digitalcuration
14.6K views | +8 today
Follow
 
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
onto digitalcuration
Scoop.it!

How spyware on rental PCs captured users' most intimate moments

How spyware on rental PCs captured users' most intimate moments | digitalcuration | Scoop.it

On the second-to-last Monday of 2010, Brian Byrd was playing video poker on his Dell Inspiron laptop when someone knocked on the door of his home in Casper, Wyoming. The visitor, who drove a truck from the local Aaron's rent-to-own store that furnished the PC five months earlier, said the 25-year-old Byrd was behind in his payments and demanded he pay up at once. He then brandished a picture that was about to cause a national privacy uproar.

 

The image showed Byrd on his home couch using the very laptop in question to play online poker. The employee was also privy to a screenshot of the website Byrd's PC was displaying the moment the photo was surreptitiously taken, along with keystrokes he was entering while visiting a website. When Byrd demanded an explanation, the employee, identified in a police report as 24-year-old Christopher Mendoza, said he wasn't supposed to answer. But he went on to disclose that the PC contained software that allowed Aaron's employees to track its physical location and remotely activate its webcam and capture screenshots and keystrokes. Mendoza, according to court records, left the premises after Byrd produced a copy of a receipt showing the laptop had been paid for in full on October 1.

 


Via Gust MEES
more...
No comment yet.
digitalcuration
société de l'information, identité & comportements numériques, sécurité de l'information, réseaux & médias sociaux
Curated by Stéphane Koch
Your new post is loading...
Your new post is loading...
Scooped by Stéphane Koch
Scoop.it!

Situation actuelle et tendances de la cybercriminalité | Prévention Suisse de la Criminalité «PSC INFO»

Situation actuelle et tendances de la cybercriminalité | Prévention Suisse de la Criminalité «PSC INFO» | digitalcuration | Scoop.it
Interview publiée, en décembre 2016, dans le le magazine trimestriel de la La Prévention Suisse de la Criminalité [Pages 1-9].

La Prévention Suisse de la Criminalité publie le magazine trimestriel «PSC INFO» consacré à des sujets d'actualité dans le domaine de la prévention de la criminalité. Traitant des aspects les plus divers du travail de prévention de la police et de sujets connexes, le magazine s’adresse aux corps de police et à d’autres milieux intéressés.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Les contrats intelligents à l'épreuve du droit et de sa pratique

Les contrats intelligents à l'épreuve du droit et de sa pratique | digitalcuration | Scoop.it
Les contrats intelligents, basés sur la blockchain, sont présentés comme garantissant une meilleure sécurité juridique et facilitant l'exécution des obligations à la charge des parties à un contrat. Il existe néanmoins un certain nombre de défis à relever avant qu'ils ne soient adoptés à grande échelle.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Cloudflare Has Been Leaking Data, So Please Change Your Passwords

Cloudflare Has Been Leaking Data, So Please Change Your Passwords | digitalcuration | Scoop.it
Some of the most popular websites have been leaking user data onto the web. The scale of the problem isn't yet clear, but the advice, as always, is to change your passwords.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

L’empreinte digitale, cet élément de réputation qu’on oublie si (et trop) souvent ! | Le blog du Communicant

L’empreinte digitale, cet élément de réputation qu’on oublie si (et trop) souvent ! | Le blog du Communicant | digitalcuration | Scoop.it
Ces derniers temps, l’affaire médiatique de Mehdi Meklat a contribué à remettre sous les projecteurs un élément de réputation que les médias sociaux ont amplifié pour le meilleur ou le pire..
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Les logiciels périmés, porte d’entrée pour les hackers

Les logiciels périmés, porte d’entrée pour les hackers | digitalcuration | Scoop.it
Les logiciels installés sur ordinateur ont une durée de vie. Certains éditeurs, après avoir développé une nouvelle version de leur produit, ne fournissent plus aucun support à leur logiciel précédent et les abandonnent complètement. Le rapport de Secunia Research, un laboratoire d'expertise de l'entreprise spécialisée dans l'installation de logiciels et la gestion de licences Flexera Software, rapporte ainsi que « sur les 76 programmes installés en moyenne sur les PC des particuliers français, 8 sont en fin de vie ».
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

