Information #Secu...
Follow
Find
76.6K views | +79 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Scooped by Frederic GOUTH
Scoop.it!

#IOS Application #Security Part 25 - #Secure #Coding Practices for IOS Development

#IOS Application #Security Part 25 - #Secure #Coding Practices for IOS Development | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In this article, we will look at some of the best practices an IOS developer should follow in order to make sure that their application is not easily exploitable by hackers.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

A step by step analysis of memory forensics using Volatility for the DC3 2014 Forensics Challenge

Infiltrated dot Net
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#Facebook espionne même vos brouillons

#Facebook espionne même vos brouillons | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Facebook espionnerait ce que les utilisateurs saisissent dans les champs de publication avant qu’ils cliquent sur le bouton publier.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Hadoop se met à la programmation R native pour l'analyse big data

Hadoop se met à la programmation R native pour l'analyse big data | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Unordinary #Predictions for Information #Security in 2014

Unordinary #Predictions for Information #Security in 2014 | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Introduction The year is closing and it’s time for prediction of the evolution of the security landscape in 2014.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Improving SCADA System Security

Improving SCADA System Security | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Introduction Supervisory control and data acquisition (SCADA) networks contain computers and software that perform critical tasks and provide essential services within critical infrastructure.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Watch Dogs 1 Hour of Gameplay Walkthrough 1080p HD Full Gameplay Video Part 1

Enjoy this 1 HOUR Video Comprised of several Watch Dogs Gameplay. Comment, and subscribe for more! Info on Watch Dogs- Watch Dogs is an open world action-adv...
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

E-réputation : Les enjeux et les risques liés à son image sur Internet

E-réputation : Les enjeux et les risques liés à son image sur Internet | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
UnderNews | Culture Web
more...
No comment yet.
Rescooped by Frederic GOUTH from OWASP
Scoop.it!

Regard critique sur CVSS

Regard critique sur CVSS | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Ce système de notation utilisé par de nombreux acteurs de l'informatique permet-il d'évaluer de manière efficace la gravité d'une faille de sécurité ?

Via Sebastien Gioria
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#Free lance la #location de #smartphones haut de gamme à 12 euros/mois, mais...

#Free lance la #location de #smartphones haut de gamme à 12 euros/mois, mais... | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
L'opérateur ne fait rien comme tout le monde avec ce modèle associant location et paiement initial de 49 à 129 euros selon le modèle (Galaxy S4, iPhone 5s et Galaxy Note 3). Mais attention aux restrictions et contraintes...
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Weak Security In Most Mobile Banking Apps

Weak Security In Most Mobile Banking Apps | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Eight of 10 iOS, Android mobile banking apps are improperly configured, new report says
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

NSA : un juge estime la surveillance des téléphones anticonstitutionnelle

NSA : un juge estime la surveillance des téléphones anticonstitutionnelle | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Une injonction a été lancée à l'encontre de la NSA, par un juge qui a accepté de se saisir de l'affaire suite à une plainte lancée par Judicial Watch.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

On vit une époque formidable : le botnet de caisses enregistreuses !

On vit une époque formidable : le botnet de caisses enregistreuses ! | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Il était un temps ou l'idée d'un botnet de téléphones mobiles était considérée comme purement académique, voire relevant de la science-fiction.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#IOS Application #Security Part 24 - Jailbreak Detection and Evasion

#IOS Application #Security Part 24 - Jailbreak Detection and Evasion | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In this article, we will look at the checks a developer can incorporate in his application to check whether the device on which the application is running is jailbroken or not.
more...
No comment yet.
Rescooped by Frederic GOUTH from Alertes et Conseils Sécurité "AutreMent"
Scoop.it!

La NSA peine à quantifier le nombre de documents récupérés par Edward Snowden

La NSA peine à quantifier le nombre de documents récupérés par Edward Snowden | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Alors que l'évocation d'une négociation entre la NSA et Edward Snowden a filtré dans les médias en fin de semaine dernière, le New York Times explique désormais que l'agence américaine peine à quantif [...]...

Via L'Info Autrement
more...
No comment yet.
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Scammers in a Wi-Fi Wonderland

Scammers in a Wi-Fi Wonderland | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

You’d better watch out, you’d better not cry—you’d better not use that public Wi-Fi. The holiday season is upon us and in addition to more flash sales, baked goods, and travel time—this meansmore online scams. A recent survey of American travelers revealed that the majority of us are not taking measures to protect ourselves when using public Wi-Fi. Numerous forms of malware can be delivered over unsecured connections, so when traveling for the holidays you’re more vulnerable than ever to a cyber break in.

 

That’s why on the road, in the air, or otherwise on the go this holiday season, it’s more important than ever that you watch where you connect.

 


Via Gust MEES
more...
Scooped by Frederic GOUTH
Scoop.it!

L' #ANSSI recense les formations de l’enseignement supérieur spécialisées dans le domaine de la #cybersécurité en #France

L' #ANSSI recense les formations de l’enseignement supérieur spécialisées dans le domaine de la #cybersécurité en #France | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Analyzing Stealth Malware

Analyzing Stealth Malware | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Advanced malware employs many hiding techniques in order to evade anti-virus measures and to deceive the victim. Trojans come in the form of bound executables in a legitimate application in which the malware in decompressed/decrypted and executed.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Watch Dogs - Fan Film

Like it, Share it and Subscribe to help us make more videos! (Director's note - Remember seeing that first gameplay video for Watch_Dogs, like a year ago? No...
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

#Backlog in #digital #forensics: Is justice being done?

#Backlog in #digital #forensics: Is justice being done? | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
The Leiden Law Blog is part of the Leiden Law School, Leiden University. The blog stands out by reacting to the latest news while at the same time touching on the research being performed within our faculty.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Le #BYOD pour les nuls - édition spéciale #VMware

Le #BYOD pour les nuls - édition spéciale #VMware | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
VMware présente «Le BYOD pour les nuls» en téléchargement gratuit.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Un faux plugin Firefox crée un botnet de 12 500 machines

Un faux plugin Firefox crée un botnet de 12 500 machines | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Le site spécialisé KrebsOnSecurity dit avoir découvert un botnet de 12 500 machines qui scannaient, via un plugin Firefox, les sites visités à la recherche de failles.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

La DGOS publie un guide sur la sécurité des systèmes d'information d'établissement de santé

more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

NSA - A bios malware can remotely destroy any US system

NSA - A bios malware can remotely destroy any US system | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
The NSA Director General Alexander and Information Assurance Director Plunkett claimed a foreign government has developed a BIOS based malware.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Microsoft prédit 8 menaces majeures en 2014 dont Windows XP

Microsoft prédit 8 menaces majeures en 2014 dont Windows XP | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
L'année 2014 sera - comme chaque année - pleine de menaces et d'espoirs pour la sécurité informatique. Microsoft fait un tour des prédictions parfois convenu.
more...
No comment yet.