Uso inteligente d...
Follow
Find tag "Learning basics of Cyber-Security"
53.1K views | +8 today

¿Necesitas una estrategia para promocionarte en la red? ¡Búscanos!

#SEO #CommunityManager #PosicionamientoWEB
Uso inteligente de las herramientas TIC
Ciencia, tecnología, innovación y educación

${leadGenConfiguration.title}

$leadGenConfiguration.description
Your new post is loading...
Your new post is loading...
Rescooped by Ursula Sola de Hinestrosa from 21st Century Learning and Teaching
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Uso inteligente de las herramientas TIC | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 


Via Gust MEES
more...
Rescooped by Ursula Sola de Hinestrosa from Personal Branding and Professional networks
Scoop.it!

Second iPhone passcode hack vulnerability discovered

Second iPhone passcode hack vulnerability discovered | Uso inteligente de las herramientas TIC | Scoop.it
You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.

 

But as Macworld noted, this isn't the first time Apple has had to grapple with an iPhone password security flaw.



Via Gust MEES, Philippe Trebaul
more...
Gust MEES's curator insight, February 27, 2013 2:25 PM

Nobody is perfect!!!

 

Gust MEES's curator insight, February 27, 2013 2:29 PM

Nobody is perfect!!!


Philippe Trebaul's curator insight, February 27, 2013 4:19 PM
Second iPhone passcode hack vulnerability discovered.

You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.

 

But as Macworld noted, this isn't the first time Apple has had to grapple with an iPhone password security flaw.


Second iPhone passcode hack vulnerability discovered via @knolinfos http://sco.lt/...


Rescooped by Ursula Sola de Hinestrosa from 21st Century Learning and Teaching
Scoop.it!

Virtual private network (VPN) : un tunnel sécurisé

Le VPN (virtual private network) est une technologie qui permet aux employés de se connecter à distance et en toute sécurité à leur réseau d'entreprise via l...

Via Gust MEES
more...
Gust MEES's curator insight, October 15, 2013 11:31 AM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's curator insight, October 15, 2013 11:35 AM

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

Amandine Duffoux's curator insight, October 16, 2013 2:35 PM

Une excellente vidéo de vulgarisation présentant le principe du VPN. Très bien si vous voulez savoir comment ça marche de manière très simplifiée.