How to Protect Yourself from Creepy, Phone Snooping Spyware - Motherboard

How to Protect Yourself from Creepy, Phone Snooping Spyware - Motherboard | digitalcuration | Scoop.it
Although a hacker can only infect a phone if they have physical access to the device, the threat from this type of malware is very real. It is heavily used by, and marketed towards, jealous lovers to spy on their spouses. For around two decades, people have used spyware for this purpose, with many cases ending up in violence or even murder. What can potential victims of this type of surveillance do to check if they're being monitored? What are some of the best practices to keep in mind to make installing the malware harder? And what can those who are certainly being spied on do? Unfortunately, this is actually one of the harder information security threats to reliably give advice for.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Marathon runner’s tracked data exposes phony time, cover-up attempt

Marathon runner’s tracked data exposes phony time, cover-up attempt | digitalcuration | Scoop.it
A cut corner, a retraced route on a bike, and the Garmin tracker that exposed the lies.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Now sites can fingerprint you online even when you use multiple browsers

Now sites can fingerprint you online even when you use multiple browsers | digitalcuration | Scoop.it
The new tracking technique relies on JavaScript code that's compact enough to run quickly in the background while visitors are focused on a specific task, such as reading text or viewing video. The researchers have launched this website to demonstrate the techniques and have released the corresponding source code here. In a test that collected 3,615 fingerprints from 1,903 users over a three-month period, the technique was able to successfully identify 99.2 percent of users. By contrast, a single-browser fingerprinting technique dubbed AmIUnique, had a success rate of 90.8 percent. Fortunately, cross-browser tracking doesn't work against people using the default installation of the Tor browser. Still, many people tweak their installations of Tor so that it supports certain WebGL graphics capabilities required by gaming sites or other online destinations. While those tweaks may make the Tor browser more usable, they may also make it less immune to the fingerprinting techniques. Cao said he's not aware of any sites using cross-browser fingerprinting. Cross-browser fingerprinting is only the latest trick developers have come up with to track people who visit their sites. Besides traditional single-browser fingerprinting, other tracking methods include monitoring the way visitors type passwords and other text and embedding inaudible sound in TV commercials or websites. The Tor browser without an attached microphone or speakers is probably the most effective means of protection, although the researchers said running a browser inside a virtual machine may also work
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

A Stylometric Inquiry into Hyperpartisan and Fake News

This paper reports on a writing style analysis of hyperpartisan (i.e., extremely one-sided) news in connection to fake news. It presents a large corpus of 1,627 articles that were manually fact-checked by professional journalists from BuzzFeed. The articles originated from 9 well-known political publishers, 3 each from the mainstream, the hyperpartisan left-wing, and the hyperpartisan right-wing. In sum, the corpus contains 299 fake news, 97% of which originated from hyperpartisan publishers. We propose and demonstrate a new way of assessing style similarity between text categories via Unmasking---a meta-learning approach originally devised for authorship verification---, revealing that the style of left-wing and right-wing news have a lot more in common than any of the two have with the mainstream. Furthermore, we show that hyperpartisan news can be discriminated well by its style from the mainstream (F1=0.78), as can be satire from both (F1=0.81). Unsurprisingly, style-based fake news detection does not live up to scratch (F1=0.46). Nevertheless, the former results are important to implement pre-screening for fake news detectors.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Federal Judge Denies Warrant to Fingerprint Unlock Random Apple Devices in Illinois Building - Motherboard

Federal Judge Denies Warrant to Fingerprint Unlock Random Apple Devices in Illinois Building - Motherboard | digitalcuration | Scoop.it
According to the judge, the warrant application didn't identify any particular individual or device, and it also raises issues of compelled self-incrimination. The new document signals a developing trend in the drafting of so-called mass fingerprint warrants. "Essentially, the government seeks an order from this Court that would allow agents executing this warrant to force 'persons at the Subject Premises' to apply their thumbprints and fingerprints to any Apple electronic device recovered at the premises," the opinion and order signed by United States Magistrate Judge M. David Weisman from the Northern District of Illinois, Eastern Division, reads.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Comparatif de logiciels de veille

