Information #Secu...
Follow
Find
70.6K views | +155 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Scooped by Frederic GOUTH
Scoop.it!

Introduction to VMware Horizon Suite

Introduction to VMware Horizon Suite | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Meet VMware's Horizon Suite, a client for end-user computing (EUC). Discover the Horizon Suite's components, and why you should consider using it.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Android SwiftKey Keyboard turned into a Keylogger app

Android SwiftKey Keyboard turned into a Keylogger app | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Android SwiftKey Keyboard turned into a Keylogger app by an Android developer to demonstrate risk of using pirated apps.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Le Journal des entreprises - Réseaux - Bordeaux Node. Welcome to the real world

Le Journal des entreprises - Réseaux - Bordeaux Node. Welcome to the real world | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Bordeaux Node. Welcome to the real world - Numérique Au sein de l'espace de coworking Bordeaux Node se retrouvent tous les professionnels du digital. Dans une ambiance décontractée et studieuse. Ouvert il a 6 mois, @bxnode est devenu le...
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Open Source Intelligence 5: The Applicable Tools

Open Source Intelligence 5: The Applicable Tools | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
This section of Jeff Bardin’s presentation is about using some of the open source tools out there to look up different types of data on the adversaries.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Open Source Intelligence 3: Retrieving the Target’s Online Activity Traces

Open Source Intelligence 3: Retrieving the Target’s Online Activity Traces | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Based on his actual engagements, Jeff Bardin clarifies some methods for looking up online mentions of a target and recommends a couple of tools for doing that.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Open Source Intelligence by Jeff Bardin

Open Source Intelligence by Jeff Bardin | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Jeff Bardin, the well-known security consultant and intelligence professional, takes the floor at Hacktivity event to talk about open source cyber intelligence.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

LinkedIn sur le point de racheter Pulse

LinkedIn sur le point de racheter Pulse | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Le réseau social professionnel LinkedIn pourrait débourser entre 50 et 100 millions de dollars pour faire l’acquisition de Pulse, un agrégateur de flux RSS disponible sur Android, iOS et le web.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Accord Free Mobile-Orange : l'Autorité de la Concurrence ne veut pas de reconduction après 2018

Accord Free Mobile-Orange : l'Autorité de la Concurrence ne veut pas de reconduction après 2018 | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Saisie par le gouvernement, l'Autorité estime que l'accord présenterait "des risques concurrentiels" au-delà de cette date. Les sages se prononcent également sur l'itinérance dont pourrait profiter Free Mobile pour la 4G.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Biggest password cracking wordlist with millions of words

Biggest password cracking wordlist with millions of words | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
One of the biggest and very comprehensive collection of 1,493,677,782 word for Password cracking list released for download.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Windows Server 2012 – Storage Migration en 9 minutes

Cloud Privé, Infrastructures Windows Server, Conseils pour la sécurité des PC dans l'entreprise, DirectAccess, Forefront TMG, sécurité, security
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Cyber security scenario according to WebSense

Cyber security scenario according to WebSense | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
WebSense has published a new interesting study, 2013 Threat Report, that confirms an extraordinary growth of cyber threats
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

IT (Systems, Networks, Security) All About IT Security, Systems, Networks and Cloud Computing

IT (Systems, Networks, Security) All About IT Security, Systems, Networks and Cloud Computing | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
All About IT Security, Systems, Networks and Cloud Computing
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

How Facebook Prepared to Be Hacked

How Facebook Prepared to Be Hacked | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
The Facebook hack this year through a watering hole attack was bad, but the company had prepared for it through large scale red team exercises.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Open Source Intelligence 6: Data Validation

Open Source Intelligence 6: Data Validation | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Winding up with his keynote at Hacktivity event, Jeff Bardin provides tips on validating the collected data and provides a general summary on the topic.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Open Source Intelligence 4: Know Your Adversary

Open Source Intelligence 4: Know Your Adversary | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Jeff Bardin is now clarifying the different aspects that need to be thoroughly studied about the adversary, including historical, cultural, and religious ones.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Open Source Intelligence 2: Creating and Validating a Sock Puppet

Open Source Intelligence 2: Creating and Validating a Sock Puppet | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Getting to the core of the subject matter, Jeff Bardin describes the process of creating personas and making those trustworthy for optimal assimilation.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

L’état du BOYD aux USA

L’état du BOYD aux USA | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Selon une récente étude américaine, si le Bring Your Own Device (BYOD) est exploité par un grand nombre de sociétés, 15 % d’entre elles n’ont mis en place aucun cadre, démultipliant les risques de sécurité et d’intrusion.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Listing des formulaires pour contacter Google

Listing des formulaires pour contacter Google | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Contacter Google pour signaler un problème, faire une réclamation, signaler un abus, etc... n'est pas toujours chose aisée tellement le nombre de services de Google est important.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Pentagon subdomain Vulnerable to XSS flaw found by Tunisian Cyber Army & AQECA

Pentagon subdomain Vulnerable to XSS flaw found by Tunisian Cyber Army & AQECA | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
Tunisian Cyber Army with Al Qaida Electronic Army (AQECA) have found and exploited a Cross-Site Scripting (XSS) Vulnerability on the official Pentagon subdomain – Army National Guard (https://g1arng.army.pentagon.mil/Pages/Default.aspx) website.
more...
No comment yet.
Scooped by Frederic GOUTH
Scoop.it!

Sudo Local Authentication Bypass Vulnerability when clock is reset

Sudo Local Authentication Bypass Vulnerability when clock is reset | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
A German researcher, Marco Schoepl recently discovered that it is possible for a user to bypass sudo authentication by resetting the clock.
more...
No comment yet.