Information #Secu...
Follow
Find tag "IT-Security"
46.0K views | +29 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Excellent !! How Hackable Is Your Car? Consult This Handy Chart

Excellent !! How Hackable Is Your Car? Consult This Handy Chart | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars



Via Gust MEES
more...
Gust MEES's curator insight, August 6, 4:29 PM
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Prius with nothing but laptops connected to the cars, they raised two questions: Could hackers perform the same tricks wirelessly, or even over the Internet? And even more pressing: Is your…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

#Ransomware 101: FAQ for computer and #smartphone owners

#Ransomware 101: FAQ for computer and #smartphone owners | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

What is ransomware?
Ransomware is the generic term for any malicious software that, as its name suggests, demands a ransom be paid by the computer’s user.

Why would you want to pay a ransom?
Because the ransomware has done something unpleasant to your computer, and potentially to your data.

.

For instance, it might have encrypted your documents and demanded that you pay a ransom to unlock access to them. This type of ransomware is known as a filecoder.

.

The most notorious filecoder is Cryptolocker. (Numerous versions of this are detected by ESET antivirus products as Win32/Filecoder).

.

Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.

.

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE



Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Future of the Internet of Things [infographic]

The Future of the Internet of Things [infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Ever wonder why Google is installing extreamly fast gigabit internet infrastructure when the average person needs 200x less speed? It is because of the future of the Internet of Things. In less than 10 years, the internet will not just be for your phone or laptop, everything will be online.

I’m talking about your car, fridge, tv, blender, air conditioner, front door, and even your wallet. This inevitable future is why google is starting today with affordable gigabit internet. This new wave of device overload will open up revenue and advertising streams to a whole new level.

Today’s infographic states that in 2020, every human being on earth will be connected to 10 separate devices.

I know I’m already using five and I bet one of the most prominent technology coming up soon will be wearable tech. If its for exercising, sports, general information or just making phone calls, wearable tech will be an exciting addition today’s digital arsenal.


Learn more:





Via Gust MEES
more...
Gust MEES's curator insight, March 26, 10:05 AM


I’m talking about your car, fridge, tv, blender, air conditioner, front door, and even your wallet. This inevitable future is why google is starting today with affordable gigabit internet. This new wave of device overload will open up revenue and advertising streams to a whole new level.


Today’s infographic states that in 2020, every human being on earth will be connected to 10 separate devices.


I know I’m already using five and I bet one of the most prominent technology coming up soon will be wearable tech. If its for exercising, sports, general information or just making phone calls, wearable tech will be an exciting addition today’s digital arsenal.


Learn more:


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES
more...
Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Junkware Removal Tool

Junkware Removal Tool | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.


Via Gust MEES
more...
Gust MEES's curator insight, November 9, 2013 11:50 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

 

Gust MEES's curator insight, November 9, 2013 11:54 AM

 

Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. 

 

This tool will help you remove these types of programs.

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécuriser son site web : les bases essentielles - Cases

Sécuriser son site web : les bases essentielles -  Cases | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Frederic GOUTH from Best Freeware Software
Scoop.it!

#TrueCrypt - Free Open-Source Disk #Encryption - #Documentation

#TrueCrypt - Free Open-Source Disk #Encryption - #Documentation | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
TrueCrypt - free open-source disk encryption - documentation...

Via Gust MEES
more...
Gust MEES's curator insight, July 23, 2013 8:49 AM

 

Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

 

TrueCrypt - Free Open-Source Disk Encryption - Documentation

 

Rescooped by Frederic GOUTH from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.

A posse of German computer scientists has found that Apple's iOS passphrase generator may give yo...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
INFOGRAPHIC: Mobile Threat in Action

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Hacking lessons learned: how to cover your digital ass [Infographic]

Hacking lessons learned: how to cover your digital ass [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Mat Honan got owned last year and it sucked, but you can still learn his lesson.

Via Gust MEES
more...
Gust MEES's curator insight, April 12, 2013 8:06 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, April 12, 2013 8:07 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Dico Krommenhoek's curator insight, April 14, 2013 2:50 PM

Naast geinige kanten kent ICT zoals bekend ook nare randjes. Alleen normaal doen, helpt niet altijd. Gust Mees is een autoriteit op het gebied van digitale veiligheid. Mooie infographic collectiecollectie

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Overview of current cyber attacks (logged by 97 Sensors ) - Sicherheitstacho.eu

Overview of current cyber attacks (logged by 97 Sensors ) - Sicherheitstacho.eu | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, March 7, 2013 1:13 PM

 

A great real time observation tool...

 

Gust MEES's curator insight, March 7, 2013 1:16 PM


A great real time observation tool...


