Information #Secu...
Follow
Find tag "2014"
72.7K views | +53 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from Cybercrime and Cyber Security
Scoop.it!

#Security: Infographic on Data Breaches in the US in 2014 | #CyberSecurity

#Security: Infographic on Data Breaches in the US in 2014 | #CyberSecurity | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
The 27001 Academy has produced an informative infographic that illustrates key details of the nearly 800 reported data breaches in the U.S. that occurred in 2014 - up about 20% from 2013.

Surprisingly, despite the sharp increase in the number of breaches seen last year, the actual number of records that were compromised was down more than


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES



Via Gust MEES, Oksana Borukh
more...
No comment yet.
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Dirty Dozen Spampionship: Who's who in the global spam-sending league?

The Dirty Dozen Spampionship: Who's who in the global spam-sending league? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
It's once again time for our quarterly Spampionship charts.

We looked at the sending countries for all our spam in the first three months of 2014, and turned the figures into a League Table - the sort of league you don't want to win!...


That's because cybercrooks don't send their own spam: that would be expensive, and easy to track, and would point the finger of law enforcement right back at them.

Instead, the crooks co-opt innocent third parties - like you and me, or our friends and family - to send spam for them.

The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:




Via Gust MEES
more...
Gust MEES's curator insight, April 17, 2014 10:55 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's curator insight, April 17, 2014 11:01 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.


You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more: