Sécurité informatique et cyber-criminalité
437 views | +0 today
Follow
Sécurité informatique et cyber-criminalité
L'actualité en Sécurité informatique à ne pas manquer.
Curated by ITrust
Your new post is loading...
Your new post is loading...
Scooped by ITrust
Scoop.it!

Biggest Threats Come From Inside The Enterprise, Survey Says

Biggest Threats Come From Inside The Enterprise, Survey Says | Sécurité informatique et cyber-criminalité | Scoop.it
Lack of network visibility, insider threats are top worries in survey of security pros...
more...
No comment yet.
Scooped by ITrust
Scoop.it!

Smartphones are still firmly 'enterprise-unready'

Smartphones are still firmly 'enterprise-unready' | Sécurité informatique et cyber-criminalité | Scoop.it
Research from by Altimeter Group, Bloor Research and Trend Micro shows that the ‘consumer marketing’ legacy of many smartphones makes them ill-equipped to meet enterprise security demands.
more...
No comment yet.
Scooped by ITrust
Scoop.it!

US government learning how to hack video game consoles

US government learning how to hack video game consoles | Sécurité informatique et cyber-criminalité | Scoop.it

The US Department of Homeland Security is out to hack video game consoles, such as Xboxes, Wiis and PlayStations.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Privacy concerns after Instagram's acquisition by Facebook

Privacy concerns after Instagram's acquisition by Facebook | Sécurité informatique et cyber-criminalité | Scoop.it

Some Instagram users are upset about the acquisition by Facebook - but are they right to complain about what happens to their uploaded photographs?

more...
No comment yet.
Scooped by ITrust
Scoop.it!

How Much Money Do You Need To Lose Before You Start Monitoring?

How Much Money Do You Need To Lose Before You Start Monitoring? | Sécurité informatique et cyber-criminalité | Scoop.it

At what point does turning a blind eye to the loss of revenue spark the inevitable conversation: 'Maybe we should be monitoring this infrastructure more closely?


A new blog post by Brian Krebs states that the FBI has released a cyberintelligence bulletin claiming that a series of hacks perpetrated against smart-meter installations over the past several years may cost a Puerto Rican electric utility upward of $400 million annually.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Facebook logins vulnerable on Apple and Android devices

Facebook logins vulnerable on Apple and Android devices | Sécurité informatique et cyber-criminalité | Scoop.it
Facebook login credentials are easily obtained from Apple and Android mobile devices because they are not encrypted and left in a temporary folder accessible to other applications or USB connections.
more...
No comment yet.
Scooped by ITrust
Scoop.it!

How Google Tests Software

How Google Tests Software | Sécurité informatique et cyber-criminalité | Scoop.it

Testing expert James Whittaker, a former Google testing leader, and two top Google experts reveal exactly how Google tests software, offering best practices you can use.


How Google Test Sofwarewill enable you to:

  • Discover practical, scalable techniques for analyzing risk and planning tests
  • Implementing exploratory, black box, white box, and acceptance testing
  • Getting usable feedbackTracking issuesChoosing and creating tools
  • Testing “Docs & Mocks,” interfaces, classes, modules, libraries, binaries, services, and infrastructure
  • Reviewing code and refactoring
  • Using test hooks, presubmit scripts, queues, continuous builds, and more.
more...
No comment yet.
Scooped by ITrust
Scoop.it!

23-year-old hacker accessed 200,000 PayPal accounts

According to a report on the Mail Online, a 23-year-old hacker by the name of Edward Pearson from York, UK, used trojans to access approximately 200,000 PayPal accounts. After his arrest, investigators reportedly also found 2,701 credit and debit card details, and the personal data of 8,110,474 UK citizens.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Anonymous : des centaines de sites du gouvernement chinois piratés

Anonymous : des centaines de sites du gouvernement chinois piratés | Sécurité informatique et cyber-criminalité | Scoop.it
Les Anonymous seraient actuellement très actifs en Chine où ils défaceraient de nombreux sites appartenant aux autorités chinoises.

...

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Sur les traces du smartphone perdu

Sur les traces du smartphone perdu | Sécurité informatique et cyber-criminalité | Scoop.it

Que devient un smartphone, dénué de tout système de sécurité, oublié en pleine jungle urbaine ? Ce sont les questions auxquelles ont tenté de répondre les experts de Symantec au travers du projet "Smartphone Honey Stick".


Associés à la société Perspective Inc., les chercheurs de Symantec ont eu la (mauvaise ?) idée d'abandonner volontairement 50 smartphones au coeur de cinq grandes villes nord-américaines : New-York, Washington, Los Angeles, San Francisco (Etats-Unis) et Ottawa (Canada).

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Adobe offers malware classification tool for 'quick malware triage'

Adobe offers malware classification tool for 'quick malware triage' | Sécurité informatique et cyber-criminalité | Scoop.it
Adobe has released a free tool that helps IT administrators classify suspicious files as malicious or benign using machine-learning algorithms.
more...
No comment yet.
Scooped by ITrust
Scoop.it!

'Procure Secure': a new guide for monitoring cloud computing contracts

'Procure Secure': a new guide for monitoring cloud computing contracts | Sécurité informatique et cyber-criminalité | Scoop.it
A 2011 ENISA survey demonstrated that many cloud customers do not regularly monitor their information security and concluded that customers only “find out about failing security measures when it is already too late.” This new report, 'Procure...
more...
No comment yet.
Scooped by ITrust
Scoop.it!