Harold Thwaites's curator insight, March 7, 2013 7:05 PM

Sensors can tell us so much that we don't yet know.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Objets connectés : 70 % sont vulnérables

Objets connectés : 70 % sont vulnérables | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Hewlett-Packard s'est penché sur la sécurité des objets connectés. Résultat, 70 % présentent des vulnérabilités.

Les objets connectés se développent et se diversifient, mais cela n'est que le début. Le cabinet d'analyses Gartner estime notamment...


En savoir plus :


-  http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things



Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Dirty Dozen Spampionship: Who's who in the global spam-sending league?

The Dirty Dozen Spampionship: Who's who in the global spam-sending league? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
It's once again time for our quarterly Spampionship charts.

We looked at the sending countries for all our spam in the first three months of 2014, and turned the figures into a League Table - the sort of league you don't want to win!...


That's because cybercrooks don't send their own spam: that would be expensive, and easy to track, and would point the finger of law enforcement right back at them.

Instead, the crooks co-opt innocent third parties - like you and me, or our friends and family - to send spam for them.

The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:




Via Gust MEES
more...
Gust MEES's curator insight, April 17, 10:55 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's curator insight, April 17, 11:01 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.


You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Rescooped by Frederic GOUTH from Best Freeware Software
Scoop.it!

#Junkware Removal Tool Download

#Junkware Removal Tool Download | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it


Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

Junkware Removal Tool has the ability to remove the following types of programs:

  • Ask Toolbar
  • Babylon
  • Browser Manager
  • Claro / iSearch
  • Conduit
  • Coupon Printer for Windows
  • Crossrider
  • Facemoods / Funmoods
  • iLivid
  • IncrediBar
  • MyWebSearch
  • Searchqu
  • Web Assistant

When run, Junkware Removal Tool will remove all traces of these programs including their files, Registry keys, and folders.



Via Gust MEES
more...
Gust MEES's curator insight, February 4, 5:52 AM


A great tool...


173 Sud's curator insight, February 4, 9:15 AM


Junkware Removal Tool va vous aider à supprimer l'ensemble des logiciels indésirables tels que Ask Toolbar, Babylon, Browser Manager ou bien encore MyWebSearch et qui s'installe discrètement sur votre navigateur web. Pour cela rien de plus simple il vous suffit de lancer le programme Junkware Removal Tool et de fermer l'ensemble des navigateurs en cours d'utilisation. Attendez quelques minutes et le tour est joué.


Entièrement gratuit ce petit utilitaire est compatible avec les versions récentes de Windows.


Jean Claude Le Tellier's curator insight, February 7, 7:34 AM

A good one to keep in the toolbox!

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Scammers in a Wi-Fi Wonderland

Scammers in a Wi-Fi Wonderland | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

You’d better watch out, you’d better not cry—you’d better not use that public Wi-Fi. The holiday season is upon us and in addition to more flash sales, baked goods, and travel time—this meansmore online scams. A recent survey of American travelers revealed that the majority of us are not taking measures to protect ourselves when using public Wi-Fi. Numerous forms of malware can be delivered over unsecured connections, so when traveling for the holidays you’re more vulnerable than ever to a cyber break in.

 

That’s why on the road, in the air, or otherwise on the go this holiday season, it’s more important than ever that you watch where you connect.

 


Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Que peut coûter au gérant d'une société le piratage de son site web ?

Que peut coûter au gérant d'une société le piratage de son site web ? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Que peut coûter au gérant d'une société le piratage de son site web ?

Via Gust MEES
more...
Gust MEES's curator insight, December 5, 2013 9:50 AM

 

A MUST read!!!

 

Rescooped by Frederic GOUTH from Cyberdefense
Scoop.it!

Cyberattaque en France et dans le monde : qui attaque qui ?

Cyberattaque en France et dans le monde : qui attaque qui ? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
C'est de l'Asie et de l'Europe de l'Est que proviennent le plus grand nombre de cyber-attaques dans le monde selon l'étude et le plan interactif de FireEye.

Via Gust MEES, Veille Defense et I.E
more...
Rescooped by Frederic GOUTH from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Chaos Computer Club breaks Apple TouchID

Chaos Computer Club breaks Apple TouchID | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.


Via Gust MEES
more...
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

7 Cybersecurity Myths Busted [Infographic]

7 Cybersecurity Myths Busted [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Best Addresses To Stay Informed About IT-Security and Cyber-Security

Best Addresses To Stay Informed About IT-Security and Cyber-Security | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
. Introduction In previous articles WE discussed already about the responsibility that ===> everyone is responsible for a safer and more secure Internet <===, that the weakest link in the sec...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 2013 3:50 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Allan Shaw's curator insight, June 3, 2013 6:43 PM

The speed with which paswords can be cracked is frightening. The need to be careful grows each day!

AnnC's curator insight, June 4, 2013 9:12 PM

see the math...

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn't have to get their p...

Via Gust MEES
more...