21st Century Learning and Teaching
585.8K views | +2 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Botnet'. Clear
Scooped by Gust MEES
Scoop.it!

Wie Sie NICHT Teil eines Botnetzes werden | #Botnet #DigitalCitiZENship  #CyberSecurity

Wie Sie NICHT Teil eines Botnetzes werden | #Botnet #DigitalCitiZENship  #CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Zombiecomputer und wie Sie sie vermeiden:

Sie haben wahrscheinlich das Wort Botnetz in letzter Zeit mehr als einmal gehört, und das überrascht kaum. Jedes verbundene Gerät kann zombifiziert werden — und Teil eines Botnetzes werden. Das schließt PCs, Smartphones, Tablets, Router, WLAN-Kühlschränke, Smart Toys und viele andere Geräte ein.

In diesem Post erklären wir, was ein Botnetz ist, was es anrichtet und wie Sie Ihre Geräte davor schützen, Teil eines Botnetzes zu werden.

Botnetze: Was sind sie?

Ein Botnetz ist eine Gruppe von Geräten, die mit dem Internet verbundenen sind und mit einer bestimmten Malware infiziert wurden. Die Art von Malware, die Bots, oder Zombies, erstellt, arbeitet verdeckt, erwirbt Administratorenrechte und übergibt den Cyberkriminellen die Kontrolle, ohne sich zu verraten. Das infizierte Gerät funktioniert wie gewöhnlich – aber es folgt auch gleichzeitig den Anweisungen des Kommandeurs des Botnetzes. Zusammen bilden die infizierten Geräte eine starke Infrastruktur, mit der Cyberverbrechen begangen werden können.

Einige Botnetzkommandeure spezialisieren sich nur auf den Support und die Verbreitung des Botnetzes. Sie vermieten diese schädlichen Tools an andere Kriminelle, die mit ihnen Angriffe und andere kriminale Taten durchführen. Hier sind die vier gängigsten Wege, um ein Botnetz zu verwenden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Botnet

 

https://twitter.com/search?src=typd&q=%23fscd

 

 

Gust MEES's insight:

Zombiecomputer und wie Sie sie vermeiden:

Sie haben wahrscheinlich das Wort Botnetz in letzter Zeit mehr als einmal gehört, und das überrascht kaum. Jedes verbundene Gerät kann zombifiziert werden — und Teil eines Botnetzes werden. Das schließt PCs, Smartphones, Tablets, Router, WLAN-Kühlschränke, Smart Toys und viele andere Geräte ein.

In diesem Post erklären wir, was ein Botnetz ist, was es anrichtet und wie Sie Ihre Geräte davor schützen, Teil eines Botnetzes zu werden.

Botnetze: Was sind sie?

Ein Botnetz ist eine Gruppe von Geräten, die mit dem Internet verbundenen sind und mit einer bestimmten Malware infiziert wurden. Die Art von Malware, die Bots, oder Zombies, erstellt, arbeitet verdeckt, erwirbt Administratorenrechte und übergibt den Cyberkriminellen die Kontrolle, ohne sich zu verraten. Das infizierte Gerät funktioniert wie gewöhnlich – aber es folgt auch gleichzeitig den Anweisungen des Kommandeurs des Botnetzes. Zusammen bilden die infizierten Geräte eine starke Infrastruktur, mit der Cyberverbrechen begangen werden können.

Einige Botnetzkommandeure spezialisieren sich nur auf den Support und die Verbreitung des Botnetzes. Sie vermieten diese schädlichen Tools an andere Kriminelle, die mit ihnen Angriffe und andere kriminale Taten durchführen. Hier sind die vier gängigsten Wege, um ein Botnetz zu verwenden.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Botnet

 

https://twitter.com/search?src=typd&q=%23fscd

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Botnets - Schneier on Security | #CyberSecurity #CyberAttacks #DDoS

Botnets - Schneier on Security | #CyberSecurity #CyberAttacks #DDoS | 21st Century Learning and Teaching | Scoop.it
Botnets
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized systems. Among other things, the hackers used the combined computing power of these botnets to launch distributed denial-of-service attacks, which flood websites with traffic to take them down.

