digitalcuration
14.5K views | +0 today
Follow
 
Scooped by Stéphane Koch
onto digitalcuration
Scoop.it!

Victime d'une attaque, Twitter réinitialise 250 000 mots de passe

Victime d'une attaque, Twitter réinitialise 250 000 mots de passe | digitalcuration | Scoop.it

Twitter a indiqué vendredi avoir été victime d'une attaque informatique de grande envergure, lors de laquelle des données utilisateur auraient pu être compromises. Le service indique avoir préféré réinitialiser les sessions et les mots de passe de quelque 250 000 comptes.

 

Peut-être avez-vous reçu dans la nuit de vendredi à samedi un email invitant à la création d'un nouveau mot de passe sur notre compte Twitter. Nulle tentative de phishing ici, le courrier émanait bien de Twitter, qui s'en explique sur son blog. Le site indique qu'en dépit de ses efforts, les données associées à quelque 250 000 ont pu être compromises, d'où cette réinitialisation effectuée au nom du principe de précaution.

 

 

more...
No comment yet.
digitalcuration
société de l'information, identité & comportements numériques, sécurité de l'information, réseaux & médias sociaux
Curated by Stéphane Koch
Your new post is loading...
Your new post is loading...
Scooped by Stéphane Koch
Scoop.it!

Situation actuelle et tendances de la cybercriminalité | Prévention Suisse de la Criminalité «PSC INFO»

Situation actuelle et tendances de la cybercriminalité | Prévention Suisse de la Criminalité «PSC INFO» | digitalcuration | Scoop.it
Interview publiée, en décembre 2016, dans le le magazine trimestriel de la La Prévention Suisse de la Criminalité [Pages 1-9].

La Prévention Suisse de la Criminalité publie le magazine trimestriel «PSC INFO» consacré à des sujets d'actualité dans le domaine de la prévention de la criminalité. Traitant des aspects les plus divers du travail de prévention de la police et de sujets connexes, le magazine s’adresse aux corps de police et à d’autres milieux intéressés.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Cybercriminalité : de la séduction à la sextorsion !

Cybercriminalité : de la séduction à la sextorsion ! | digitalcuration | Scoop.it
La sextorsion est une escroquerie visant à obtenir des photos ou des vidéos à caractère sexuel par la ruse. Les auteurs menacent ensuite de publier ces images dans le but d’obtenir des faveurs ou de l’argent de leurs victimes. Cette forme de chantage sur Internet, principalement sur les réseaux sociaux, compte bon nombre de victimes.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

A Fake Dark Web Hitman Site is Linked to a Real Murder - Motherboard

A Fake Dark Web Hitman Site is Linked to a Real Murder - Motherboard | digitalcuration | Scoop.it
Dark web site Besa Mafia was hacked in May 2016. The FBI has been actively investigating the site's users. Stephen Allwine is allegedly a killer. According to a criminal complaint, Stephen is suspected of shooting his wife, Amy Allwine, in the head with a nine millimeter pistol in their Cottage Grove, Minnesota, home last year. But one key part of the story that led prosecutors to charge Stephen was his alleged, and failed, attempt to hire a hitman on the so-called dark web to murder Amy. That site, called Besa Mafia and ostensibly run by Albanian gangsters, was an elaborate scam, and in May a hacker posted the site's customer details and messages online
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

La police arrête un cambrioleur de voitures bien équipé

La police arrête un cambrioleur de voitures bien équipé | digitalcuration | Scoop.it
Des brouilleurs d'ondes, empêchant le verrouillage à distance des voitures, sont retrouvés sur un voleur. On aurait dit des télécommandes, mais cela n'en était point. La police genevoise a retrouvé deux brouilleurs d'ondes dans les affaires d'un malfrat qui avait été surpris visitant des voitures aux Eaux-Vives. Ces appareils, illicites en Suisse, peuvent permettre d'empêcher le verrouillage à distance d'une voiture grâce aux clés automatiques.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Ransomware Attack Pushes Fake Font Update On Google Chrome Users

