Intelligence économique
55 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by NomadMoves
Scoop.it!

Believe It Or Not, Most Published Research Findings Are Probably False | Big Think

Believe It Or Not, Most Published Research Findings Are Probably False  | Big Think | Intelligence économique | Scoop.it
Ten years ago, a researcher claimed most published research findings are false; now a decade later, his claim is stronger than ever before. How can this be?
NomadMoves's insight:

"Richard Horton, the editor of The Lancet recently put it only slightly more mildly: "Much of the scientific literature, perhaps half, may simply be untrue." Horton agrees with Ioannidis' reasoning, blaming: "small sample sizes, tiny effects, invalid exploratory analyses, and flagrant conflicts of interest, together with an obsession for pursuing fashionable trends of dubious importance." Horton laments: "Science has taken a turn towards darkness.""

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

This USB Drive Can Nuke A Computer

This USB Drive Can Nuke A Computer | Intelligence économique | Scoop.it
Do not ever use a random USB flash drive. There are plenty software exploits that can ruin your computer or life. And with this flash drive, it can physically..
NomadMoves's insight:

"Put simply, the bits inside the USB drive draws and stores a ton of power. When a certain level is hit, it returns the power to the source, which is either a dedicated USB controller or the CPU itself. This is bad news bears. The amount of power returned overloads the circuits, rendering it useless. Since a lot of USB controllers are built directly into the main processor… bye bye computer."

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Obama seeks laws on data hacking

Obama seeks laws on data hacking | Intelligence économique | Scoop.it
Obama wants Congress to pass legislation to protect customers from a data hack.
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Les clés USB dangereuses pour nos ordinateurs ?

Les clés USB dangereuses pour nos ordinateurs ? | Intelligence économique | Scoop.it
Bien qu'indispensables au quotidien, les clés USB peuvent transmettre des virus informatiques.
NomadMoves's insight:

Aujourd’hui, dans les entreprises, la clé USB est la bête noire des responsables informatiques. Certaines sociétés les ont carrément interdites en neutralisant les ports USB sur les ordinateurs. ... D'autres mettent à l'entrée des bornes de décontamination...

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Faut-il un CSA des algorithmes ?

Faut-il un CSA des algorithmes ? | Intelligence économique | Scoop.it
L’impact des algorithmes dans le compte rendu et la perception des événements de Ferguson, le récent scandale impliquant les tests de Facebook sur les émo
NomadMoves's insight:

L'accès à l'information est essentielle pour le bon fonctionnement de nos démocraties... Que penser de cette personnalisation à outrance favorisée par les algorithmes qui nous poussent l'information que l'on souhaite voir et met de coté celle dont nous devrions toutefois avoir connaissance ?

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Scan de ports TCP : comment la NSA et le GCHQ préparent leurs attaques

Scan de ports TCP : comment la NSA et le GCHQ préparent leurs attaques | Intelligence économique | Scoop.it
Le scan de ports TCP à grande échelle sert de base aux attaques ciblées de la NSA ou du GCHQ. Pour se protéger, il faudrait améliorer le protocole TCP.
NomadMoves's insight:

Nom du projet : "hacienda" - Pays à l'origine :  Five Eyes : la NSA américaine bien sûr, mais aussi ses homologues en Australie, au Canada en Nouvelle-Zélande et le renseignement britannique.

Quoi : créer une base de données des ports TCP ouverts pour : l’infection des cibles, leur pilotage à distance via des serveurs de contrôle / commande et l’exfiltration d’informations.

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Une unité de l’armée chinoise orchestrerait un réseau de cyber-espionnage

Une unité de l’armée chinoise orchestrerait un réseau de cyber-espionnage | Intelligence économique | Scoop.it
Le ministère chinois des affaires étrangères a dénoncé des accusations "irresponsables".
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Surprise: les Américains ont les mêmes méthodes d'espionnage que celles qu'ils reprochaient aux Chinois

Surprise: les Américains ont les mêmes méthodes d'espionnage que celles qu'ils reprochaient aux Chinois | Intelligence économique | Scoop.it
La NSA placerait des mouchards au coeur de certains équipements informatiques fabriqués aux Etats-Unis, et destinés à l'exportation. Cette affirmation est extraite du livre que le journaliste Glenn Greenwald, qui a aidé Edward Snowden à révéler le fonctionnement de la surveillance massive...
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

De Prism à Tor, les dix noms du scandale de la ...