Comparatif de logiciels de veille | digitalcuration | Scoop.it
Ce tableau qui permet de comparer les solutions de veille a été créé à partir de données publiques disponibles. Editeurs ? Professionnels de la veille ? Si vous souhaitez corriger ou compléter ces données, merci de contacter l'équipe du Portail IE. Ce dashboard sera mis à jour en continu.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Malware authors camouflage code with Russian terms

Malware authors camouflage code with Russian terms | digitalcuration | Scoop.it
Lazarus group thought to be behind attack code. Malware authors are attempting to hide behind Russia's reputation as digital crime centre to throw investigators off their scent, a security firm has found
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Change.org, MesOpinions.com : ce qu’implique vraiment le fait de signer une pétition sur Internet

Change.org, MesOpinions.com : ce qu’implique vraiment le fait de signer une pétition sur Internet | digitalcuration | Scoop.it
Espaces d'opinion et d'engagement, les plateformes de pétitions en ligne aspirent des données personnelles parmi les plus sensibles. En y regardant de plus près, on réalise à quel point une simple "signature" pourrait, un jour, nous causer du tort. (...) Dans le cas de Change.org comme d’Avaaz.org (et non dans celui de MesOpinions.com, qui est une entreprise française dont les serveurs sont basés à Roubaix), les informations que nous fournissons voyagent. "Vos données personnelles peuvent être stockées et traitées dans tous les pays dans lesquels nous avons des installations ou dans lesquels nous faisons appel à des prestataires de service ; en utilisant la plateforme, vous consentez au transfert de vos données personnelles vers des pays autres que votre pays de résidence, y compris les États-Unis, où les règles de protection des données peuvent différer de celles de votre pays", stipule Change.org.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Three kinds of propaganda, and what to do about them

Three kinds of propaganda, and what to do about them | digitalcuration | Scoop.it
Jonathan Stray summarizes three different strains of propaganda, analyzing why they work, and suggesting counter-tactics: in Russia, it’s about flooding the channel with a mix of lies and truth
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Une charte pour guider les élus sur Facebook?

Une charte pour guider les élus sur Facebook? | digitalcuration | Scoop.it
Les communes doivent-elles régir ce qu’écrivent leurs élus sur les réseaux sociaux? Pour l’heure, aucune des grandes municipalités du canton n’a émis de directives en la matière. Mais cela pourrait bientôt changer. «Certaines personnes sont très sages en séance mais se lâchent sur Facebook», déplore Michel Fabre, conseiller municipal socialiste à Meyrin. Pour éviter les dérapages, l’élu a proposé d’étendre la charte de bonne conduite du Délibératif aux réseaux sociaux. La proposition est actuellement discutée en commission. Les autres communes se montrent globalement favorables à la démarche. Certaines pourraient même s’en inspirer.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

YouTuber Influencers vs. Legacy Media: PewDiePie, Weaponized microcelebrity, and Cross-media politics

YouTuber Influencers vs. Legacy Media: PewDiePie, Weaponized microcelebrity, and Cross-media politics | digitalcuration | Scoop.it
The Society Pages (TSP) is an open-access social science project headquartered in the Department of Sociology at the University of Minnesota
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

A complete guide to seeing the news beyond your cozy filter bubble

A complete guide to seeing the news beyond your cozy filter bubble | digitalcuration | Scoop.it
According to Eli Pariser, who authored the 2011 book The Filter Bubble, an already-divided public is becoming even more so as people increasingly use algorithm-driven platforms like Facebook to consume news. These algorithms aim to serve consumers content that is most relevant to their lives and preferences. In the case of news, if you consistently click on stories with either a liberal or conservative bent, you will prime the algorithm to serve you similar stories in the future—with other views filtered out. Content producers are also learning to manipulate these algorithms, by framing stories that play directly into existing partisan narratives, often to maximize clicks—but sometimes with nefarious intent.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

That Viral Video of Tigers Chasing a Drone Is From a Slaughter Farm, Folks - Motherboard

That Viral Video of Tigers Chasing a Drone Is From a Slaughter Farm, Folks - Motherboard | digitalcuration | Scoop.it
The truth about a popular video of Siberian tigers chasing a drone will surely depress you. The tiger farm, according to Big Cat Rescue, has operated under the guise of an animal rescue for some time. Busloads of tourists are given the rare opportunity to gawk at fearsome felines that would otherwise rip your face off. But Harbin Siberian Tiger Park also specializes in contraband like tiger bone, meat, pelts, and a speciality called "bone wine." A visit by McClatchy investigative reporters "found animals in deplorable conditions… merchants openly sold bone wine, despite a 1993 ban by China on bone products sourced from both domesticated and wild tigers."
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Cybercriminalité : de la séduction à la sextorsion !