But now the problem is getting worse, thanks to a flood of cheap webcams, digital video recorders, and other gadgets in the "Internet of things." Because these devices typically have little or no security, hackers can take them over with little effort. And that makes it easier than ever to build huge botnets that take down much more than one site at a time.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

Gust MEES's insight:
Botnets
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized systems. Among other things, the hackers used the combined computing power of these botnets to launch distributed denial-of-service attacks, which flood websites with traffic to take them down.

But now the problem is getting worse, thanks to a flood of cheap webcams, digital video recorders, and other gadgets in the "Internet of things." Because these devices typically have little or no security, hackers can take them over with little effort. And that makes it easier than ever to build huge botnets that take down much more than one site at a time.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Botnet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet der Dinge – das größte Botnet aller Zeiten?

Internet der Dinge – das größte Botnet aller Zeiten? | 21st Century Learning and Teaching | Scoop.it
Das Internet der Dinge, also die umfassende Vernetzung von Sensoren aller Art, birgt gravierende Sicherheitsrisiken. So könnte daraus bald das größte Botnetz aller Zeiten entstehen.
Das Internet der Dinge (Internet of Things, IoT) ist derzeit der vermutlich angesagteste Hype in der IT-Welt. Von der umfassenden Vernetzung von Endgeräten aller Art versprechen sich viele Manager neue Geschäftschancen. Nach Schätzungen der Experten von McKinsey führt das Internet der Dinge zu einem wirtschaftlichen Mehrwert von bis zu 1.100 Milliarden Dollar in den kommenden zehn Jahren. Aber wie sieht es mit der Sicherheit aus?

Angriffe über Thingbots: In den vergangenen Jahren gab es bereits mehrere Attacken auf IoT-Sensoren und -Geräte.
(Quelle: Globalsign ) Lea Toms, Regional Marketing Manager bei Globalsign, warnt vor gigantischen Netzwerken aus IoT-Sensoren, die von Angreifern zu Botnetzen verknüpft werden können, um beispielsweise kritische Infrastrukturen anzugreifen oder um Schadsoftware zu verbreiten. Sie nennt diese Netze „Thingbots“: „Je mehr das Internet der Dinge an Bedeutung gewinnt, desto mehr Geräte und Dinge sind potenziell gefährdet, Teil eines Thingbots werden.


Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

Gust MEES's insight:
Das Internet der Dinge, also die umfassende Vernetzung von Sensoren aller Art, birgt gravierende Sicherheitsrisiken. So könnte daraus bald das größte Botnetz aller Zeiten entstehen.
Das Internet der Dinge (Internet of Things, IoT) ist derzeit der vermutlich angesagteste Hype in der IT-Welt. Von der umfassenden Vernetzung von Endgeräten aller Art versprechen sich viele Manager neue Geschäftschancen. Nach Schätzungen der Experten von McKinsey führt das Internet der Dinge zu einem wirtschaftlichen Mehrwert von bis zu 1.100 Milliarden Dollar in den kommenden zehn Jahren. Aber wie sieht es mit der Sicherheit aus?

Angriffe über Thingbots: In den vergangenen Jahren gab es bereits mehrere Attacken auf IoT-Sensoren und -Geräte.
(Quelle: Globalsign ) Lea Toms, Regional Marketing Manager bei Globalsign, warnt vor gigantischen Netzwerken aus IoT-Sensoren, die von Angreifern zu Botnetzen verknüpft werden können, um beispielsweise kritische Infrastrukturen anzugreifen oder um Schadsoftware zu verbreiten. Sie nennt diese Netze „Thingbots“: „Je mehr das Internet der Dinge an Bedeutung gewinnt, desto mehr Geräte und Dinge sind potenziell gefährdet, Teil eines Thingbots werden.


Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center

CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center | 21st Century Learning and Teaching | Scoop.it
CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center


Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center

Infected systems are often part of a botnet which can be controlled remotely by attackers to perform criminal activities like attacking other computers, send malicious emails or perform denial-of-service attack.

My PC is infected and I’m looking for support

If you have a strong suspicion that your machine is infected and you are looking for support to reinstall the system, you can check the PC-doctor list to find a SME to support you.

I received a malicious or suspicious link

Phishing link can be directly tested and reported via the CIRCL urlabuse interface.

I have a security incident in my company

If you have a security incident in your company, you can report it to CIRCL.

Gust MEES's insight:
CIRCL » Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center


Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center

Infected systems are often part of a botnet which can be controlled remotely by attackers to perform criminal activities like attacking other computers, send malicious emails or perform denial-of-service attack.

