digitalcuration
Follow
Find tag "Government"
10.3K views | +3 today
digitalcuration
société de l'information, identité & comportements numériques, sécurité de l'information, réseaux & médias sociaux
Curated by Stéphane Koch
Your new post is loading...
Your new post is loading...
Rescooped by Stéphane Koch from 21st Century Learning and Teaching
Scoop.it!

Combien de temps le mythe de la sécurité Mac va-t-il encore tenir?

Combien de temps le mythe de la sécurité Mac va-t-il encore tenir? | digitalcuration | Scoop.it

Utrecht, le 27 novembre 2013 - Selon une récente enquête de Kaspersky Lab, il existe de fortes probabilités qu’un nombre croissant d’utilisateurs Mac soient la proie de menaces d’Internet. La quantité des logiciels malveillants ciblant les Mac a augmenté de 50% au cours des douze derniers mois. Pourtant, plus d’un tiers (35%) de tous les utilisateurs Mac pensent à tort être protégés contre les menaces numériques.

Le nombre des propriétaires de Mac continue de progresser, et par conséquent l’intérêt des cybercriminels pour cette plate-forme s’amplifie lui aussi. Les virus informatiques, chevaux de Troie, astuces de phishing et autres menaces d’Internet visant cette plate-forme sont d’ores et déjà en circulation, en grands nombres qui plus est. Les utilisateurs sont ainsi tout aussi vulnérables que les utilisateurs de PC Windows.

 


Via Gust MEES
more...
Gust MEES's curator insight, November 27, 2013 1:31 PM

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, November 28, 2013 11:37 AM

 

35% of Mac users think (???) that THEY don't need any protection!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

Gust MEES's curator insight, November 28, 2013 11:40 AM

 

35% of Mac users think (???) that THEY don't need any protection!!!

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Stéphane Koch from ICT Security Tools
Scoop.it!

Android Architecture and Pen-testing of Android applications

Android Architecture and Pen-testing of Android applications | digitalcuration | Scoop.it

Android, as we are all aware, is a Linux-based operating system which was initially developed by Android Inc. and was later purchased by Google. It was designed for touch screen devices like smartphones, tablets, cameras, set-top boxes, etc… and has reached the hands of millions of consumers.

 

Over a period of time, operating systems like Windows and Linux have matured against threats, thereby diverting the hackers towards newer targets like handheld devices. Millions of Android applications are downloaded from the Google Play store by users, thereby exposing end users’ email ids, banking details, sensitive details and messaging content due to insecure coding practices.

 

The users are either unaware or trust the apps to protect their sensitive data against theft.


Via Frederic GOUTH, Gust MEES
more...
Gust MEES's curator insight, February 13, 2013 6:02 AM

Check it out...

 

Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

How spyware on rental PCs captured users' most intimate moments

How spyware on rental PCs captured users' most intimate moments | digitalcuration | Scoop.it

On the second-to-last Monday of 2010, Brian Byrd was playing video poker on his Dell Inspiron laptop when someone knocked on the door of his home in Casper, Wyoming. The visitor, who drove a truck from the local Aaron's rent-to-own store that furnished the PC five months earlier, said the 25-year-old Byrd was behind in his payments and demanded he pay up at once. He then brandished a picture that was about to cause a national privacy uproar.

 

The image showed Byrd on his home couch using the very laptop in question to play online poker. The employee was also privy to a screenshot of the website Byrd's PC was displaying the moment the photo was surreptitiously taken, along with keystrokes he was entering while visiting a website. When Byrd demanded an explanation, the employee, identified in a police report as 24-year-old Christopher Mendoza, said he wasn't supposed to answer. But he went on to disclose that the PC contained software that allowed Aaron's employees to track its physical location and remotely activate its webcam and capture screenshots and keystrokes. Mendoza, according to court records, left the premises after Byrd produced a copy of a receipt showing the laptop had been paid for in full on October 1.

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécurité Mac : XMCO actu-secu [pdf]

Sécurité Mac : XMCO actu-secu [pdf] | digitalcuration | Scoop.it

l’ACTUSÉCU est un magazine numérique rédigé et édité par les consultants du cabinet de conseil XMCO

 

Numéro spécial dédié à la sécurité Mac...

