Information Secur...
Follow
Find
36.5K views | +35 today
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
onto Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
Scoop.it!

How Google, Yahoo, Apple, Facebook, and Amazon track you [#infographic]

How Google, Yahoo, Apple, Facebook, and Amazon track you [#infographic] | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Everyone's worried about how their data can be collected through government programs, but maybe it's time to look at how your information is tracked in everyday life.

Via Gust MEES
more...
Angela Goldsmith's curator insight, June 27, 2013 7:59 AM

George Orwell is cringing in his grave.  The is beyond "Big Brother" watching us.  We are all now so very digitally connected everywhere.

Venkatesh Iyer (venkyiyer.com)'s curator insight, June 28, 2013 2:30 AM

Big Brother has got his eye on you.

iPhonefixed's curator insight, June 29, 2013 11:39 PM

Frightning.  If this makes you think, take a look at Juan Enriquez talk on TED - Your online life, Permanent as a Tattoo. http://www.ted.com/talks/juan_enriquez_how_to_think_about_digital_tattoos.html


Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Scooped by Frederic GOUTH
Scoop.it!

Frédéric #GOUTH : Mon #CV | #Bordeaux #Sécurité #RSSI #ISO27001

Frédéric GOUTH 5 D rue de la Demi Lune 33850 Léognan +33 (0)6 10 61 09 36 fgouth@gouth.fr http://www.fredericgouth.com http://www.linkedin.com/in/gouth http:...
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Hands-free configuration of your #VM in #Microsoft #Azure

Hands-free configuration of your #VM in #Microsoft #Azure | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
This blog talks about Private Cloud, Public Cloud, Azure, System Center, hybrid cloud, Windows Server 2012, Windows Client, System Center 2012, Windows Azure and Windows Intune. You will find relevant content on windows, system center, and cloud computing.
more...
No comment yet.
Rescooped by Frederic GOUTH from Jobs'TIC : emploi formation éducation
Scoop.it!

Observatoire Aquitain de l’économie #Numérique 2014

Rapport "Observatoire Aquitain de l’économie numérique 2014" réalisé par la CCI de Bordeaux.


Via Commission emploi-formation-éducation La Mêlée
more...
Commission emploi-formation-éducation La Mêlée's curator insight, April 22, 3:16 AM

Une étude de nos voisins Aquitains sur l'économie numérique.

Scooped by Frederic GOUTH
Scoop.it!

#ICO : "Conducting #privacy impact assessments code of practice" #CNIL

more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Les systèmes de communication par #satellite fortement #vulnérables #IOActive

Les systèmes de communication par #satellite fortement #vulnérables #IOActive | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
La société IOActive a évalué les firmwares des principaux terminaux de communication par satellite (Harris, Hughes, Cobham, Thuraya, JRC et Iridium). Ces systèmes couvrent l'essentiel des infrastructures satellitaires courantes, depuis Inmarsat jusqu'au réseau BGAN (utilisé notamment pour des applications militaires ou … Continuer la lecture →
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#Python #tools for #penetration testers

Python tools for penetration testers
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

What is #Cookiejacking ?

What is #Cookiejacking ? | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
“Cookiejacking” may sound like someone taking a bite out of that delicious chocolate chip cookie you were planning to have after lunch, but it is actually an online security risk that could lead to your personal information falling into the hands of a cybercriminal.

But to understand this risk, you first need to know about Internet cookies. An Internet cookie is a small text file that gets stored on your computer or mobile hard disk from a website that you have previously visited, so the next time you’re on that site, it alerts the site that you’re back.
The cookie holds information such as an identifier the site assigns to you, and any preferences or personal information you may have shared with that website, such as your name and email address. Cookies are the reason why you may see a message that says “Welcome back, John” when you revisit a website.
Now that you know what an Internet cookie is, you can better understand cookiejacking. This is when your device’s cookies are stolen,…
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Le contrôleur européen de la protection des données viens de publier son rapport annuel pour 2013 #CNIL #AFCDP

Le contrôleur européen de la protection des données viens de publier son rapport annuel pour 2013 #CNIL #AFCDP | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#CIRCL lance son service de « Dynamic #Malware Analysis » - #Cases

#CIRCL lance son service de « Dynamic #Malware Analysis » -  #Cases | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
CIRCL a récemment lancé son propre service de Dynamic Malware Analysis qui permet de détecter les attaques sophistiquées de programmes malveillants.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Pour déclarer et combattre le #SPAM : Signal Spam #SignalSpam

Pour déclarer et combattre le #SPAM : Signal Spam #SignalSpam | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Données publiques : la France rejoint l' #OpenGovernment Partnership #OpenData #CNNum #Etalab @Etalab

Données publiques : la France rejoint l' #OpenGovernment Partnership #OpenData  #CNNum #Etalab @Etalab | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Les présidents français et mexicain ont annoncé lors de la visite de François Hollande au Mexique l'adhésion de leurs pays à l'OGP, afin de partager et développer les bonnes pratiques en matière d'ouverture des données publiques. La politique française d'open data sera abordée par Manuel Valls lors d'une conférence internationale la semaine prochaine.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Excellente vidéo sur La protection des données à caractère personnel !! #CNIL #CIL #CyberSécurité

