Information Secur...
Follow
Find tag "Cybersecurity"
36.2K views | +55 today
Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

8 Levels of IT Security [Infographic]

8 Levels of IT Security [Infographic] | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

EU proposes new cybercrime rules

EU proposes new cybercrime rules | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Net firms, banks, hospitals and other may be required to report all cyber break-ins under new EU proposals.

Via Gust MEES
more...
Gust MEES's curator insight, February 7, 2013 5:57 AM

Over 40,000 firms, including energy providers, banks and hospitals could be required to report cyber-break-ins under new rules proposed by the EU.


Gust MEES's curator insight, February 7, 2013 6:00 AM

Over 40,000 firms, including energy providers, banks and hospitals could be required to report cyber-break-ins under new rules proposed by the EU.


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

1-15 January 2013 Cyber Attacks Timeline

1-15 January 2013 Cyber Attacks Timeline | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
So here we are with the first Cyber Attacks Timeline for 2013 covering the first half of January. Apparently the new year has begun with an intense activity by Cyber Crooks. Hacktivists and Cyber C...

Via Gust MEES
more...
Gust MEES's curator insight, January 18, 2013 10:42 AM

A LOT from Education in there, about time to learn the basics of Cyber-Security ;)

 

Check ALSO:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Infographic: Underground Economy and Cyber Crime - Exposed

Infographic: Underground Economy and Cyber Crime - Exposed | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Get Cyber Safe Blog

Via Gust MEES
more...
Gust MEES's curator insight, January 14, 2013 12:44 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 14, 2013 12:50 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Cybersecurity Summary for Parents

Cybersecurity Summary for Parents | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Cyber-Security:

 

Download this free guide to get the full list of...

 

- How to prevent and avoid cyberbullying

 

- Tips for you teen to prevent sharing too much personal information

 

- Tips for identifying and dealing with an online predators

 

Want more safety information for you and your kids? Download this new guide today, hot off the press!


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Mobile Phone Safety For Kids

Mobile Phone Safety For Kids | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

We all acknowledge the benefits of staying in touch with your children but have we taken all the measures to ensure they are protected against the most common risks? Take a look at the slideshow and find out how you can help your kids stay safe on their mobile.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/06/mobile-phone-safety-for-kids/

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cybersecurity with fun videos: passwords

A scene from the movie "Spaceballs" (MGM, 1987). I use it to educate people to choose better "combinations" aka passwords. The scene has been slightly edited...

 

==========================================

 

Gust MEES

 

Check also my FREE courses here:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

http://gustmees.wordpress.com/2012/05/04/get-smart-with-5-minutes-tutorialsit-securitypart-4-surf-more-secure-which-web-sites-to-trust/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

==========================================

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security

Learning basics of Cyber-Security | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

 

[Beginning Text from www.informationweek.com]

 

Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users. They’re looking for unlocked doors and open windows. The path of least resistance will always be the one most beaten down by bad guys.

There are many other reasons a cybercriminal might target your company and your employees, but the message is the same: ===> No business, no individual is immune. <=== Whether you are Sony or a mom-and-pop shop, you may be a target today. How you respond to that threat could make the difference between being safe and being breached. [End Text from www.informationweek.com]

 

In clear text this means that any private computer could be a target!

 

Learn more, a MUST:

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Beginners IT-Security Guide

Beginners IT-Security Guide | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

In 21st Century we need not ONLY talking about IT-Security, but we need to secure our computers and ANY other related device connecting to Internet, such as also our smartphones!

 

I will present you now a tutorial on How-To create best protection (as on March 2012) for your computer and this with mostly FREE tools and FREE Online Services… Also will I provide you a worksheet which helps you planning your weekly tasks!

Weekly Tasks? YES, you need to work a bit, but don’t worry, most tasks are automated and don’t need a lot of intervention! But they are necessary! It’s ONLY the first time when you have to install some programs and to read this tutorial that you will need to invest time!


===> But investing once time for saving time later and avoiding trouble is definitely worth to do <===

 

Read more, a practical guide...

 


Via Gust MEES
more...
Gust MEES's curator insight, December 23, 2012 5:24 AM

                         

                     ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

Rescooped by Frederic GOUTH from ICT Security Tools
Scoop.it!