De Prism à Tor, les dix noms du scandale de la ... | Intelligence économique | Scoop.it
“Le 6 juin 2013, la presse américaine révélait l'existence du programme de surveillance Prism, apportant un nouveau lexique de sigles et de noms devenus familiers. Retour sur une année d'espionnage et de sécurité en ligne.”
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

The CIA has joined Twitter with the best first tweet possible

The CIA has joined Twitter with the best first tweet possible | Intelligence économique | Scoop.it
The US government loves Twitter. For NASA, it's a public relations goldmine. For the State Department, it's a bizarre weapon in the fight on terrorism. For the CIA, it's a chance to revel in...
NomadMoves's insight:
"The CIA has mostly escaped ire during the Edward Snowden leaks, but social media is still a clear way for the agency to humanize itself, drawing attention to tweets instead of drones."
more...
NomadMoves's comment, June 7, 2014 5:07 AM
looking for more articles take a look at : http://goo.gl/nJb6KK
Scooped by NomadMoves
Scoop.it!

Interview vidéo de Pierre-Yves Debliquy, sur les besoins des PME en matière de veille stratégique

Interview vidéo de Pierre-Yves Debliquy, sur les besoins des PME en matière de veille stratégique | Intelligence économique | Scoop.it
Bienvenue sur le site de la société de conseil
Inter-Ligere ! Etudes, conseil et formation en intelligence économique.
NomadMoves's insight:

Interview de Pierre-Yves Debliquy -qui tient le blog Euresis- et nous transmet 3 conseils pour la veille stratégique... La première : savoir poser les bonnes questions.

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

R.I.P. traditional anti-virus software | The Rundown | PBS NewsHour

R.I.P. traditional anti-virus software | The Rundown | PBS NewsHour | Intelligence économique | Scoop.it
Anti-virus software has not evolved along with hackers' abilities to attack -- so much so that some are ready to read the computer programs their last rites. Continue reading →
NomadMoves's insight:

A report published on Monday by RedSocks, a Netherlands-based company that specializes in malware detection, found that more than 25 percent of all malicious files went undetected by anti-virus software in January, February and March of 2014.
“Protecting your data from Internet-based threats is not an easy task —- and relying on protection from Anti-Virus companies, no matter how established their brand, is simply not enough,” the report stated.""

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Cybersecurity threats include employees

Cybersecurity threats include employees | Intelligence économique | Scoop.it
Many organizations overlook the most critical threat to security, the internal threat
NomadMoves's insight:

"A survey titled ‘Boardroom Cyber Watch 2013,’ conducted as an online survey by IT Governance, indicates that the outside threat-centric focus of organizations fails to provide a holistic security posturing, specifically from the threat within.

The survey notes:

More than half of respondents say that the greatest threat to their company’s data and computer systems in fact comes from their own employees.A quarter of respondents say their organization has received a concerted attack in the past 12 months. However, the true total may be higher, as over 20 percent are unsure if their organization has been subject to an attack."
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Cyberwarfare Isn’t Game of Thrones. A Wall Won't Work. | Big Think

Cyberwarfare Isn’t Game of Thrones. A Wall Won't Work. | Big Think | Intelligence économique | Scoop.it
According to retired U.S. Army General Stanley McChrystal, top-notch cybersecurity isn't modeled after the Maginot Line or a giant wall attempting to block outside forces from getting in. Instead, we need to design cybersecurity that acts like an immune system, learning on the go every time a new or unique challenge emerges.
NomadMoves's insight:

I like the analogy between human body defense and human country defense... and of course the mention of the "ligne Maginot".

