON -- The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, The Washington Post reported Thursday.

 

Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by law and executive order.


They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. emails and telephone calls, the Post said, citing an internal audit and other top-secret documents provided it earlier this summer from NSA leaker Edward Snowden, a former systems analyst with the agency.


Gust MEES's insight:

 

===> In most cases, the NSA was involved in unauthorized surveillance of Americans or foreign intelligence targets in the U.S., despite these being restricted by law and executive order. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=PRISM

 

more...
Gust MEES's curator insight, August 15, 2013 10:21 PM

 

===> In most cases, the NSA was involved in unauthorized surveillance of Americans or foreign intelligence targets in the U.S., despite these being restricted by law and executive order. <===

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=PRISM

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cybersecurity Experts Investigate Self-adapting Network that Defends against Hackers

Cybersecurity Experts Investigate Self-adapting Network that Defends against Hackers | 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)... | Scoop.it
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself...

 

In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself...

 

As the study progresses, the computer scientists will develop a set of analytical models to determine the effectiveness of a moving-target defense system. They also will create a proof-of-concept system as a way to experiment with the idea in a concrete setting.

"It's important to investigate any scientific evidence that shows that this approach does work so it can be fully researched and developed," DeLoach said. He started collaborating with Ou to apply intelligent adaptive techniques to cybersecurity several years ago after a conversation at a university open house.

 

Read more: http://www.scientificcomputing.com/news-HPC-Cybersecurity-Experts-Investigate-Self-adapting-Network-that-Defends-against-Hackers-051512.aspx

 

more...
No comment yet.