How to fix the UPnP security holes

How to fix the UPnP security holes | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Universal Plug and Play has always had security holes. Here's how to plug them.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security Tools
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 3:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 3:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 3:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: The Kingdom of Fraud-CyberCrime

Infographic: The Kingdom of Fraud-CyberCrime | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
GOOD Infographic: The Kingdom of Fraud - The State of Global Economic Crime

Via Gust MEES
more...
Gust MEES's curator insight, January 15, 2013 11:42 PM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!

 

Gust MEES's curator insight, January 15, 2013 11:47 PM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

La SNCB livre les données de 3 700 Luxembourgeois - Luxembourg

La SNCB livre les données de 3 700 Luxembourgeois - Luxembourg | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
LUXEMBOURG - Quelques jours après la divulgation de la fuite de données de 1,5 million d utilisateurs des chemins de fer belges, des milliers de noms au Grand-Duché ont été dévoilés.

 

«Ce fichier pourrait être utilisé à mauvais escient»

 

Le fichier, disponible en ligne et indexé par les moteurs de recherche depuis plusieurs semaines, contient ainsi non seulement les noms des clients de la SNCB, mais également les mails privés, les adresses et les identifiants de connexion au site belge. En revanche, les mots de passe n'y figurent pas. Une véritable mine d'informations que plusieurs dizaines d'internautes ont pu sauvegarder avant que le fichier ne soit retiré du site Internet des chemins de fer belges. Un fichier que certains experts, cités par les médias belges, estiment à quatre millions d'euros.


Via Gust MEES
more...
Gust MEES's curator insight, January 2, 2013 10:39 PM

Affaire à suivre de près...

 

This message is provided by www.circl.lu If you are a victim of the #SNCB data leak, you can check the privacy commission in Belgium for filling a complain http://www.privacycommission.be

Gust MEES's curator insight, January 2, 2013 10:49 PM

Affaire à suivre de près...

 

This message is provided by www.circl.lu If you are a victim of the #SNCB data leak, you can check the privacy commission in Belgium for filling a complain http://www.privacycommission.be

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Security team finds malware that hijacks USB smart cards

Security team finds malware that hijacks USB smart cards | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
A team of researchers have created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.

 

In the case of USB smart card readers, the attacker can use the middleware software provided by the smart card manufacturer to perform operations with the victim's card as if it was attached to his own computer, said Paul Rascagneres, an IT security consultant at Luxembourg-based security auditing and consulting firm Itrust Consulting, last week. Rascagneres is also the founder and leader of a malware analysis and engineering project called malware.lu, whose team designed this USB sharing malware.

 

There are already documented cases of malware that hijacks smart card devices on the local computer and uses them through the API (application programming interface) provided by the manufacturer.

 

Read more, a MUST:

http://www.pcworld.com/article/2014713/security-team-finds-malware-that-hijacks-usb-smart-cards.html

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 


Via Gust MEES
more...
Francoise Rieffel's curator insight, August 7, 2013 3:19 AM

add your insight...

 

 

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Critical security holes closed in Firefox 16 and Thunderbird 16

Critical security holes closed in Firefox 16 and Thunderbird 16 | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Mozilla has released a security update to Firefox, Thunderbird, and their ESR versions, and Seamonkey after critical security flaws were found which exposed users to XSS attacks...

 

                               ===> UPDATE asap!!! <====

 

Read more, a MUST:

http://www.h-online.com/open/news/item/Critical-security-holes-closed-in-Firefox-16-and-Thunderbird-16-1737891.html

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of IT-Security: A day in the life of IT security

Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...

 

=============================================

 

Gust MEES

Read also my FREE courses here:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

=============================================

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Eurobarometer survey | Cybercrime: Many become victims of online fraud

Eurobarometer survey | Cybercrime: Many become victims of online fraud | Information Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Cecilia Malmström - Commissioner Cecilia Malmström, Responsible for Home Affairs...

 

A new Eurobarometer survey shows that Internet users are very concerned about cyber security: 89% avoid disclosing personal information online, and 74% agree that the risk of becoming a victim of cybercrime has increased in the past year. 12% of internet users across the EU have already experienced online fraud, and 8% have fallen victim to identity theft.

 

===> Nonetheless, 53% have not changed any of their online passwords during the past year.<===

 

Download the survey [pdf] for your country here:

 

http://ec.europa.eu/public_opinion/archives/eb_special_399_380_en.htm#390

 

 


Via Gust MEES
more...
No comment yet.