Ciberseguridad + ...
Follow
Find tag "Learning basics of Cyber-Security"
14.9K views | +0 today
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from ICT Security Tools
Scoop.it!

2013 Vulnerability assessment tools

2013 Vulnerability assessment tools | Ciberseguridad + Inteligencia | Scoop.it
The SC Labs team reported on the strengths and weaknesses of some of the leading vulnerability assessment tools on the market.

Via Gust MEES
more...
Gust MEES's curator insight, February 13, 2013 4:27 PM

A great list of great tools...

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Unintended, malicious and evil applications of augmented reality

Unintended, malicious and evil applications of augmented reality | Ciberseguridad + Inteligencia | Scoop.it

Products have substantial flaws, technology designers seek ways to extract money from users, and many users twist well intentioned technology in ways the designers never expected, often involving baser instincts. These realities should come as no surprise to security professionals who are usually most effective when assuming the worst in people. One sure to be abused emerging technology is augmented reality.

 

Augmented reality technologies overlay computer generated data on a live view of the real world. Anticipated application domains include entertainment, travel, education, collaboration, and law enforcement, among numerous others.

 


Via Gust MEES
more...
Gust MEES's curator insight, February 12, 2013 10:11 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

 

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, February 12, 2013 10:17 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

Learn more:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, February 12, 2013 10:18 AM

This had to come, I was wondering that it didn't show up earlier! Any device and software program application who connects to the Internet is vulnerable and will get misused one day by the bad guys!!!

Stay protected with updated protection software and update also all your other installed programs on your devices as well as you SHOULD update your browsers!!!

Learn more:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple blocks Java on Macs due to vulnerabilities

Apple blocks Java on Macs due to vulnerabilities | Ciberseguridad + Inteligencia | Scoop.it
NEW YORK (AP) — Some Mac users were taken by surprise Thursday as their computers stopped running programs written using the Java programming language after Apple blocked Java due to security problems.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

New BackDoor.Butirat generates names of control servers

New BackDoor.Butirat generates names of control servers | Ciberseguridad + Inteligencia | Scoop.it
Russian anti-virus company Doctor Web is warning users that a new backdoor has been found in large numbers in the wild.

Via Gust MEES
more...
Gust MEES's curator insight, January 29, 2013 6:45 PM

             ===> BEWARE of the MALWARE!!! <===

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Pentagon to boost cyber-security force

Pentagon to boost cyber-security force | Ciberseguridad + Inteligencia | Scoop.it
Pentagon to boost cyber-security force: The Pentagon plans to assign significantly more personnel in coming
years to counter increasing thr...

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from Free Tutorials in EN, FR, DE
Scoop.it!

Twitter Help Center | My Account Has Been Compromised

Twitter Help Center | My Account Has Been Compromised | Ciberseguridad + Inteligencia | Scoop.it
Twitter is without a doubt the best way to share and discover what is happening right now.

 

If your account has been compromised but you're still able to log in, this page will help you secure your account and stop unwanted behaviors. If you can't log in to your account, please see thistroubleshooting article.

Has my account been compromised? Read more in article... 


Via Gust MEES
more...
Gust MEES's curator insight, January 27, 2013 7:13 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

 

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

 

Learn more:

 

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 27, 2013 7:16 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

 

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

 

Learn more:

 

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | Ciberseguridad + Inteligencia | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.


Via Gust MEES
more...
Gust MEES's curator insight, January 22, 2013 11:52 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:54 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: The Kingdom of Fraud-CyberCrime

Infographic: The Kingdom of Fraud-CyberCrime | Ciberseguridad + Inteligencia | Scoop.it
GOOD Infographic: The Kingdom of Fraud - The State of Global Economic Crime

Via Gust MEES
more...
Gust MEES's curator insight, January 16, 2013 2:42 AM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!

 

Gust MEES's curator insight, January 16, 2013 2:47 AM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!


Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple blacklists Java on OS X to prevent latest “critical” exploits

Apple blacklists Java on OS X to prevent latest “critical” exploits | Ciberseguridad + Inteligencia | Scoop.it
Apple's automated system is allowing for a fast response to malware threats.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Operating System Infection Rates: Application Vulnerabilities & Exploits Trend Up, Increase OS Infection Rates

Operating System Infection Rates: Application Vulnerabilities & Exploits Trend Up, Increase OS Infection Rates | Ciberseguridad + Inteligencia | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

Via Gust MEES
more...
Gust MEES's curator insight, January 7, 2013 5:45 PM

                       

                      ===> Be AWARE of the MALWARE!!! <===

 

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Participate in the Safer Online Teen Challenge

Participate in the Safer Online Teen Challenge | Ciberseguridad + Inteligencia | Scoop.it

Participate in the Safer Online Teen Challenge

If you are age 13 through 18* then you probably do a lot online—schoolwork, texting, gaming, updating your wall, downloading music, and much more. You probably also know there are safety risks to being online.

Do you want to learn how to stay safer online and also help educate others? Then the Safer Online Teen Challenge is for you! If you are up for it, follow these three steps.