Ransomware Attack Pushes Fake Font Update On Google Chrome Users | digitalcuration | Scoop.it
Phishing attacks are the biggest threat to your security, but they're not limited to your inbox. Cybercriminals will also use the same social engineering techniques to attack you while you browse the web. The attack spawns an alert when you visit a compromised web page. It claims that the "HoeflerText font was not found" in your Google Chrome instance and displays version numbers that make it appear as though Chrome is somehow out-of-date. Fall for the ruse, and a "font installer" begins to download. That file is actually a "dropper," and researchers have seen it delivering the highly-sophisticated Spora ransomwareransomwareÀ
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Beware of fake Facebook profiles posing as people you know

Beware of fake Facebook profiles posing as people you know | digitalcuration | Scoop.it
Scammers sometimes create fake, duplicate accounts to pose as real people and steal your personal information.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

9 Key Steps for Re-Branding Your Business on Social Media

9 Key Steps for Re-Branding Your Business on Social Media | digitalcuration | Scoop.it
If you're looking to re-brand your business, there are a few steps you need to keep in mind for your social media presence.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

This researcher programmed bots to fight racism on Twitter. It worked.

This researcher programmed bots to fight racism on Twitter. It worked. | digitalcuration | Scoop.it
And a particular kind of bot worked best. A better option might be to empower users to improve their online communities through peer-to-peer sanctioning. To test this hypothesis, I used Twitter accounts I controlled (“bots,” although they aren’t acting autonomously) to send messages designed to remind harassers of the humanity of their victims and to reconsider the norms of online behavior.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Messageries Sécurisées - NoLimitSecu

Messageries Sécurisées - NoLimitSecu | digitalcuration | Scoop.it
Episode #120 dédié aux messageries sécurisées avec Jérémy Matos et Frédéric Jacobs
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

DataSelfie, l'extention qui vous dit ce que Facebook pense de vous - SciencePost

DataSelfie, l'extention qui vous dit ce que Facebook pense de vous - SciencePost | digitalcuration | Scoop.it
Tout le monde sait plus ou moins que les réseaux sociaux sont intrusifs et cela a de quoi faire peur. Il existe désormais une extension Chrome dont le but est de donner un aperçu de ce que Facebook pense de vous. En effet, chaque inscrit s’est vu attribuer un profil social qui correspond à ce …
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Une publication sponsorisée sur Instagram coûte en moyenne 300 dollars

Une publication sponsorisée sur Instagram coûte en moyenne 300 dollars | digitalcuration | Scoop.it
À travers quelques chiffres, la plateforme influence.co montre que les influenceurs sur Instagram sont de plus en plus demandés et sont aussi de plus en plus chers. Pour optimiser une opération d’influence sur les réseaux sociaux, il faut savoir y mettre le prix et le haut du classement est occupé par la mode, la photographie, la cuisine, les animaux et le fitness.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

How the internet has democratised pornography

How the internet has democratised pornography | digitalcuration | Scoop.it
With people now free to circumvent the big studios, different bodies, tastes and even pubic hair styles are being represented online.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Bill Gates and Elon Musk just warned us about the one thing politicians are too scared to talk…

Bill Gates and Elon Musk just warned us about the one thing politicians are too scared to talk… | digitalcuration | Scoop.it
Automation is inevitable. But we still have time to take action and help displaced workers. Automation is accelerating. The software powering these robots becomes more powerful every day. We can’t stop it. But we can adapt to it. Bill Gates recommends we tax robotic workers so that we can recapture some of the money displaced workers would have paid as income tax. Elon Musk recommends we adopt universal basic income and give everyone a certain amount of money each year so we can keep the economy going even as millions of workers are displaced by automation. And I recommend we take some of the taxpayer money we’re using to subsidize industries that are now mostly automated, and instead invest it in training workers for emerging engineering jobs. The answer to the automation challenge may involve some combination of these three approaches. But we need to take action now, before we face the worst unemployment disaster since the Great Depression
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

