Information #Secu...
Follow
Find tag "Cybersecurity"
55.1K views | +73 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Excellent !! A Parent's Guide to #Cybersecurity

Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/




Via Gust MEES
more...
HazelC's comment, November 16, 11:06 PM
This is a great resource. This month we are focusing on Internet safety and cyber bullying!
Kym Reinstadler, SCN Feature Writer's curator insight, November 17, 11:55 AM

My interview last week with attorney Stephanie Tuttle about the possible legal ramifications for minors who “sext,” or forward sexts, or harass sexters, sent me searching for a factsheet to help educators and parents know how to talk to kids about staying safe online in a wider context. Here’s the best of what I’ve found. Hope it’s helpful.

Christine Kennerd's curator insight, November 17, 3:27 PM

Great resource for parents

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Hackers target #Apple #Mac OS X with 25 #malware variants

#Hackers target #Apple #Mac OS X with 25 #malware variants | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Gust MEES
more...
Gust MEES's curator insight, September 9, 10:12 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, September 9, 10:16 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Internet of Things: Privacy and Security Issues

The Internet of Things: Privacy and Security Issues, Stefan Schiffner NIS expert, ENISA



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Excellent !! How Hackable Is Your Car? Consult This Handy Chart

Excellent !! How Hackable Is Your Car? Consult This Handy Chart | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars



Via Gust MEES
more...
Gust MEES's curator insight, August 6, 4:29 PM
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

#Ransomware 101: FAQ for computer and #smartphone owners

#Ransomware 101: FAQ for computer and #smartphone owners | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

What is ransomware?
Ransomware is the generic term for any malicious software that, as its name suggests, demands a ransom be paid by the computer’s user.

Why would you want to pay a ransom?
Because the ransomware has done something unpleasant to your computer, and potentially to your data.

.

For instance, it might have encrypted your documents and demanded that you pay a ransom to unlock access to them. This type of ransomware is known as a filecoder.

.

The most notorious filecoder is Cryptolocker. (Numerous versions of this are detected by ESET antivirus products as Win32/Filecoder).

.

Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.

.

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE



Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Future of the Internet of Things [infographic]

The Future of the Internet of Things [infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Ever wonder why Google is installing extreamly fast gigabit internet infrastructure when the average person needs 200x less speed? It is because of the future of the Internet of Things. In less than 10 years, the internet will not just be for your phone or laptop, everything will be online.

I’m talking about your car, fridge, tv, blender, air conditioner, front door, and even your wallet. This inevitable future is why google is starting today with affordable gigabit internet. This new wave of device overload will open up revenue and advertising streams to a whole new level.

Today’s infographic states that in 2020, every human being on earth will be connected to 10 separate devices.

I know I’m already using five and I bet one of the most prominent technology coming up soon will be wearable tech. If its for exercising, sports, general information or just making phone calls, wearable tech will be an exciting addition today’s digital arsenal.


Learn more:





Via Gust MEES
more...
Gust MEES's curator insight, March 26, 10:05 AM


I’m talking about your car, fridge, tv, blender, air conditioner, front door, and even your wallet. This inevitable future is why google is starting today with affordable gigabit internet. This new wave of device overload will open up revenue and advertising streams to a whole new level.


Today’s infographic states that in 2020, every human being on earth will be connected to 10 separate devices.


I know I’m already using five and I bet one of the most prominent technology coming up soon will be wearable tech. If its for exercising, sports, general information or just making phone calls, wearable tech will be an exciting addition today’s digital arsenal.


Learn more:


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES
more...
Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Junkware Removal Tool

Junkware Removal Tool | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.


Via Gust MEES
more...
Gust MEES's curator insight, November 9, 2013 11:50 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

 

Gust MEES's curator insight, November 9, 2013 11:54 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Bee.lu : Bibi l’abeille fait découvrir l’Internet aux tout petits

Bee.lu : Bibi l’abeille fait découvrir l’Internet aux tout petits | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
BEE SECURE lance «  bee.lu », un site pédagogique destiné aux enfants à partir de 3 ans.Les nouvelles technologies nous servent de plus en plus, et de plus en plus tôt pour communiquer.

Via Gust MEES
more...
Gust MEES's curator insight, October 24, 2013 5:56 AM

 

L’ordinateur, le smartphone, la tablette : tous ces outils permettent de découvrir le monde merveilleux et mystérieux de la Toile. Mais mieux vaut connaître les règles de bonne conduite  pour éviter d’y perdre le fil…ou d’y laisser les plumes de nos petits poussins.

 

Gust MEES's curator insight, October 24, 2013 6:00 AM


L’ordinateur, le smartphone, la tablette : tous ces outils permettent de découvrir le monde merveilleux et mystérieux de la Toile. Mais mieux vaut connaître les règles de bonne conduite  pour éviter d’y perdre le fil…ou d’y laisser les plumes de nos petits poussins.

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécuriser son site web : les bases essentielles - Cases

Sécuriser son site web : les bases essentielles -  Cases | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The evolution of OS X #malware.

The evolution of OS X #malware. | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about security, which means there are plenty of opportunities – for those blackhatters who are willing to put in the work.