Step 1: Start with online safety advice from Microsoft, selecting a topic of interest.

Step 2: Unleash your creativity in any (or all) of the five categories below, sharing your online safety voice with others.

Stage a skit or presentationProduce a videoWrite a story or draw a cartoonCompose a songConduct a survey

Step 3: You may submit an unlimited number of entries. We must receive all submissions no later than 5:00 p.m. Pacific Time on April 12, 2013.


Via Gust MEES
more...
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes | Ciberseguridad + Inteligencia | Scoop.it
A screenshot of the fraudulent installer asking for a Mac user's phone number.

Time for Apple users to heed a lesson Windows users have long learned the hard way: Don’t hand out your cell phone number to untrusted applications downloaded from the Web.

On Tuesday, Russian antivirus firm Doctor Web reported the appearance of a new strain of Mac-focused malware that queries users for their cellphone number when they try to install a piece of legitimate software. If the user enters a phone number, he or she receives a text message asking for a reply with a registration code. Responding implicitly signs up the user for a series of recurring mobile charges to their carrier’s account.

Read more, a MUST:
http://www.forbes.com/sites/andygreenberg/2012/12/12/new-mac-malware-scams-users-into-signing-up-for-cellphone-charges/?utm_campaign=techtwittersf&amp;utm_source=twitter&amp;utm_medium=social

Via Gust MEES
more...
Gust MEES's curator insight, December 12, 2012 7:06 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;)

 


Gust MEES's curator insight, December 12, 2012 7:10 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;) 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Kaspersky Security Bulletin 2012. Malware Evolution

Kaspersky Security Bulletin 2012. Malware Evolution | Ciberseguridad + Inteligencia | Scoop.it
This is Kaspersky Lab’s annual threat analysis report covering the major issues faced by corporate and individual users alike as a result of malware, potentially harmful programs, crimeware, spam, phishing and other different types of hacker activity.

 

The report has been prepared by the Global Research & Analysis Team (GReAT) in conjunction with Kaspersky Lab’s Content & Cloud Technology Research and Anti-Malware Research divisions.

 

Read more, a MUST:

http://www.securelist.com/en/analysis/204792254/Kaspersky_Security_Bulletin_2012_Malware_Evolution

 


Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security Tools
Scoop.it!

How to fix the UPnP security holes

How to fix the UPnP security holes | Ciberseguridad + Inteligencia | Scoop.it
Universal Plug and Play has always had security holes. Here's how to plug them.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security Tools
Scoop.it!

OpenVPN - Open Source VPN

OpenVPN - Open Source VPN | Ciberseguridad + Inteligencia | Scoop.it
OpenVPN - The Open Source VPN

Via Gust MEES
more...
Gust MEES's curator insight, February 3, 2013 6:30 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...

A MUST have for a secure Internet connection!

 

Gust MEES's curator insight, February 3, 2013 6:33 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Gust MEES's curator insight, February 3, 2013 6:35 PM

Accessible for PC, MAC, ANDROID, iPHONE, iPAD...
A MUST have for a secure Internet connection!


Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infosecurity Europe is Europe’s number one Information Security event

Infosecurity Europe is Europe’s number one Information Security event | Ciberseguridad + Inteligencia | Scoop.it

Infosecurity Europe is Europe’s number one Information Security event.  Featuring over 350 exhibitors, the most diverse range of new products and services,

 

              ===> an unrivalled education programme

 

and over 12,400 unique visitors from every segment of the industry, it is the most important date in the calendar for Information Security professionals across Europe. 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, January 31, 2013 6:52 PM

 

Critical Thinking:

 

When someone connects to the Internet (s)he needs (he doesn't see it BTW) to connect trough  different other service located in the US and somewhere else before (s)he gets his Internet connection (right!?), SO (s)he needs to pass through a lot of different services...

 

When searching a website on Internet one mostly finds some located in countries where "Security" isn't really taken that serious and one risks an infection of the connected device (right!?) when connecting device (computer, anyOs, SmartPhone, tablet, BYOD)!

 

Here is a list of the countries who host the most Malware on a global view:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=TOP+20+countries+whit+malware+resources

 

 

I would wish to see the Day that when someone connects to the Internet I would see ===> YOUR visited website, blog (or other...) is secure! (without a Third Party Program!) Even if my connecting device would NOT be protected, in this case I would like to see displayed ===> YOUR connecting device is NOT protected! We suggest to YOU to check the following... to make it protected! <===

 

That would be what the Internet in 21st Century MUST be!

 

 

 

 

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Le « cybercrime », un butin de 83 milliards d'euros

Le « cybercrime », un butin de 83 milliards d'euros | Ciberseguridad + Inteligencia | Scoop.it

 

===> Selon Symantec, 556 millions de personnes ont été les proies d'une arnaque sur Internet en 2012 à travers le monde ! <===

 

Les crimes et carambouilles éclaboussant Internet prennent des reliefs singuliers, qui n'ont rien de virtuel. Selon un état des lieux établi par la société américaine Symantec, 556 millions de personnes ont été les proies d'une arnaque en 2012 à travers le monde, pour un butin global de 83 milliards d'euros.