How to Protect Yourself from Creepy, Phone Snooping Spyware - Motherboard

How to Protect Yourself from Creepy, Phone Snooping Spyware - Motherboard | digitalcuration | Scoop.it
Although a hacker can only infect a phone if they have physical access to the device, the threat from this type of malware is very real. It is heavily used by, and marketed towards, jealous lovers to spy on their spouses. For around two decades, people have used spyware for this purpose, with many cases ending up in violence or even murder. What can potential victims of this type of surveillance do to check if they're being monitored? What are some of the best practices to keep in mind to make installing the malware harder? And what can those who are certainly being spied on do? Unfortunately, this is actually one of the harder information security threats to reliably give advice for.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Marathon runner’s tracked data exposes phony time, cover-up attempt

Marathon runner’s tracked data exposes phony time, cover-up attempt | digitalcuration | Scoop.it
A cut corner, a retraced route on a bike, and the Garmin tracker that exposed the lies.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Now sites can fingerprint you online even when you use multiple browsers

Now sites can fingerprint you online even when you use multiple browsers | digitalcuration | Scoop.it
The new tracking technique relies on JavaScript code that's compact enough to run quickly in the background while visitors are focused on a specific task, such as reading text or viewing video. The researchers have launched this website to demonstrate the techniques and have released the corresponding source code here. In a test that collected 3,615 fingerprints from 1,903 users over a three-month period, the technique was able to successfully identify 99.2 percent of users. By contrast, a single-browser fingerprinting technique dubbed AmIUnique, had a success rate of 90.8 percent. Fortunately, cross-browser tracking doesn't work against people using the default installation of the Tor browser. Still, many people tweak their installations of Tor so that it supports certain WebGL graphics capabilities required by gaming sites or other online destinations. While those tweaks may make the Tor browser more usable, they may also make it less immune to the fingerprinting techniques. Cao said he's not aware of any sites using cross-browser fingerprinting. Cross-browser fingerprinting is only the latest trick developers have come up with to track people who visit their sites. Besides traditional single-browser fingerprinting, other tracking methods include monitoring the way visitors type passwords and other text and embedding inaudible sound in TV commercials or websites. The Tor browser without an attached microphone or speakers is probably the most effective means of protection, although the researchers said running a browser inside a virtual machine may also work
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

A Stylometric Inquiry into Hyperpartisan and Fake News

This paper reports on a writing style analysis of hyperpartisan (i.e., extremely one-sided) news in connection to fake news. It presents a large corpus of 1,627 articles that were manually fact-checked by professional journalists from BuzzFeed. The articles originated from 9 well-known political publishers, 3 each from the mainstream, the hyperpartisan left-wing, and the hyperpartisan right-wing. In sum, the corpus contains 299 fake news, 97% of which originated from hyperpartisan publishers. We propose and demonstrate a new way of assessing style similarity between text categories via Unmasking---a meta-learning approach originally devised for authorship verification---, revealing that the style of left-wing and right-wing news have a lot more in common than any of the two have with the mainstream. Furthermore, we show that hyperpartisan news can be discriminated well by its style from the mainstream (F1=0.78), as can be satire from both (F1=0.81). Unsurprisingly, style-based fake news detection does not live up to scratch (F1=0.46). Nevertheless, the former results are important to implement pre-screening for fake news detectors.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Federal Judge Denies Warrant to Fingerprint Unlock Random Apple Devices in Illinois Building - Motherboard

Federal Judge Denies Warrant to Fingerprint Unlock Random Apple Devices in Illinois Building - Motherboard | digitalcuration | Scoop.it
According to the judge, the warrant application didn't identify any particular individual or device, and it also raises issues of compelled self-incrimination. The new document signals a developing trend in the drafting of so-called mass fingerprint warrants. "Essentially, the government seeks an order from this Court that would allow agents executing this warrant to force 'persons at the Subject Premises' to apply their thumbprints and fingerprints to any Apple electronic device recovered at the premises," the opinion and order signed by United States Magistrate Judge M. David Weisman from the Northern District of Illinois, Eastern Division, reads.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Comparatif de logiciels de veille

Comparatif de logiciels de veille | digitalcuration | Scoop.it
Ce tableau qui permet de comparer les solutions de veille a été créé à partir de données publiques disponibles. Editeurs ? Professionnels de la veille ? Si vous souhaitez corriger ou compléter ces données, merci de contacter l'équipe du Portail IE. Ce dashboard sera mis à jour en continu.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Malware authors camouflage code with Russian terms

