You are the content you publish.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook or a Twitter account
Start a free trial of Scoop.it Business
Are you sure you want to delete this scoop?
Check also other infographics here:
EU cyber security agency, ENISA, has today issued an information Flash Note, ‘Cyber attacks – a new edge for old weapons’ that analyses and tracks recent cyber attacks.
The latest targeted cyber-attacks on government organizations and high-profile companies show the need for greater awareness and knowhow in network and information security, says the EU’s European Network and Information Security Agency (ENISA).
Cyber-Security should get taken much more serious by Education and by teachers and taught in schools up from the early age! It is NOT difficult and a culture of aware Digital-Citizen needs to get build up!
Can you really justify having Java installed on your main web browser any more? Even if you have installed the latest security patch? It's time to rip Java out of your browser for better securi...
A MUST follow instructions!!!
===> A MUST follow instructions!!! <===
Use one browser where Java is disabled for normal surfing! Use a second one where Java is enabled for making eBanking + other sites which require Java...
Make sure YOU have the last update and delete ALL previous versions of JAVA on your hard disk!
Many Twitter users are being warned to change their password after an unknown bug or hack has seen left some accounts with deleted tweets or scam-links posted to their feeds.
Is it a bird? Is it a plane? No, it's a password reset message from Twitter, and you should probably do what it says.
Read more, a MUST:
With big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there's a good chance you have fallen victim to a security breach this year.
It’s been a chilling year so far for web and mobile security. Cybercriminals continue to think of clever and sneaky ways to strip millions of consumers of credit card information and personal data, thanks largely in part to malicious links, phishing scams and password hacks.
The team at cybercrime prevention company ThreatMetrix has put together an infographic detailing the top 10 spookiest cyberattacks of the year so far. And with big names such as Zappos, Amazon, LinkedIn and Android gracing the list, there’s a good chance you or someone you know has fallen victim to a security breach.
Google hat seinen Web-Browser Chrome in der neuen Version 22 bereit gestellt. Darin haben die Entwickler 44 Sicherheitslücken beseitigt. Außerdem enthält Chrome 22 eine neue Programmierschnittstelle für den Zugriff auf Mausdaten.
===> UPDATE!!! <===
Security researcher Denis Maslennikov identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. The samples were three .cod files and one .jar file with a .cod file inside.
Security researchers have identified new Zeus samples targeting Android and BlackBerry devices.
Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as Kaspersky Lab recently analyzed four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy, Denis Maslennikov, a researcher at Kaspersky Lab wrote on the company's Securelist blog. These variants were communicating with two command-and-control cell phone numbers associated with a Swedish mobile operator.
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be...
An anonymous researcher just published a paper that claims to have mapped out almost the entire internet for the first, and perhaps the last, time. Thing is, he used a virus to create a giant bo...
When research uses practices who go against all Ethics by using a botnet, which means that computer are getting first infected and than later connected together to form a botnet to find out about the map of the internet, one should ask about where RESEARCH is going :((( That certainly isn't good for the reputation of RESEARCH!!!
What is Cybersecurity?
Explorations in Automated Knowledge Generation
Nazli ChoucriDepartment of Political Science Massachusetts Institute of Technology
Gihan Daw Elbait Masdar Institute of Science and Technology and Massachusetts Institute of Technology
Stuart MadnickSloan School of Management and Engineering Systems Division Massachusetts Institute of Technology
According to reports, a new security feature in Android 4.2 will checks apps in real-time for malicious code.
Halfway through the first European Cyber Security Month (ECSM), the pilot campaign has already reached 1,986,270 people on Facebook Europe-wide. In addition, a special Security Month awareness event has taken place every two days in one of the participating countries.
A Gizmodo writer was the victim of an epic hack. Here's what you can do to avoid the same fate.
L'affaire a fait grand bruit ce week-end : vendredi, Mat Honan, journaliste chez Wired a perdu les données personnelles sur son iPhone, iPad et son Mac.
En savoir plus :