 

===> Soit 18 victimes par seconde. <===

 

Actuellement, les experts dénombrent plus de 100 millions de programmes malveillants, dont 95.000 nouveaux venus par jour.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

DHS Secretary Warns of Potential Cyber Attacks - cyber 9/11

DHS Secretary Warns of Potential Cyber Attacks - cyber 9/11 | Ciberseguridad + Inteligencia | Scoop.it
DHS secretary Janet Napolitano says that there is an urgent need for better cybersecurity legislation to avoid a cyber 9/11.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

Twitter Help Center | Keeping Your Account Secure

Twitter Help Center | Keeping Your Account Secure | Ciberseguridad + Inteligencia | Scoop.it
Twitter is without a doubt the best way to share and discover what is happening right now.

 

 

 

 

We want Twitter to be a safe and open community. This help page provides some information and tips to help you practice safe Tweeting and keep your account secure.

 

Here are some basics:

 

- Use a strong password.

 

- Watch out for suspicious links, and always make sure you’re on Twitter.com before you enter your login information.

 

- Don't give your username and password out to untrusted third-parties, especially those promising to get you followers or make you money.

 

- Make sure your computer and operating system is up-to-date with the most recent patches, upgrades, and anti-virus software.

 


Via Gust MEES
more...
Gust MEES's curator insight, January 27, 2013 6:58 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

 

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

 

Learn more:

 

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 27, 2013 7:06 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

Learn more:

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

It's Time to Abandon Java | threatpost

It's Time to Abandon Java | threatpost | Ciberseguridad + Inteligencia | Scoop.it
The security vulnerabilities in Java make it difficult for users to continue using the browser plugin. Security researchers say it's time to get rid of Java altogether and only use it when it's absolutely required.

 

===> In the face of that kind of threat, the most rational course of action is to simply eliminate the target, and that means it's time to abandon Java for good. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, January 21, 2013 3:46 PM

===> In the face of that kind of threat, the most rational course of action is to simply eliminate the target, and that means it's time to abandon Java for good. <===

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: Underground Economy and Cyber Crime - Exposed

Infographic: Underground Economy and Cyber Crime - Exposed | Ciberseguridad + Inteligencia | Scoop.it
Get Cyber Safe Blog

Via Gust MEES
more...
Gust MEES's curator insight, January 14, 2013 3:44 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 14, 2013 3:50 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Security in 2013: The rise of mobile malware and fall of hacktivism | PCWorld

Security in 2013: The rise of mobile malware and fall of hacktivism | PCWorld | Ciberseguridad + Inteligencia | Scoop.it
McAfee makes some predictions about what to expect and trends to watch for security in 2013.

Via Gust MEES
more...
Gust MEES's curator insight, January 10, 2013 4:09 PM

                       ===> Be AWARE of the MALWARE! <===

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

New Laws: Is it Really Up to the Government to Protect Your Kid Online?

New Laws: Is it Really Up to the Government to Protect Your Kid Online? | Ciberseguridad + Inteligencia | Scoop.it

A focus on child safety is among the top state laws taking effect at the start of 2013. In many states, new laws take effect on Jan. 1, 2013

 

Now It’s Your Turn

 

With all this new legislation, it should be a reminder that if the government is concerned about the safety of your kids online, you should be concerned too.

 

===> It is ultimately the parents’ responsibility to protect their children both off line and online. <===

 


Via Gust MEES
more...
Breanne Hemann's comment, April 12, 2014 10:12 PM
I agree that some measures are needed to protect children from the harms that can come with the internet. However, I do believe there is only so much that the government can do before it begins to affect citizens freedom. How will these new laws affect internet users? Will it be a positive move on the governments part?
Lauren Heim's curator insight, May 7, 2014 10:58 PM

I think this is a good and bad idea. I think it's by far an invasion of privacy but i also believe that it will save a lot of lives and that overrules invasion of privacy. So it's probably not a bad idea considering cyber bullying has only gotten worse.  

Abigail Beinborn's comment, May 8, 2014 1:28 PM
I agree that this is a good idea for the government to keep children safe on the internet. People are becoming more violent and violating a lot of people's personal business on the internet. I believe that the internet is becoming more unsafe.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives | Ciberseguridad + Inteligencia | Scoop.it
October 23, 2009

"Evil Maid" Attacks on Encrypted Hard Drives
Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this:

Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down.

Step 2: You boot your computer using the attacker's hacked bootloader, entering your encryption key. Once the disk is unlocked, the hacked bootloader does its mischief. It might install malware to capture the key and send it over the Internet somewhere, or store it in some location on the disk to be retrieved later, or whatever.

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

First fake-installer Trojan for Mac OS

First fake-installer Trojan for Mac OS | Ciberseguridad + Inteligencia | Scoop.it
Russian anti-virus company Doctor Web informs users about a new Trojan for Mac OS X dubbed Trojan.SMSSend.3666.

Via Gust MEES
more...
No comment yet.