#Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
109.8K views | +27 today
Follow
#Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
All About #Security #CyberSecurity #Sécurité #CyberSécurité #CyberDefence #InfoSec & #DevOps #DevSecOps
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES
more...
Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Cyber Arms Race: Mikko Hypponen at TEDxBrussels

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TED...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from Cyberdefense et actualité.
Scoop.it!

Cyberattaque en France et dans le monde : qui attaque qui ?

Cyberattaque en France et dans le monde : qui attaque qui ? | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
C'est de l'Asie et de l'Europe de l'Est que proviennent le plus grand nombre de cyber-attaques dans le monde selon l'étude et le plan interactif de FireEye.

Via Gust MEES, Veille sur le monde du Cyber ...
more...
Rescooped by Frederic GOUTH from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Chaos Computer Club breaks Apple TouchID

Chaos Computer Club breaks Apple TouchID | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.


Via Gust MEES
more...
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Internet «Un enfant va cliquer sur tout ce qu il voit»

Internet «Un enfant va cliquer sur tout ce qu il voit» | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
LUXEMBOURG - La vigilance sur le Net, c est simple comme de regarder avant de traverser la route.

Via Gust MEES
more...
Gust MEES's curator insight, September 6, 2013 7:42 PM

 

Gust MEES: mon premier article publié dans un journal, le 02.04.2008... Les conseils sont toujours valables...

 

En savoir plus :

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES : mes cours sont au serveur du ministère de l'Éducation Nationale :

 

http://www.myschool.lu/home/mS/publications_fiches.asp

 

 

Gust MEES's curator insight, September 6, 2013 7:46 PM

 

Gust MEES: mon premier article publié dans un journal, le 02.04.2008... Les conseils sont toujours valables...

 

En savoir plus :

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES : mes cours sont au serveur du ministère de l'Éducation Nationale :

 

http://www.myschool.lu/home/mS/publications_fiches.asp

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

New PRISM leaks detail ‘live notification’ of email logins, sent messages, and chat service usage

New PRISM leaks detail ‘live notification’ of email logins, sent messages, and chat service usage | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
The NSA can track real-time events such as email logins or the sending of email, and the logging in or out of a user to a chat service according to the Washington Post.

New PRISM ...

 

                         

 

 

                                    ===> You have no digital privacy. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, June 30, 2013 5:00 PM

 

                         ===> You have no digital privacy. <===

Rescooped by Frederic GOUTH from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.

A posse of German computer scientists has found that Apple's iOS passphrase generator may give yo...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Which tech companies are looking out for your privacy?

Which tech companies are looking out for your privacy? | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
The Electronic Freedom Foundation calls out Sonic.net for actively protecting personal data from the government, and Verizon, AT&T and Apple for, well, not.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 2013 3:50 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Allan Shaw's curator insight, June 3, 2013 6:43 PM

The speed with which paswords can be cracked is frightening. The need to be careful grows each day!

AnnC's curator insight, June 4, 2013 9:12 PM

see the math...

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn't have to get their p...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Transatlantic Cooperation on Cybersecurity: Perspectives on New EU and U.S. Initiatives

Transatlantic Cooperation on Cybersecurity: Perspectives on New EU and U.S. Initiatives | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
On Tuesday, March 5th, The European Institute, in cooperation with the Embassy of Italy, will hold a meeting of the Transatlantic Roundtable on Telecommunications & IT with Dr.

Via Gust MEES
more...
Gust MEES's curator insight, March 1, 2013 12:46 PM

One step further...

 

Gust MEES's curator insight, March 1, 2013 12:49 PM

One step further...

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

8 Levels of IT Security [Infographic]

8 Levels of IT Security [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

EU proposes new cybercrime rules

EU proposes new cybercrime rules | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Net firms, banks, hospitals and other may be required to report all cyber break-ins under new EU proposals.

Via Gust MEES
more...
Gust MEES's curator insight, February 7, 2013 8:57 AM

Over 40,000 firms, including energy providers, banks and hospitals could be required to report cyber-break-ins under new rules proposed by the EU.