Film commandé par ADP et produit par Tulipes et Cie pour sensibiliser leurs collaborateurs à la protection des données personelles. Production - Camille Declerck et Marianne Quiry Réalisation - Olivier Marchon Graphisme - Océane Lanouet Comédien - François Bureloup Sound Design - Yellow Cab Direction de production - Véronique Michot Copyright ADP/Tulipes et Cie 2013
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#RedHat Enterprise #Linux 7 release candidate arrives

#RedHat Enterprise #Linux 7 release candidate arrives | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
But where's the final release of Red Hat's flagship Linux server distribution?
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#Cisco lance un nouveau service de #Sécurité #Réseau

#Cisco lance un nouveau service de #Sécurité #Réseau | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Avec Managed Threat Defense, Cisco propose aux entreprises un outil de sécurisation en temps réel de leur réseau basé sur l’analyse prédictive. Combinant matériel et logiciels, le service est commercialisé sous forme d’abonnement.
more...
No comment yet.
Rescooped by Frederic GOUTH from Intelligence Economique: Veille stratégique, Influence et lobbying
Scoop.it!

Veille stratégique : un nouveau service d'alerte par courriel sur Google Trends

Veille stratégique : un nouveau service d'alerte par courriel sur Google Trends | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Les entreprises désireuses de réaliser une veille stratégique ont accès à un nouvel outil sur Google Trends. En...

Via Morgan BANCEL
more...
Morgan BANCEL's curator insight, April 22, 9:52 AM

mmmmm encore + d'emails ! 

Scooped by Frederic GOUTH
Scoop.it!

#ICO ( #CNIL britannique ) publie un guide concernant les Études d'impact sur la #Vieprivée & #DonnéesPersonnelles

more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#JaguarNetwork renouvelle sa confiance à #NTT

#JaguarNetwork renouvelle sa confiance à #NTT | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#SATCOM #Security #WhitePaper by #IOActive

more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Introducing #Microsoft Threat Modeling Tool 2014 - The #Security Development #Lifecycle

Introducing #Microsoft Threat Modeling Tool 2014 - The #Security Development #Lifecycle | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Un #malware touche les appareils #iphone jailbreakés

Un #malware touche les appareils #iphone jailbreakés | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Voici une information à laquelle tout ceux possédant un appareil jailbreaké devraient porter attention. En effet, un malware a été découvert sur les a
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Une proposition de loi veut restreindre fortement la #biométrie

Une proposition de loi veut restreindre fortement la #biométrie | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Enfin interdire est sans doute un grand mot, disons que la proposition vise à la restreindre de manière tellement importante qu’en pratique rare seront ceux à pouvoir la mettre en oeuvre au sein de systèmes de traitements automatisés de données. Celle-ci […]
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#Phishing Initiative : Soumettez vos phishing présumés afin de contribuer à la lutte ! #PhishingInitiative

#Phishing Initiative : Soumettez vos phishing présumés afin de contribuer à la lutte ! #PhishingInitiative | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Phishing Initiative offre à tout internaute la possibilité de lutter contre les attaques de phishing.
more...
No comment yet.
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The Dirty Dozen Spampionship: Who's who in the global spam-sending league?

The Dirty Dozen Spampionship: Who's who in the global spam-sending league? | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
It's once again time for our quarterly Spampionship charts.

We looked at the sending countries for all our spam in the first three months of 2014, and turned the figures into a League Table - the sort of league you don't want to win!...


That's because cybercrooks don't send their own spam: that would be expensive, and easy to track, and would point the finger of law enforcement right back at them.

Instead, the crooks co-opt innocent third parties - like you and me, or our friends and family - to send spam for them.

The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:




Via Gust MEES
more...
Gust MEES's curator insight, April 17, 7:55 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.

You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Gust MEES's curator insight, April 17, 8:01 AM


The criminals use malware-infected computers as remote control "spam robots," better known as bots or zombies, to churn out unwanted and illegal emails on their behalf.


You end up paying for the bandwidth, carrying the risk, and contributing to your country's standing in the Spampionship.


Learn more:



Scooped by Frederic GOUTH
Scoop.it!

Comment #PSA #Peugeot #Citroën analyse les #tweets #Visibrain #Veille

Comment #PSA #Peugeot #Citroën analyse les #tweets #Visibrain #Veille | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Comment une entreprise de niveau Cac 40 surveille la résonance de son activité sur Twitter ? Zoom sur une manière nouvelle de faire sa veille.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Introducing #VMware #vCloud #Hybrid Service - #DisasterRecovery : Making #Cloud DR Simple and Affordable

Introducing #VMware #vCloud #Hybrid Service - #DisasterRecovery : Making #Cloud DR Simple and Affordable | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Le #G29 publie un avis sur les techniques d’ #anonymisation - #CNIL

Le groupe de l’Article 29 qui regroupe les autorités de protection des données européennes, vient de publier un avis sur les principales techniques d’anonymisation, afin d’expliquer comment les mettre en œuvre.
more...
No comment yet.