Malware authors camouflage code with Russian terms | digitalcuration | Scoop.it
Lazarus group thought to be behind attack code. Malware authors are attempting to hide behind Russia's reputation as digital crime centre to throw investigators off their scent, a security firm has found
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Change.org, MesOpinions.com : ce qu’implique vraiment le fait de signer une pétition sur Internet

Change.org, MesOpinions.com : ce qu’implique vraiment le fait de signer une pétition sur Internet | digitalcuration | Scoop.it
Espaces d'opinion et d'engagement, les plateformes de pétitions en ligne aspirent des données personnelles parmi les plus sensibles. En y regardant de plus près, on réalise à quel point une simple "signature" pourrait, un jour, nous causer du tort. (...) Dans le cas de Change.org comme d’Avaaz.org (et non dans celui de MesOpinions.com, qui est une entreprise française dont les serveurs sont basés à Roubaix), les informations que nous fournissons voyagent. "Vos données personnelles peuvent être stockées et traitées dans tous les pays dans lesquels nous avons des installations ou dans lesquels nous faisons appel à des prestataires de service ; en utilisant la plateforme, vous consentez au transfert de vos données personnelles vers des pays autres que votre pays de résidence, y compris les États-Unis, où les règles de protection des données peuvent différer de celles de votre pays", stipule Change.org.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Santé mentale et outils connectés

Santé mentale et outils connectés | digitalcuration | Scoop.it
Et si les objets connectés devenaient des acteurs essentiels dans le domaine de la santé mentale ? A l'ère du numérique, les habitudes et les comportements des citoyens se modifient, notamment avec l'apparition d'applications favorisant les actions de partage et, plus globalement, les dynamiques collaboratives.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Where is cybercrime really coming from?

Where is cybercrime really coming from? | digitalcuration | Scoop.it
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow calls out the insufficiency of our current strategies to protect our data. His solution? We need to respond to cybercrime with the same collective effort as we apply to a health care crisis, sharing timely information on who is infected and how the disease is spreading. If we're not sharing, he says, then we're part of the problem.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Qui voit vraiment les pubs sur Snapchat ?

Qui voit vraiment les pubs sur Snapchat ? | digitalcuration | Scoop.it
une récente étude menée par Fluent auprès d'un échantillon représentatif de 3327 américains montre que les publicités sur Snapchat sont "zappées" par 69% des utilisateurs adultes, ce chiffre s'élevant à 80% sur la tranche d'âge 18-24 ans
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Certified Malice

Certified Malice | digitalcuration | Scoop.it
One unfortunate (albeit entirely predictable) consequence of making HTTPS certificates “fast, open, automated, and free” is that both good guys and bad guys alike will take advantage of the offer and obtain HTTPS certificates for their websites.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Social Media Impersonation Exploding, With Brands In The Crosshairs

Social Media Impersonation Exploding, With Brands In The Crosshairs | digitalcuration | Scoop.it
In a rather ingenious development, a new impersonation “verification phishing” technique involves fraudsters impersonating the social networks themselves, offering users their own “verified” accounts, and then asking them to provide personal information as part of the bogus verification process. 

Another new technique used by some fraudsters involves “ad phishing,” with some of the profiles masquerading as verified corporate accounts actually buying ads on the same social networks to propagate the scams. Once they have established initial contact, criminals also try to steer victims to other channels like email, direct messaging, or even another social site, thus minimizing the digital “paper trail” on any single platform. 

The ZeroFOX report echoes the conclusions of another online security firm, Proofpoint, whose latest “Threat Summary and Year in Review” report states that the number of “phishing” attacks on social media sites increased 500% from 2015 to 2016. In addition to a number of known techniques, 

Proofpoint highlighted the rapid spread of a new type of social media phishing, called “angler phishing.” This technique, also highlighted by ZeroFOX, includes “attacks that involve fake customer-support accounts that trick people seeking help into handing over their login credentials and other information.”
Stéphane Koch's insight:
Share your insight
more...
No comment yet.