Infosecurity - For online piracy, 'three strikes' works, says HADOPI

Infosecurity - For online piracy, 'three strikes' works, says HADOPI | Sécurité informatique et cyber-criminalité | Scoop.it
HADOPI says ‘three strikes’ laws work; but they don’t increase entertainment industry profits points out TorrentFreak. Can piracy actually increase legal sales?
more...
No comment yet.
Scooped by ITrust
Scoop.it!

Cheval de Troie Flashback : Apple prépare la riposte

Cheval de Troie Flashback : Apple prépare la riposte | Sécurité informatique et cyber-criminalité | Scoop.it

Face à la propagation de Flashback, Apple a fait savoir qu’il proposerait un outil de détection et de suppression du cheval de Troie. Aucune date n’est précisée.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Are Macs safer than PCs?

Are Macs safer than PCs? | Sécurité informatique et cyber-criminalité | Scoop.it

Apple has traditionally marketed its systems as being more secure than those running Microsoft Windows, but just how true is that?

more...
No comment yet.
Scooped by ITrust
Scoop.it!

SQL injection tops SMB database security concerns

SQL injection tops SMB database security concerns | Sécurité informatique et cyber-criminalité | Scoop.it

More than half of small and medium-sized businesses (SMBs) are most concerned about SQL injection attacks against their databases, according to a survey of 6,000 SMBs users of GreenSQL’s database security product.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Anonymous attacks UK Prime Minister and Home Office websites with DDoS assault

Anonymous attacks UK Prime Minister and Home Office websites with DDoS assault | Sécurité informatique et cyber-criminalité | Scoop.it

Anonymous hacktivists have launched a distributed denial-of-service attack against the British government's Home Office website, preventing legitimate users from visiting the site by flooding it with unwanted internet traffic.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Free malware scanning and blacklist monitoring for websites

Free malware scanning and blacklist monitoring for websites | Sécurité informatique et cyber-criminalité | Scoop.it

Comodo released SiteInspector, a free malware scanning and blacklist monitoring for websites. The free service allows website owners to set up recurring, daily checks on any 3 pages of a domain.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

FlashBack : le cheval de Troie qui a touché 600.000 Mac

FlashBack : le cheval de Troie qui a touché 600.000 Mac | Sécurité informatique et cyber-criminalité | Scoop.it
Un éditeur de sécurité russe estime à 600 000 le nombre de machines d’Apple infectées par le Trojan.
more...
No comment yet.
Scooped by ITrust
Scoop.it!

Tracking And Measuring Cloud Providers' Security Performance

Is your cloud provider meeting its promises for security?


The move to cloud computing services is a big one for most IT organizations. But nowhere is the change more profound than in security, where the use of cloud services introduces a whole new array of questions and concerns.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

1,5 million de cartes bancaires compromises

1,5 million de cartes bancaires compromises | Sécurité informatique et cyber-criminalité | Scoop.it

Après une intrusion dans le système informatique d'un de ses intermédiaires de paiement, Global Payments, 1,5 million de numéros de cartes bancaires ont été dérobés.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Les étonnantes fuites de la carte bancaire sans contact

Les étonnantes fuites de la carte bancaire sans contact | Sécurité informatique et cyber-criminalité | Scoop.it

Alors que les cartes bancaires sans contact s’apprêtent à débarquer en masse dans nos porte-feuilles, un membre de l’Association des Réservistes du Chiffre et de la Sécurité de l’Information (ARCSI) s’est intéressé à la technologie sans contact qu’elles embarquent. Bilan : ces cartes sont très bavardes et particulièrement simples à faire parler ! Les échanges sans contact ne sont en effet ni chiffrés ni authentifiés.


A l’occasion des GS Days 2012, Renaud Lifchitz a ainsi démontré comment il est parvenu à « faire parler » sa propre carte Visa sans contact à l’aide d’un lecteur NFC USB vendu par correspondance pour une quarantaine d’euros, et d’un peu de développement propriétaire (c’est le plus compliqué !)

more...
No comment yet.
Scooped by ITrust
Scoop.it!

Top concern? Mobile device vulnerability management

Top concern? Mobile device vulnerability management | Sécurité informatique et cyber-criminalité | Scoop.it

Mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months, according to Tenable Network Security.


According to the study, nearly 70 percent of attendees surveyed at the RSA Conference 2012 said mobile device vulnerability management is ‘very important’ when compared with other security initiatives.

more...
No comment yet.
Scooped by ITrust
Scoop.it!

L'homme du milieu, une grande famille !

L'homme du milieu, une grande famille ! | Sécurité informatique et cyber-criminalité | Scoop.it
Les attaques de type MITM (homme du milieu) ont été très largement popularisées au travers des technologies de niveau 2 qui permettent de réaliser facilement une interception de conversation en téléphonie sur IP si les mesures de bases n‘ont pas...
more...
No comment yet.
Scooped by ITrust
Scoop.it!

New Ice malware attacking Facebook users

New Ice malware attacking Facebook users | Sécurité informatique et cyber-criminalité | Scoop.it

Trusteer researchers have discovered a new configuration of the Ice IX malware that attacks Facebook users after they have logged in to their account and steals credit card and other personal information. Trusteer even discovered a marketing video used by the creators of the malware to demonstrate how the web injection works.


The global reach and scale of the Facebook service has made it a favorite target of fraudsters. Trusteer recently wrote about criminals stealing e-cash vouchers from Facebook users and selling bulk Facebook login credentials.

more...
No comment yet.