digitalcuration
Follow
Find tag "Learning IT-Security"
10.3K views | +0 today
digitalcuration
société de l'information, identité & comportements numériques, sécurité de l'information, réseaux & médias sociaux
Curated by Stéphane Koch
Your new post is loading...
Your new post is loading...
Rescooped by Stéphane Koch from 21st Century Learning and Teaching
Scoop.it!

Combien de temps le mythe de la sécurité Mac va-t-il encore tenir?

Combien de temps le mythe de la sécurité Mac va-t-il encore tenir? | digitalcuration | Scoop.it

Utrecht, le 27 novembre 2013 - Selon une récente enquête de Kaspersky Lab, il existe de fortes probabilités qu’un nombre croissant d’utilisateurs Mac soient la proie de menaces d’Internet. La quantité des logiciels malveillants ciblant les Mac a augmenté de 50% au cours des douze derniers mois. Pourtant, plus d’un tiers (35%) de tous les utilisateurs Mac pensent à tort être protégés contre les menaces numériques.

Le nombre des propriétaires de Mac continue de progresser, et par conséquent l’intérêt des cybercriminels pour cette plate-forme s’amplifie lui aussi. Les virus informatiques, chevaux de Troie, astuces de phishing et autres menaces d’Internet visant cette plate-forme sont d’ores et déjà en circulation, en grands nombres qui plus est. Les utilisateurs sont ainsi tout aussi vulnérables que les utilisateurs de PC Windows.

 


Via Gust MEES
more...
Gust MEES's curator insight, November 27, 2013 10:31 AM

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, November 28, 2013 8:37 AM

 

35% of Mac users think (???) that THEY don't need any protection!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

Gust MEES's curator insight, November 28, 2013 8:40 AM

 

35% of Mac users think (???) that THEY don't need any protection!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Stéphane Koch from ICT Security Tools
Scoop.it!

Android Architecture and Pen-testing of Android applications

Android Architecture and Pen-testing of Android applications | digitalcuration | Scoop.it

Android, as we are all aware, is a Linux-based operating system which was initially developed by Android Inc. and was later purchased by Google. It was designed for touch screen devices like smartphones, tablets, cameras, set-top boxes, etc… and has reached the hands of millions of consumers.

 

Over a period of time, operating systems like Windows and Linux have matured against threats, thereby diverting the hackers towards newer targets like handheld devices. Millions of Android applications are downloaded from the Google Play store by users, thereby exposing end users’ email ids, banking details, sensitive details and messaging content due to insecure coding practices.

 

The users are either unaware or trust the apps to protect their sensitive data against theft.


Via Frederic GOUTH, Gust MEES
more...
Gust MEES's curator insight, February 13, 2013 3:02 AM

Check it out...

 

Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

How spyware on rental PCs captured users' most intimate moments

How spyware on rental PCs captured users' most intimate moments | digitalcuration | Scoop.it

On the second-to-last Monday of 2010, Brian Byrd was playing video poker on his Dell Inspiron laptop when someone knocked on the door of his home in Casper, Wyoming. The visitor, who drove a truck from the local Aaron's rent-to-own store that furnished the PC five months earlier, said the 25-year-old Byrd was behind in his payments and demanded he pay up at once. He then brandished a picture that was about to cause a national privacy uproar.

 

The image showed Byrd on his home couch using the very laptop in question to play online poker. The employee was also privy to a screenshot of the website Byrd's PC was displaying the moment the photo was surreptitiously taken, along with keystrokes he was entering while visiting a website. When Byrd demanded an explanation, the employee, identified in a police report as 24-year-old Christopher Mendoza, said he wasn't supposed to answer. But he went on to disclose that the PC contained software that allowed Aaron's employees to track its physical location and remotely activate its webcam and capture screenshots and keystrokes. Mendoza, according to court records, left the premises after Byrd produced a copy of a receipt showing the laptop had been paid for in full on October 1.

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécurité Mac : XMCO actu-secu [pdf]

Sécurité Mac : XMCO actu-secu [pdf] | digitalcuration | Scoop.it

l’ACTUSÉCU est un magazine numérique rédigé et édité par les consultants du cabinet de conseil XMCO

 

Numéro spécial dédié à la sécurité Mac...

 

En savoir plus :

 

http://www.xmco.fr/actu-secu/XMCO-ActuSecu-32-MACOS_Flashback.pdf

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from 21st Century Learning and Teaching
Scoop.it!

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again) | digitalcuration | Scoop.it
You know those people who put tape over their laptop's webcam to keep digital peeping toms at bay? They're not crazy.

Via Gust MEES
more...
Stewart-Marshall's curator insight, June 15, 2013 8:29 AM

Tested it - and it's true - it works on Chrome.  Scary :-(

AnnC's curator insight, June 16, 2013 1:18 PM

FYI - you can be seen - how do you look?

Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | digitalcuration | Scoop.it

This tool is designed to help the many smartphone owners who aren't protected against mobile security threats. To use this tool, choose your mobile operating system below and then follow the 10 customized steps to secure your mobile device. More about the Smartphone Security Checker.


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

BlackHole Will Get More Complex, Android and Mac OS Are Prime Attack Targets

BlackHole Will Get More Complex, Android and Mac OS Are Prime Attack Targets | digitalcuration | Scoop.it

"Attackers have expanded their attacks beyond the Windows platform to include Mac OS X and Android. 27 Percent of All Cybercrime Linked to the ‘Blackhole’ Exploit Kit", Sophos said.

 

Even though the overall market share for Mac OS X remains small compared to other platforms, the number of Mac threats are growing as more users switch. Flashback, the malware that reportedly infected hundreds of thousands of Apple systems in April was the largest mass attack this year, but it's not the only Mac malware out there. In a typical week, SophosLabs detects 4,900 pieces of OS X malware on Mac computers.

 

===> In a snapshot of Mac malware detected over a one-week period in August, SophosLab detected various variants of fake antivirus, codecs and Flash player. <===

 

 


Via Gust MEES
more...
No comment yet.