Cybercriminalité : de la séduction à la sextorsion ! | digitalcuration | Scoop.it
La sextorsion est une escroquerie visant à obtenir des photos ou des vidéos à caractère sexuel par la ruse. Les auteurs menacent ensuite de publier ces images dans le but d’obtenir des faveurs ou de l’argent de leurs victimes. Cette forme de chantage sur Internet, principalement sur les réseaux sociaux, compte bon nombre de victimes.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

A Fake Dark Web Hitman Site is Linked to a Real Murder - Motherboard

A Fake Dark Web Hitman Site is Linked to a Real Murder - Motherboard | digitalcuration | Scoop.it
Dark web site Besa Mafia was hacked in May 2016. The FBI has been actively investigating the site's users. Stephen Allwine is allegedly a killer. According to a criminal complaint, Stephen is suspected of shooting his wife, Amy Allwine, in the head with a nine millimeter pistol in their Cottage Grove, Minnesota, home last year. But one key part of the story that led prosecutors to charge Stephen was his alleged, and failed, attempt to hire a hitman on the so-called dark web to murder Amy. That site, called Besa Mafia and ostensibly run by Albanian gangsters, was an elaborate scam, and in May a hacker posted the site's customer details and messages online
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

La police arrête un cambrioleur de voitures bien équipé

La police arrête un cambrioleur de voitures bien équipé | digitalcuration | Scoop.it
Des brouilleurs d'ondes, empêchant le verrouillage à distance des voitures, sont retrouvés sur un voleur. On aurait dit des télécommandes, mais cela n'en était point. La police genevoise a retrouvé deux brouilleurs d'ondes dans les affaires d'un malfrat qui avait été surpris visitant des voitures aux Eaux-Vives. Ces appareils, illicites en Suisse, peuvent permettre d'empêcher le verrouillage à distance d'une voiture grâce aux clés automatiques.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Ransomware Attack Pushes Fake Font Update On Google Chrome Users

Ransomware Attack Pushes Fake Font Update On Google Chrome Users | digitalcuration | Scoop.it
Phishing attacks are the biggest threat to your security, but they're not limited to your inbox. Cybercriminals will also use the same social engineering techniques to attack you while you browse the web. The attack spawns an alert when you visit a compromised web page. It claims that the "HoeflerText font was not found" in your Google Chrome instance and displays version numbers that make it appear as though Chrome is somehow out-of-date. Fall for the ruse, and a "font installer" begins to download. That file is actually a "dropper," and researchers have seen it delivering the highly-sophisticated Spora ransomwareransomwareÀ
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Beware of fake Facebook profiles posing as people you know

Beware of fake Facebook profiles posing as people you know | digitalcuration | Scoop.it
Scammers sometimes create fake, duplicate accounts to pose as real people and steal your personal information.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

9 Key Steps for Re-Branding Your Business on Social Media

9 Key Steps for Re-Branding Your Business on Social Media | digitalcuration | Scoop.it
If you're looking to re-brand your business, there are a few steps you need to keep in mind for your social media presence.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

This researcher programmed bots to fight racism on Twitter. It worked.

This researcher programmed bots to fight racism on Twitter. It worked. | digitalcuration | Scoop.it
And a particular kind of bot worked best. A better option might be to empower users to improve their online communities through peer-to-peer sanctioning. To test this hypothesis, I used Twitter accounts I controlled (“bots,” although they aren’t acting autonomously) to send messages designed to remind harassers of the humanity of their victims and to reconsider the norms of online behavior.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Messageries Sécurisées - NoLimitSecu

Messageries Sécurisées - NoLimitSecu | digitalcuration | Scoop.it
Episode #120 dédié aux messageries sécurisées avec Jérémy Matos et Frédéric Jacobs
more...
No comment yet.