Ce didacticiel a pour but de montrer quels sont les éléments qui pourraient vous permettre d'identifier un faux profil sur facebook. La démarche n'est pas exhaustive, mais elle peut néanmoins être appliquée à la plupart des profils potentiellement faux
Terminée l'installation de logiciels pour prendre le contrôle d'un ordinateur à distance, un simple compte Google fera amplement l'affaire. Le hangout de Gmail ou Google+ offre désormais cette fonctionnalité.
We’ve all been there: stuck in traffic, frustrated that you chose the wrong route on the drive to work. But imagine if you could see real-time traffic updates from friends and fellow travelers ahead of you, calling out “fender bender...totally stuck in left lane!” and showing faster routes that others are taking.
To help you outsmart traffic, today we’re excited to announce we’ve closed the acquisition of Waze. This fast-growing community of traffic-obsessed drivers is working together to find the best routes from home to work, every day.
Le Washington Post s'est-il trop avancé, dans les accusations d'espionnage Internet ? Le quotidien avait révélé ,jeudi un document secret de la National Security Agency (NSA) indiquant que celle-ci accédait à toutes les données de neuf géants du Net. Aujourd'hui les faits semblent plus nuancés: le Washington Post a retiré de la version en ligne de son article l'affirmation selon laquelle Google, Facebook et les autres participaient "en connaissance de cause" au programme Prism de la NSA. Le New York Times, lui, estime que Prism ne permettrait pas à la NSA d'accéder directement aux serveurs centraux des entreprises.
(...) A six-year-old so-called Trojan horse program that drains bank accounts is alive and well on Facebook.
Zeus is a particularly nasty Trojan horse that has infected millions of computers, most of them in the United States. Once Zeus has compromised a computer, it stays dormant until a victim logs into a bank site, and then it steals the victim’s passwords and drains the victim’s accounts. In some cases, it can even replace a bank’s Web site with its own page, in order to get even more information– such as a Social Security number– that can be sold on the black market.
The Trojan, which was first detected in 2007, is only getting more active. According to researchers at the security firm Trend Micro, incidents of Zeus have risen steadily this year and peaked in May. Eric Feinberg, founder of the advocacy group Fans Against Kounterfeit Enterprise (FAKE), has noticed an uptick in Zeus-serving malicious links on popular N.F.L. Facebook fan pages such as one created by a group called “Bring the N.F.L. To Los Angeles.”
A federal judge has ruled that Google must comply with the FBI's warrantless requests for confidential user data, despite the search company's arguments that the secret demands are illegal.
CNET has learned that U.S. District Judge Susan Illston in San Francisco rejected Google's request to modify or throw out 19 so-called National Security Letters, a warrantless electronic data-gathering technique used by the FBI that does not need a judge's approval. Her ruling came after a pair of top FBI officials, including an assistant director, submitted classified affidavits.
LinkedIn users now have the option to enable two-step verification via SMS text message to protect their accounts.
Just more than a week after Twitter introduced two-step verification, LinkedIn has followed suit.
LinkedIn announced in a blog post Friday that users on the social network for professionals now have the option to enable two-step verification via SMS text message to protect their accounts.
"All LinkedIn accounts are already protected by a series of automatic checks that are designed to thwart unauthorized sign-in attempts," the company said in the blog post. "Now, we are introducing a new optional feature that adds another layer of security to your LinkedIn sign-in: two-step verification."
Victime, comme Joomla et WordPress avant lui, d'une attaque informatique, Drupal exclut toute exfiltration de données sensibles, mais a réinitialisé les mots de passe de plus d'un million de comptes d'utilisateurs.
Issue: Cybersecurity for medical devices and hospital networks
Purpose: The FDA is recommending that medical device manufacturers and health care facilities take steps to assure that appropriate safeguards are in place to reduce the risk of failure due to cyberattack, which could be initiated by the introduction of malware into the medical equipment or unauthorized access to configuration settings in medical devices and hospital networks.
Summary of Problem and Scope: Many medical devices contain configurable embedded computer systems that can be vulnerable to cybersecurity breaches. In addition, as medical devices are increasingly interconnected, via the Internet, hospital networks, other medical device, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates.
A team of researchers from Georgia Tech say they've discovered, and can demonstrate, a way to to hack into an iPhone or iPad in less than a minute using a "malicious charger."
In a preview of its presentation, the team acknowledges Apple's "plethora of defense mechanisms in iOS." Historically, Mac users have been able to boast of being largely malware free, in part because spammers, scammers and hackers preferred to target the larger number of Windows computers in the world.
On its mobile iOS operating system, Apple has created a "closed garden" environment in which everything from apps to accessories has to be approved by Apple, as opposed to Google's more wide-open Android system.
But by attacking in a nontraditional way, the team of Billy Lau, Yeongjin Jang and Chengyu Song say, those defenses can be bypassed.
"(W)e investigated the extent to which security threats were considered when performing everyday activities such as charging a device," they wrote. "The results were alarming: despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software.
Whether you’re new to technology, just getting started with a social network, or looking for some useful tips then these courses are for you. They’re part of a new idea that I’ve been working on with a few friends. We’re calling it Modern Lessons and it’s essentially a ‘Khan Academy for real-world skills’ where a small handful of people build free online courses designed to help you learn some important things.
Over the last couple of days, multi-tasking cybercriminals have been spreading a "Facebook Profile Spy" campaign across Facebook, enticing users into installing a rogue Chrome extension, next to monetizing the campaign through an unethical pseudo-mobile marketing agency, known as Prizerally
Facebook Safety wrote a note titled Controversial, Harmful and Hateful Speech on Facebook. Read the full text here.
As part of doing better, we will be taking the following steps, that we will begin rolling out immediately:
We will complete our review and update the guidelines that our User Operations team uses to evaluate reports of violations of our Community Standards around hate speech. To ensure that these guidelines reflect best practices, we will solicit feedback from legal experts and others, including representatives of the women's coalition and other groups that have historically faced discrimination.
We will update the training for the teams that review and evaluate reports of hateful speech or harmful content on Facebook. To ensure that our training is robust, we will work with legal experts and others, including members of the women’s coalition to identify resources or highlight areas of particular concern for inclusion in the training.
We will increase the accountability of the creators of content that does not qualify as actionable hate speech but is cruel or insensitive by insisting that the authors stand behind the content they create. A few months ago we began testing a new requirement that the creator of any content containing cruel and insensitive humor include his or her authentic identity for the content to remain on Facebook. As a result, if an individual decides to publicly share cruel and insensitive content, users can hold the author accountable and directly object to the content. We will continue to develop this policy based on the results so far, which indicate that it is helping create a better environment for Facebook users.
We will establish more formal and direct lines of communications with representatives of groups working in this area, including women's groups, to assure expedited treatment of content they believe violate our standards. We have invited representatives of the women Everyday Sexism to join the less formal communication channels Facebook has previously established with other groups.
We will encourage the Anti-Defamation League’s Anti-Cyberhate working group and other international working groups that we currently work with on these issues to include representatives of the women’s coalition to identify how to balance considerations of free expression, to undertake research on the effect of online hate speech on the online experiences of members of groups that have historically faced discrimination in society, and to evaluate progress on our collective objectives.