 

En savoir plus :

 

http://www.xmco.fr/actu-secu/XMCO-ActuSecu-32-MACOS_Flashback.pdf

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

4 Rogue IT Trends to Watch Out For BYOD

4 Rogue IT Trends to Watch Out For BYOD | digitalcuration | Scoop.it

Most people are participating in rogue IT without even realizing it. By definition, rogue IT is the unmanaged hardware and software that employees bring into their offices, connect to employers’ networks and use for professional productivity on personal time. At first, it doesn’t sound so bad. By allowing employees to connect to the Wi-Fi with their own devices, companies avoid the cost of providing the hardware. But as we learned from the BYOD toolkit from CIO.gov, BYOD programs aren’t profitable if they are uncontrolled, because problems, like the ones we’ll discuss below, arise.

 


Via Gust MEES
more...
Gust MEES's comment, September 9, 2012 3:54 PM
Bonsoir,

Merci pour avoir fait lke #rescoop de ma curation, mais:

Quand on #rescoop un article d'un autre curateur on le fait à 100% et on ne fait pas de la censure sur le #scoopit de cet auteur !!!

Le texte complet est sur cette curation, voici ce qui manque:

"===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/";

Et c'est l'article complet que je veux voir avec mes remarques personnelles, et rien d'autre !!!

Si vous n'êtes pas d'accord avec mes remarques personnelles je vous conseille vivement d'effacer ce #scoopit (il est marqué avec mon nom !!!) et de prendre l'adresse originaire de le republier avec votre propre nom sans mes commentaires !!!

J'espère que l'on s'est bien compris, autrement j'attends votre commentaire de retour !!!

Bonne soirée,
Gust
Stéphane Koch's comment, September 10, 2012 2:24 AM
Cher Gust, la "curation de contenu" est basée sur la mise à disposition de contenus que l'on aura auparavant "éditorialisés", l'idée étant d'organiser et de structurer l'information afin d'en offrir une "meilleure" lisibilité. Scoopit offre, par son champs d'édition, la possibilité d’aménager/organiser l'information à sa convenance... Que l'on partage, ou repartage une info... Concernant spécifiquement cet article ont je me permets - gentiment - de rappeler que vous n'en êtes pas l'auteur. Et d'ajouter qu'il n'y avait aucune volonté de censure de ma part... La mention de votre nom fait référence à la source de ce partage, et ne vous indique en aucune cas comme étant une référence par rapport au contenu de cet article, sur lequel par ailleurs vous n'avez aucun droit de propriété, si ce n'est celui d'être justement mentionné comme source dudit partage. Ni ne vous engage juridiquement. Vous devriez plutôt prendre en compte que la mention de votre nom permet aux lecteurs de venir visiter votre propre scoopit et de s'y abonner le cas échéant, et au final d'en apprendre plus sur vous et les différents services que vous offrez... Donc s'il y avait eu une volonté de "censure" de ma part, j'aurais "rescoopé" directement l'article sans mention de l'origine de son partage, d'autant plus que dans le cas présent je n'ai pas altéré ou modifié le contenu de l'article lors de sa "réédition".

Bref, si vous n'aviez pas utilisé un ton aussi peu courtois, j'aurais accédé avec plaisir à votre demande... Je vais donc laisser les choses en l'état, étant donné que - comme mentionné précédemment - cela permettra non seulement aux lecteurs intéressés d'accéder à votre scoopit, mais aussi de lire votre commentaire, et par conséquent, ce que vous vouliez communiquer.... Voilà pour ce qui est de mon "commentaire de retour".

Pour finir, je ne peux m'empêcher de "quoter" "2001: A Space Odyssey (1968)". Je pense que c'est tout à fait approprié à la situation ;) "Look Dave, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Google Yourself For Safety [Infographic]

Google Yourself For Safety [Infographic] | digitalcuration | Scoop.it

Show of hands: How many of you have sat in front of a computer and typed your name into a web browser? Don’t be shy. You can admit it. With so much access in so many places, who could blame you for wanting to know where and in what context your name appears online?

The practice has been dubbed “ego surfing,” but as this Backgroundcheck.org infographic posted to online tech site MakeUseOf shows us, searching for one’s name on the web is also a lesson in self preservation — one students and teachers should heed if they want to keep their reputations, and their online identities, intact. Do yourself a solid and take five minutes to complete the Google Yourself Challenge. What you find about yourself might surprise you.

