Build engaged audiences through publishing by curation.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook, a Twitter or a LinkedIn account
Start a free trial of Scoop.it Business
Are you sure you want to delete this scoop?
Check also other infographics here:
EU cyber security agency, ENISA, has today issued an information Flash Note, ‘Cyber attacks – a new edge for old weapons’ that analyses and tracks recent cyber attacks.
The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).
Cyber-Security should get taken much more serious by Education and by teachers and taught in schools up from the early age! It is NOT difficult and a culture of aware Digital-Citizen needs to get build up!
Spotflux lets you connect to the internet freely, safely, and securely from anywhere in the world.
Whether at home, traveling, or on a public WiFi, spotflux encrypts and secures your connection and protects your privacy while browsing.
Spotflux continuously scans and protects your connection for inbound threats such as malware and viruses.
I will give it a try, soon and compare it to HotSpot Shield...
BTW: the program was published with a review in PC-World:
Read about the latest cyber security trends in the Sophos Security Threat Report 2013.
Most malware developers have found it more profitable to attack Windows than to learn new skills needed to target the smaller OS X user community.
===> But Macs are finding a new home in thousands of businesses and government agencies, and malware authors are paying attention. <===
Forrester Research analyst Frank Gillette recently reported that “almost half of enterprises (1,000 employees or more) are issuing Macs to at least some employees—and they plan a 52% increase in the number of Macs they issue in 2012.”
===> Even more Macs are arriving unofficially through bring your own device arrangements, where they are often an executive’s device of choice for accessing web or cloud applications. <===
===> Growing Mac usage means many IT organizations must objectively assess, mitigate, and anticipate Mac-related malware threats for the first time. And the risks are clearly increasing! <===
Check also my Curation about it:
Read more, a MUST:
New QuickTime fixes a number of security vulnerabilities!
===> UPDATE asap! <===
With big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there's a good chance you have fallen victim to a security breach this year.
It’s been a chilling year so far for web and mobile security. Cybercriminals continue to think of clever and sneaky ways to strip millions of consumers of credit card information and personal data, thanks largely in part to malicious links, phishing scams and password hacks.
The team at cybercrime prevention company ThreatMetrix has put together an infographic detailing the top 10 spookiest cyberattacks of the year so far. And with big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there’s a good chance you or someone you know has fallen victim to a security breach.
Security researcher Denis Maslennikov identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. The samples were three .cod files and one .jar file with a .cod file inside.
Security researchers have identified new Zeus samples targeting Android and BlackBerry devices.
Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as Kaspersky Lab recently analyzed four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy, Denis Maslennikov, a researcher at Kaspersky Lab wrote on the company's Securelist blog. These variants were communicating with two command-and-control cell phone numbers associated with a Swedish mobile operator.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be...
An anonymous researcher just published a paper that claims to have mapped out almost the entire internet for the first, and perhaps the last, time. Thing is, he used a virus to create a giant bo...
When research uses practices who go against all Ethics by using a botnet, which means that computer are getting first infected and than later connected together to form a botnet to find out about the map of the internet, one should ask about where RESEARCH is going :((( That certainly isn't good for the reputation of RESEARCH!!!
Can you really justify having Java installed on your main web browser any more? Even if you have installed the latest security patch? It's time to rip Java out of your browser for better securi...
A MUST follow instructions!!!
===> A MUST follow instructions!!! <===
Use one browser where Java is disabled for normal surfing! Use a second one where Java is enabled for making eBanking + other sites which require Java...
Make sure YOU have the last update and delete ALL previous versions of JAVA on your hard disk!
What is Cybersecurity?
Explorations in Automated Knowledge Generation
Nazli ChoucriDepartment of Political Science Massachusetts Institute of Technology
Gihan Daw Elbait Masdar Institute of Science and Technology and Massachusetts Institute of Technology
Stuart MadnickSloan School of Management and Engineering Systems Division Massachusetts Institute of Technology
Many Twitter users are being warned to change their password after an unknown bug or hack has seen left some accounts with deleted tweets or scam-links posted to their feeds.
Is it a bird? Is it a plane? No, it's a password reset message from Twitter, and you should probably do what it says.
A Gizmodo writer was the victim of an epic hack. Here's what you can do to avoid the same fate.
L'affaire a fait grand bruit ce week-end : vendredi, Mat Honan, journaliste chez Wired a perdu les données personnelles sur son iPhone, iPad et son Mac.
En savoir plus :