Information #Secu...
Follow
Find tag "BYOD"
46.4K views | +138 today
Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence
All About #CyberSecurity #CyberSécurité #CyberDefence #InfoSec
Curated by Frederic GOUTH
Your new post is loading...
Your new post is loading...
Rescooped by Frederic GOUTH from Actualités Cybersécurité - Innovations digitales et numériques
Scoop.it!

Byod et sécurité, les régles ne sont pas suivies par tous

Byod et sécurité, les régles ne sont pas suivies par tous | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

La génération Y fait de la transgression des politiques de sécurité relatives au byod une habitude.


Via Stéphane NEREAU
more...
Stéphane NEREAU's curator insight, October 23, 2013 4:31 AM

Les technologies « wearable » (se portant comme un vêtement, telles que les Google Glass) devraient se diffuser rapidement pour la majorité des répondants. 16% des répondants (11% en France) pensent les adopter dès que possible, 33% (26% en France) quand les prix baisseront.

Les usages professionnels des outils personnels n'est finalement que peu freinés par les incidents de sécurité. 55% des répondants estiment avoir eu leur ordinateur victime d'une attaque (45% en France) mais 19% seulement estiment que leur smartphone a été attaqué (16% en France). 14% au niveau mondial (18% en France) refuseraient d'avouer à leur employeur une compromission de données professionnelles sur un terminal personnel.

Jean-Luc KRIEGEL's curator insight, October 24, 2013 1:11 AM

Byod et sécurité, les régles ne sont pas suivies par tous

Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 5:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 7:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 8:41 PM

Interesting BYOD stats.

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
INFOGRAPHIC: Mobile Threat in Action

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 


Via Gust MEES
more...
Francoise Rieffel's curator insight, August 7, 2013 3:19 AM

add your insight...

 

 

 

Rescooped by Frederic GOUTH from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Chaos Computer Club breaks Apple TouchID

Chaos Computer Club breaks Apple TouchID | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.


Via Gust MEES
more...
Gust MEES's curator insight, September 22, 2013 1:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 1:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Frederic GOUTH from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Frederic GOUTH from ICT Security-Sécurité PC et Internet
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | Information #Security #InfoSec #CyberSecurity #CyberSécurité #CyberDefence | Scoop.it

Via Gust MEES
more...
No comment yet.