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | digitalcuration | Scoop.it

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.


Via Gust MEES
more...
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Java flaws already included in Blackhole exploit kit, Oracle was informed of vulnerabilities in April

Java flaws already included in Blackhole exploit kit, Oracle was informed of vulnerabilities in April | digitalcuration | Scoop.it
The latest Java flaw is already being exploited by criminals. Oracle was notified of the problem in April, but no fix is available. Learn how to disable Java or remove it from your computer to prot...

 

It took less than 12 hours from the time the proof of concept for the latest Java zero-day vulnerabilities went public for exploits of those vulnerabilities to be included in a commercial crimeware kit.

 

Read more:

http://nakedsecurity.sophos.com/2012/08/30/java-flaws-already-included-in-blackhole-exploit-kit-oracle-was-informed-of-vulnerabilities-in-april/?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from 21st Century Learning and Teaching
Scoop.it!

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again) | digitalcuration | Scoop.it
You know those people who put tape over their laptop's webcam to keep digital peeping toms at bay? They're not crazy.

Via Gust MEES
more...
Stewart-Marshall's curator insight, June 15, 2013 11:29 AM

Tested it - and it's true - it works on Chrome.  Scary :-(

AnnC's curator insight, June 16, 2013 4:18 PM

FYI - you can be seen - how do you look?

Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | digitalcuration | Scoop.it

This tool is designed to help the many smartphone owners who aren't protected against mobile security threats. To use this tool, choose your mobile operating system below and then follow the 10 customized steps to secure your mobile device. More about the Smartphone Security Checker.


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

BlackHole Will Get More Complex, Android and Mac OS Are Prime Attack Targets

BlackHole Will Get More Complex, Android and Mac OS Are Prime Attack Targets | digitalcuration | Scoop.it

"Attackers have expanded their attacks beyond the Windows platform to include Mac OS X and Android. 27 Percent of All Cybercrime Linked to the ‘Blackhole’ Exploit Kit", Sophos said.

 

Even though the overall market share for Mac OS X remains small compared to other platforms, the number of Mac threats are growing as more users switch. Flashback, the malware that reportedly infected hundreds of thousands of Apple systems in April was the largest mass attack this year, but it's not the only Mac malware out there. In a typical week, SophosLabs detects 4,900 pieces of OS X malware on Mac computers.

 

===> In a snapshot of Mac malware detected over a one-week period in August, SophosLab detected various variants of fake antivirus, codecs and Flash player. <===

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

WhatsApp accounts almost completely unprotected

WhatsApp accounts almost completely unprotected | digitalcuration | Scoop.it
Tests show just how easy it is for data sniffers to send and receive messages in the name of other WhatsApp users.

 

ests performed by The H's associates at heise Security have found that popular texting alternative WhatsApp is easily hacked using freely available tools. Anyone using WhatsApp on a public Wi-Fi network risks having their data sniffed and their account used to send and receive messages. Once hacked, there is no way to restore account security – attackers will be able to continue to use the hacked account at their discretion.


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | digitalcuration | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

 Check out also "Security Education Services" from Trustwave:

 

https://www.trustwave.com/security-education-services/

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

A who's who of Mideast-targeted malware

A who's who of Mideast-targeted malware | digitalcuration | Scoop.it
What do Stuxnet, Duqu, Gauss, Mahdi, Flame, Wiper, and Shamoon have in common? Read this blog post by Elinor Mills on Security & Privacy.

 


Via Gust MEES
more...
No comment yet.
Rescooped by Stéphane Koch from ICT Security-Sécurité PC et Internet
Scoop.it!

Teaching the shadowy art of cyber war

Teaching the shadowy art of cyber war | digitalcuration | Scoop.it

As the Air Force faces up to the threat of attacks on computer networks and communications, it has developed a new ===> cyber war school <=== at Nellis Air Force Base designed to fight guerrilla tactics of cyber-terrorists.

 

Gust MEES: a MUST READ!

 

Read more:

http://www.lasvegassun.com/news/2012/jul/06/learning-art-cyber-war/

 


Via Gust MEES
more...
No comment yet.