Third: professional espionage groups have really taken to exploiting OS X. Many APT attacks in the last few years acquired Mac-modules, for example CaretoIcefog, and the targeted attacks against Uyghur activists. Yes, here we’re talking pinpointed –exclusive as opposed to mass – attacks, aimed at specially chosen victims; this is why they don’t figure in the top-20. Not that they are any less dangerous; especially if your data may be interesting to intelligence agencies.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Gust MEES
more...
Gust MEES's curator insight, September 29, 9:34 AM
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about secu


Gust MEES's curator insight, September 29, 9:38 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Quran Coaching's curator insight, October 1, 3:22 AM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Coding at #school: a parent's guide to England's new computing curriculum

#Coding at #school: a parent's guide to England's new computing curriculum | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
From the start of the new term, children as young as five will be learning programming skills in the classroom. By Stuart Dredge


Learn more:


http://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/



Via Gust MEES
more...
Gust MEES's curator insight, September 4, 3:55 PM
From the start of the new term, children as young as five will be learning programming skills in the classroom. By Stuart Dredge


Learn more:


http://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#CyberSecurity | The Economic Impact Of #Cybercrime

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Objets connectés : 70 % sont vulnérables

Objets connectés : 70 % sont vulnérables | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Hewlett-Packard s'est penché sur la sécurité des objets connectés. Résultat, 70 % présentent des vulnérabilités.

Les objets connectés se développent et se diversifient, mais cela n'est que le début. Le cabinet d'analyses Gartner estime notamment...


En savoir plus :


-  http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things



Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Dirty Dozen Spampionship: Who's who in the global spam-sending league?

The Dirty Dozen Spampionship: Who's who in the global spam-sending league? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
It's once again time for our quarterly Spampionship charts.

We looked at the sending countries for all our spam in the first three months of 2014, and turned the figures into a League Table - the sort of league you don't want to win!...


That's because cybercrooks don't send their own spam: that would be expensive, and easy to track, and would point the finger of law enforcement right back at them.

Instead, the crooks co-opt innocent third parties - like you and me, or our friends and family - to send spam for them.

The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:




Via Gust MEES
more...
Gust MEES's curator insight, April 17, 10:55 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's curator insight, April 17, 11:01 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.


You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Rescooped by Frederic GOUTH from Best Freeware Software
Scoop.it!

#Junkware Removal Tool Download

#Junkware Removal Tool Download | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it


Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.



Via Gust MEES
more...
Gust MEES's curator insight, February 4, 5:52 AM


A great tool...


173 Sud's curator insight, February 4, 9:15 AM


Junkware Removal Tool va vous aider à supprimer l'ensemble des logiciels indésirables tels que Ask Toolbar, Babylon, Browser Manager ou bien encore MyWebSearch et qui s'installe discrètement sur votre navigateur web. Pour cela rien de plus simple il vous suffit de lancer le programme Junkware Removal Tool et de fermer l'ensemble des navigateurs en cours d'utilisation. Attendez quelques minutes et le tour est joué.


Entièrement gratuit ce petit utilitaire est compatible avec les versions récentes de Windows.


Jean Claude Le Tellier's curator insight, February 7, 7:34 AM

A good one to keep in the toolbox!

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Scammers in a Wi-Fi Wonderland

Scammers in a Wi-Fi Wonderland | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

You’d better watch out, you’d better not cry—you’d better not use that public Wi-Fi. The holiday season is upon us and in addition to more flash sales, baked goods, and travel time—this meansmore online scams. A recent survey of American travelers revealed that the majority of us are not taking measures to protect ourselves when using public Wi-Fi. Numerous forms of malware can be delivered over unsecured connections, so when traveling for the holidays you’re more vulnerable than ever to a cyber break in.

 

That’s why on the road, in the air, or otherwise on the go this holiday season, it’s more important than ever that you watch where you connect.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Que peut coûter au gérant d'une société le piratage de son site web ?

Que peut coûter au gérant d'une société le piratage de son site web ? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Que peut coûter au gérant d'une société le piratage de son site web ?

Via Gust MEES
more...
Gust MEES's curator insight, December 5, 2013 9:50 AM

 

A MUST read!!!

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Cyber Arms Race: Mikko Hypponen at TEDxBrussels

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TED...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from Cyberdefense
Scoop.it!

Cyberattaque en France et dans le monde : qui attaque qui ?

Cyberattaque en France et dans le monde : qui attaque qui ? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
C'est de l'Asie et de l'Europe de l'Est que proviennent le plus grand nombre de cyber-attaques dans le monde selon l'étude et le plan interactif de FireEye.

Via Gust MEES, Veille Defense et I.E
more...
Rescooped by Frederic GOUTH from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Chaos Computer Club breaks Apple TouchID

Chaos Computer Club breaks Apple TouchID | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.


Via Gust MEES
more...
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Internet «Un enfant va cliquer sur tout ce qu il voit»

Internet «Un enfant va cliquer sur tout ce qu il voit» | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
LUXEMBOURG - La vigilance sur le Net, c est simple comme de regarder avant de traverser la route.

Via Gust MEES
more...
Gust MEES's curator insight, September 6, 2013 7:42 PM

 

Gust MEES: mon premier article publié dans un journal, le 02.04.2008... Les conseils sont toujours valables...

 

En savoir plus :

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES : mes cours sont au serveur du ministère de l'Éducation Nationale :

 

http://www.myschool.lu/home/mS/publications_fiches.asp

 

 

Gust MEES's curator insight, September 6, 2013 7:46 PM

 

Gust MEES: mon premier article publié dans un journal, le 02.04.2008... Les conseils sont toujours valables...

 

En savoir plus :

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES : mes cours sont au serveur du ministère de l'Éducation Nationale :

 

http://www.myschool.lu/home/mS/publications_fiches.asp