Gust MEES's curator insight, February 7, 2013 9:00 AM

Over 40,000 firms, including energy providers, banks and hospitals could be required to report cyber-break-ins under new rules proposed by the EU.


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Que peut coûter au gérant d'une société le piratage de son site web ?

Que peut coûter au gérant d'une société le piratage de son site web ? | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Que peut coûter au gérant d'une société le piratage de son site web ?

Via Gust MEES
more...
Gust MEES's curator insight, December 5, 2013 9:50 AM

 

A MUST read!!!

 

Rescooped by Frederic GOUTH from Social Media and its influence
Scoop.it!

Twitter plans to encrypt its direct messaging service

Twitter plans to encrypt its direct messaging service | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
As a result of the growing NSA revelations, the social microblogging site is upping its defenses by planning to encrypt its direct messaging Service.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Sécuriser son site web : les bases essentielles - Cases

Sécuriser son site web : les bases essentielles -  Cases | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

How Google, Yahoo, Apple, Facebook, and Amazon track you [#infographic]

How Google, Yahoo, Apple, Facebook, and Amazon track you [#infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Everyone's worried about how their data can be collected through government programs, but maybe it's time to look at how your information is tracked in everyday life.

Via Gust MEES
more...
Michelle Gilstrap's curator insight, June 27, 2013 10:40 AM

Just in case you were wondering how your information is being tracked.

Vincenzo Storti's curator insight, June 27, 2013 10:47 AM

Inquietante..

iPhonefixed's curator insight, June 30, 2013 2:39 AM

Frightning.  If this makes you think, take a look at Juan Enriquez talk on TED - Your online life, Permanent as a Tattoo. http://www.ted.com/talks/juan_enriquez_how_to_think_about_digital_tattoos.html


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Best Addresses To Stay Informed About IT-Security and Cyber-Security

Best Addresses To Stay Informed About IT-Security and Cyber-Security | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
. Introduction In previous articles WE discussed already about the responsibility that ===> everyone is responsible for a safer and more secure Internet <===, that the weakest link in the sec...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
INFOGRAPHIC: Mobile Threat in Action

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Hacking lessons learned: how to cover your digital ass [Infographic]

Hacking lessons learned: how to cover your digital ass [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Mat Honan got owned last year and it sucked, but you can still learn his lesson.

Via Gust MEES
more...
Gust MEES's curator insight, April 12, 2013 8:06 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, April 12, 2013 8:07 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Dico Krommenhoek's curator insight, April 14, 2013 2:50 PM

Naast geinige kanten kent ICT zoals bekend ook nare randjes. Alleen normaal doen, helpt niet altijd. Gust Mees is een autoriteit op het gebied van digitale veiligheid. Mooie infographic collectiecollectie

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Overview of current cyber attacks (logged by 97 Sensors ) - Sicherheitstacho.eu

Overview of current cyber attacks (logged by 97 Sensors ) - Sicherheitstacho.eu | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, March 7, 2013 1:13 PM

 

A great real time observation tool...

 

Gust MEES's curator insight, March 7, 2013 1:16 PM


A great real time observation tool...


Harold Thwaites's curator insight, March 7, 2013 7:05 PM

Sensors can tell us so much that we don't yet know.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

eSafetyKit

eSafetyKit | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Safer internet/eSafety

Via Gust MEES
more...
Philippe Trebaul's curator insight, February 27, 2013 3:02 PM
eSafetyKit

Safer Internet / eSafety


eSafetyKit via @knolinfos http://sco.lt/...

Gust MEES's curator insight, February 27, 2013 3:35 PM

Check it out and teach the kids!

 

Schreib-Lounge's curator insight, February 28, 2013 1:54 AM

esaftey-Kit in diversen Sprachen: Franzöisch, Flämisch, Spanisch ...

Rescooped by Frederic GOUTH from ICT Security Tools
Scoop.it!

How to fix the UPnP security holes

How to fix the UPnP security holes | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps | Scoop.it
Universal Plug and Play has always had security holes. Here's how to plug them.

Via Gust MEES
more...