#Security #InfoSe...
Follow
Find tag "Learning IT-Security"
79.3K views | +89 today
#Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence
All About #Security #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Protecting Your Password - How Hacker Friendly is Yours [Infographic]

Protecting Your Password - How Hacker Friendly is Yours [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

Via Gust MEES
more...
Gust MEES's curator insight, June 3, 2013 3:50 PM

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Allan Shaw's curator insight, June 3, 2013 6:43 PM

The speed with which paswords can be cracked is frightening. The need to be careful grows each day!

AnnC's curator insight, June 4, 2013 9:12 PM

see the math...

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn't have to get their p...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

8 Levels of IT Security [Infographic]

8 Levels of IT Security [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

EU proposes new cybercrime rules

EU proposes new cybercrime rules | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Net firms, banks, hospitals and other may be required to report all cyber break-ins under new EU proposals.

Via Gust MEES
more...
Gust MEES's curator insight, February 7, 2013 8:57 AM

Over 40,000 firms, including energy providers, banks and hospitals could be required to report cyber-break-ins under new rules proposed by the EU.


Gust MEES's curator insight, February 7, 2013 9:00 AM

Over 40,000 firms, including energy providers, banks and hospitals could be required to report cyber-break-ins under new rules proposed by the EU.


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Determining What Calls Home - Learning about Privacy / Security

Determining What Calls Home - Learning about Privacy / Security | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
I've done some thinking about computer security and privacy over the past while.  It's been precipitated by conversations with Gust Mees.  It's good thinking. We're all in the same boat.  Just thin...

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 8:33 AM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!

 

Gust MEES's curator insight, February 3, 2013 8:38 AM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!


Gust MEES's curator insight, February 3, 2013 8:39 AM

Good thought from Doug and a great tool, well explained... A MUST read, thx Doug!


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: The Kingdom of Fraud-CyberCrime

Infographic: The Kingdom of Fraud-CyberCrime | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
GOOD Infographic: The Kingdom of Fraud - The State of Global Economic Crime

Via Gust MEES
more...
Gust MEES's curator insight, January 16, 2013 2:42 AM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!

 

Gust MEES's curator insight, January 16, 2013 2:47 AM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!


Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

La SNCB livre les données de 3 700 Luxembourgeois - Luxembourg

La SNCB livre les données de 3 700 Luxembourgeois - Luxembourg | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
LUXEMBOURG - Quelques jours après la divulgation de la fuite de données de 1,5 million d utilisateurs des chemins de fer belges, des milliers de noms au Grand-Duché ont été dévoilés.

 

«Ce fichier pourrait être utilisé à mauvais escient»

 

Le fichier, disponible en ligne et indexé par les moteurs de recherche depuis plusieurs semaines, contient ainsi non seulement les noms des clients de la SNCB, mais également les mails privés, les adresses et les identifiants de connexion au site belge. En revanche, les mots de passe n'y figurent pas. Une véritable mine d'informations que plusieurs dizaines d'internautes ont pu sauvegarder avant que le fichier ne soit retiré du site Internet des chemins de fer belges. Un fichier que certains experts, cités par les médias belges, estiment à quatre millions d'euros.


Via Gust MEES
more...
Gust MEES's curator insight, January 3, 2013 1:39 AM

Affaire à suivre de près...

 

This message is provided by www.circl.lu If you are a victim of the #SNCB data leak, you can check the privacy commission in Belgium for filling a complain http://www.privacycommission.be

Gust MEES's curator insight, January 3, 2013 1:49 AM

Affaire à suivre de près...

 

This message is provided by www.circl.lu If you are a victim of the #SNCB data leak, you can check the privacy commission in Belgium for filling a complain http://www.privacycommission.be

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Security team finds malware that hijacks USB smart cards

Security team finds malware that hijacks USB smart cards | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
A team of researchers have created a proof-of-concept piece of malware that can give attackers control of USB smart card readers attached to an infected Windows computer over the Internet.

 

In the case of USB smart card readers, the attacker can use the middleware software provided by the smart card manufacturer to perform operations with the victim's card as if it was attached to his own computer, said Paul Rascagneres, an IT security consultant at Luxembourg-based security auditing and consulting firm Itrust Consulting, last week. Rascagneres is also the founder and leader of a malware analysis and engineering project called malware.lu, whose team designed this USB sharing malware.

 

There are already documented cases of malware that hijacks smart card devices on the local computer and uses them through the API (application programming interface) provided by the manufacturer.

 

Read more, a MUST:

http://www.pcworld.com/article/2014713/security-team-finds-malware-that-hijacks-usb-smart-cards.html

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 


Via Gust MEES
more...
Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Critical security holes closed in Firefox 16 and Thunderbird 16

Critical security holes closed in Firefox 16 and Thunderbird 16 | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Mozilla has released a security update to Firefox, Thunderbird, and their ESR versions, and Seamonkey after critical security flaws were found which exposed users to XSS attacks...