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

You Can Now Easily Send Encrypted Texts to Anyone, and the NSA Is Gonna Hate It

You Can Now Easily Send Encrypted Texts to Anyone, and the NSA Is Gonna Hate It | Intelligence économique | Scoop.it
There's a growing number of slick, easy-to-use encryption apps.
NomadMoves's insight:

How to encrypt your communication > why not trying the application "signal"

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever | WIRED

A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever | WIRED | Intelligence économique | Scoop.it
The attack marks only the second confirmed incident in which a wholly digital hack created physical destruction of equipment.
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

WikiLeaks - Silk

NomadMoves's insight:

In early September 2013 WikiLeaks released its last batch of leaked Spy Files -  which it had started releasing in 2011. To mark this anniversary, one of Silk's data journalists Alice Corona cleaned and structured the data to build an interactive database combining the three Spy Files releases.

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Pourquoi et comment les « Wearable Technologies » impacteront le quotidien de l’entreprise (Tribune)

Pourquoi et comment les « Wearable Technologies » impacteront le quotidien de l’entreprise (Tribune) | Intelligence économique | Scoop.it
François Benhamou, DG de Novell France nous en dit un peu plus sur ce le développement des wearable technology et son impact pour le quotidien de l’entreprise.
NomadMoves's insight:

Ces technologies se développent et peuvent apporter une valeur ajoutée à l'entreprise --- il ne faudra pas oublier toutefois la question sécurité

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Touching a Laptop Can Break Its Encryption | MIT Technology Review

Touching a Laptop Can Break Its Encryption | MIT Technology Review | Intelligence économique | Scoop.it
The latest way to snoop on a computer is by measuring subtle changes in electrical potential as data is decrypted.
NomadMoves's insight:

"Measuring the electrical potential leaked to your skin when you touch the metal chassis of such laptops, and analyzing that signal using sophisticated software, can be enough to determine the keys stored within, says Eran Tromer, a computer security expert at Tel Aviv University."

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Pacte Défense Cyber: la France organise son plan d'action contre les cyberattaques - France - RFI

Pacte Défense Cyber: la France organise son plan d'action contre les cyberattaques - France - RFI | Intelligence économique | Scoop.it

Face à la croissance des menaces dans le cyberespace, le ministre de la Défense Jean-Yves Le Drian a officiellement lancé le « Pacte Défense Cyber 2016 », ce vendredi 7 février. L’objectif :...

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Les systèmes informatiques de l'armée française menacés par l'espionnage chinois ?

Les systèmes informatiques de l'armée française menacés par l'espionnage chinois ? | Intelligence économique | Scoop.it
Le ministre de la Défense a attribué un marché informatique à l'américain IBM, qui vient de vendre son activité serveurs au chinois Lenovo, révèle "Le Canard enchaîné".
NomadMoves's insight:

> Risque ou pas pour l'information stratégique de la France ?

more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

Un nouvel algorithme secoue la cryptographie - UP Magazine

Un nouvel algorithme secoue la cryptographie - UP Magazine | Intelligence économique | Scoop.it
Des chercheurs du Laboratoire lorrain de recherches en informatique et ses applications (CNRS/Université de Lorraine/Inria) et du Laboratoire d'informatique de Paris 6 (CNRS/UPMC) viennent de résoudre un pan du problème...
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

3 outils pour espionner vos concurrents en ligne -

3 outils pour espionner vos concurrents en ligne - | Intelligence économique | Scoop.it
Article invité, rédigé par David Carle ! L’analyse des concurrents est un élément essentiel de toute stratégie SEO. En effet, il est primordial d’étudier soigneusement le positionnement ainsi que les tactiques utilisées par les concurrents, afin de non seulement connaître … Lire la suite →
more...
No comment yet.
Scooped by NomadMoves
Scoop.it!

11 reasons encryption is (almost) dead

11 reasons encryption is (almost) dead | Intelligence économique | Scoop.it
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever
NomadMoves's insight:

""this theorem of encryption security may be accepted as proven by math geniuses at Hollywood U., but reality is a bit murkier. Encryption isn't always perfect, and even when the core algorithms are truly solid, many other links in the chain can go kablooie. There are hundreds of steps and millions of lines of code protecting our secrets. If any one of them fails, the data can be as easy to read as the face of a five-year-old playing Go Fish.""

more...
No comment yet.