#Security #InfoSe...
Follow
Find tag "Apple-Insecurity"
81.5K views | +24 today
#Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence
All About #Security #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

The evolution of OS X #malware.

The evolution of OS X #malware. | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about security, which means there are plenty of opportunities – for those blackhatters who are willing to put in the work.


Third: professional espionage groups have really taken to exploiting OS X. Many APT attacks in the last few years acquired Mac-modules, for example CaretoIcefog, and the targeted attacks against Uyghur activists. Yes, here we’re talking pinpointed –exclusive as opposed to mass – attacks, aimed at specially chosen victims; this is why they don’t figure in the top-20. Not that they are any less dangerous; especially if your data may be interesting to intelligence agencies.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Gust MEES
more...
Gust MEES's curator insight, September 29, 2014 9:34 AM
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about secu


Gust MEES's curator insight, September 29, 2014 9:38 AM

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Quran Coaching's curator insight, October 1, 2014 3:22 AM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Rescooped by Frederic GOUTH from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Chaos Computer Club breaks Apple TouchID

Chaos Computer Club breaks Apple TouchID | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.


Via Gust MEES
more...
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Frederic GOUTH from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds

Anatomy of a cryptoglitch - Apple's iOS hotspot passphrases crackable in 50 seconds | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
If you use your iPhone or iPad as a Wi-Fi hotspot, don't let it generate the passphrase for you.

A posse of German computer scientists has found that Apple's iOS passphrase generator may give yo...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn't have to get their p...

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

#Hackers target #Apple #Mac OS X with 25 #malware variants

#Hackers target #Apple #Mac OS X with 25 #malware variants | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Via Gust MEES
more...
Gust MEES's curator insight, September 9, 2014 10:12 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, September 9, 2014 10:16 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

7 Cybersecurity Myths Busted [Infographic]

7 Cybersecurity Myths Busted [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Hacking lessons learned: how to cover your digital ass [Infographic]

Hacking lessons learned: how to cover your digital ass [Infographic] | #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence | Scoop.it
Mat Honan got owned last year and it sucked, but you can still learn his lesson.

Via Gust MEES
more...
Gust MEES's curator insight, April 12, 2013 8:06 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, April 12, 2013 8:07 AM

 

A MUST read!!!

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Check ALSO:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Dico Krommenhoek's curator insight, April 14, 2013 2:50 PM

Naast geinige kanten kent ICT zoals bekend ook nare randjes. Alleen normaal doen, helpt niet altijd. Gust Mees is een autoriteit op het gebied van digitale veiligheid. Mooie infographic collectiecollectie