 

                               ===> UPDATE asap!!! <====

 

Read more, a MUST:

http://www.h-online.com/open/news/item/Critical-security-holes-closed-in-Firefox-16-and-Thunderbird-16-1737891.html

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of IT-Security: A day in the life of IT security

Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...

 

=============================================

 

Gust MEES

Read also my FREE courses here:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

=============================================

 


Via Gust MEES
more...
Melf's curator insight, April 18, 2014 9:13 AM

Here you see some facts about how companies lack in security.

Some points like file sharing and getting worms are a really big issue. If there is no protection against that the company may be in danger. If all people have about 3 devices and they arent protected, you cant stop this.

Melf's curator insight, April 25, 2014 9:02 AM

I think that people should pay more attention to this because there are more victims every day. Not only persons but also companies could get trouble with not paying attention to your data.

Melf's curator insight, April 25, 2014 9:07 AM

Im very afraid of losing data myself. I saw a commercial once that someone took over the identity of another person. I hope that people pay more attention and try to be more safe in the future.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Hacking lessons learned: how to cover your digital ass [Infographic]

Hacking lessons learned: how to cover your digital ass [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Mat Honan got owned last year and it sucked, but you can still learn his lesson.

Via Gust MEES
more...
Gust MEES's curator insight, April 12, 2013 8:06 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, April 12, 2013 8:07 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Dico Krommenhoek's curator insight, April 14, 2013 2:50 PM

Naast geinige kanten kent ICT zoals bekend ook nare randjes. Alleen normaal doen, helpt niet altijd. Gust Mees is een autoriteit op het gebied van digitale veiligheid. Mooie infographic collectiecollectie

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Overview of current cyber attacks (logged by 97 Sensors ) - Sicherheitstacho.eu

Overview of current cyber attacks (logged by 97 Sensors ) - Sicherheitstacho.eu | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Gust MEES's curator insight, March 7, 2013 1:13 PM

 

A great real time observation tool...

 

Gust MEES's curator insight, March 7, 2013 1:16 PM


A great real time observation tool...


Harold Thwaites's curator insight, March 7, 2013 7:05 PM

Sensors can tell us so much that we don't yet know.

Rescooped by Frederic GOUTH from ICT Security Tools
Scoop.it!

How to fix the UPnP security holes

How to fix the UPnP security holes | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Universal Plug and Play has always had security holes. Here's how to plug them.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security Tools
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 6:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

1-15 January 2013 Cyber Attacks Timeline

1-15 January 2013 Cyber Attacks Timeline | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
So here we are with the first Cyber Attacks Timeline for 2013 covering the first half of January. Apparently the new year has begun with an intense activity by Cyber Crooks. Hacktivists and Cyber C...

Via Gust MEES
more...
Gust MEES's curator insight, January 18, 2013 1:42 PM

A LOT from Education in there, about time to learn the basics of Cyber-Security ;)

 

Check ALSO:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Infographic: Underground Economy and Cyber Crime - Exposed

Infographic: Underground Economy and Cyber Crime - Exposed | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Get Cyber Safe Blog

Via Gust MEES
more...
Gust MEES's curator insight, January 14, 2013 3:44 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 14, 2013 3:50 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Check the security score of your device | Powered by OESIS

Check the security score of your device | Powered by OESIS | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.

 

Compatible with Windows XP, Vista, 7 and 8
Requires Internet Explorer 8 or higher

 

Read more, a MUST:

http://www.opswat.com/products/security-score

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Mobile Phone Safety For Kids

Mobile Phone Safety For Kids | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

We all acknowledge the benefits of staying in touch with your children but have we taken all the measures to ensure they are protected against the most common risks? Take a look at the slideshow and find out how you can help your kids stay safe on their mobile.

 

Read more, a MUST:

http://www.itsnotacon.co.uk/2012/09/06/mobile-phone-safety-for-kids/

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cybersecurity with fun videos: passwords

A scene from the movie "Spaceballs" (MGM, 1987). I use it to educate people to choose better "combinations" aka passwords. The scene has been slightly edited...

 

==========================================

 

Gust MEES

 

Check also my FREE courses here:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

http://gustmees.wordpress.com/2012/05/04/get-smart-with-5-minutes-tutorialsit-securitypart-4-surf-more-secure-which-web-sites-to-trust/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

==========================================

 


Via Gust MEES
more...
No comment yet.
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security

Learning basics of Cyber-Security | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

 

[Beginning Text from www.informationweek.com]

 

Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users. They’re looking for unlocked doors and open windows. The path of least resistance will always be the one most beaten down by bad guys.

There are many other reasons a cybercriminal might target your company and your employees, but the message is the same: ===> No business, no individual is immune. <=== Whether you are Sony or a mom-and-pop shop, you may be a target today. How you respond to that threat could make the difference between being safe and being breached. [End Text from www.informationweek.com]

 

In clear text this means that any private computer could be a target!

 

Learn more, a MUST:

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 


Via Gust MEES
more...
No comment yet.