My PC is infected and I’m looking for support

If you have a strong suspicion that your machine is infected and you are looking for support to reinstall the system, you can check the PC-doctor list to find a SME to support you.

I received a malicious or suspicious link

Phishing link can be directly tested and reported via the CIRCL urlabuse interface.

I have a security incident in my company

If you have a security incident in your company, you can report it to CIRCL.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Massive Qbot Botnet strikes 500,000 Machines Through WordPress

Massive Qbot Botnet strikes 500,000 Machines Through WordPress | 21st Century Learning and Teaching | Scoop.it
Massive Qbot Botnet strikes 500,000 Machines Through WordPress. Attackers steal banking credentials and hire out compromised computers to others
Gust MEES's insight:

Massive Qbot Botnet strikes 500,000 Machines Through WordPress. Attackers steal banking credentials and hire out compromised computers to others.


No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security




Scooped by Gust MEES
Scoop.it!

Hackers turn 162,000 WordPress sites into DDoS attack tools

Hackers turn 162,000 WordPress sites into DDoS attack tools | 21st Century Learning and Teaching | Scoop.it
Legitimate sites forced to aid criminals' illicit botnet operations


Hackers have hijacked more than 162,000 legitimate WordPress sites, connecting them to a criminal botnet and forcing them to mount distributed denial-of-service (DDoS) attacks, according to security firm Sucuri.


Sucuri CTO Daniel Cid said the company uncovered the botnet when analysing an attack targeting one of its customers. Cid said Sucuri managed to trace the source of the attack to legitimate WordPress sites.

"The most interesting part is that all the requests were coming from valid and legitimate WordPress sites. Yes, other WordPress sites were sending random requests at a very large scale and bringing the site down," read the blog.


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


Scooped by Gust MEES
Scoop.it!

For The First Time, Hackers Have Used A Refrigerator To Attack Businesses

For The First Time, Hackers Have Used A Refrigerator To Attack Businesses | 21st Century Learning and Teaching | Scoop.it
Security researchers at Proofpoint have uncovered the very first wide-scale hack attack that involved television sets and at least one refrigerator.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Android botnets on the rise - case study

Android botnets on the rise - case study | 21st Century Learning and Teaching | Scoop.it
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets

 

Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

How to Protect Your WordPress From Attack

How to Protect Your WordPress From Attack | 21st Century Learning and Teaching | Scoop.it
An ongoing brute-force attack on WordPress-based websites has compromised more than 90,000 blogs, but there are simple ways to make sure your blog won't be next to fall.
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=Botnet

 

 
Scooped by Gust MEES
Scoop.it!

Brute Force Attacks Build WordPress Botnet — Krebs on Security

Brute Force Attacks Build WordPress Botnet — Krebs on Security | 21st Century Learning and Teaching | Scoop.it

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

===> Reinstall WordPress from scratch or revert to a known, safe backup. <===


Gust MEES's insight:

 

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

- Reinstall WordPress from scratch or revert to a known, safe backup.


Check also:


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=WordPress


Gust MEES's curator insight, April 13, 2013 9:24 AM

 

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

- Reinstall WordPress from scratch or revert to a known, safe backup.

 

Check also:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=WordPress

 

Scooped by Gust MEES
Scoop.it!

U.S. hosts most botnet command servers worldwide

U.S. hosts most botnet command servers worldwide | 21st Century Learning and Teaching | Scoop.it
The U.S. hosts 631 active commandandcontrol hubs for botnets, according to McAfee.

 

Runner-up hosts included the British Virgin Islands, with 237, and the Netherlands, hosting 154.


Gust MEES's insight:

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Botnet Control Servers Span the Globe - Is Your country in there!?

Botnet Control Servers Span the Globe - Is Your country in there!? | 21st Century Learning and Teaching | Scoop.it

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints and network security appliances sending information to McAfee Global Threat Intelligence (GTI) in the cloud, coupled with a vast collection of malicious binary and proactive research, McAfee Labs has a clear view of botnet threats around the world.

 

Gust MEES's insight:

One sees every time the same countries on TOP of the BAD lists of Cyber-Security!!!

 

===> These countries SHOULD start to Teach the basics of Cyber-Security in Education to make sure that people from other countries will not get touched by malware as Internet doesn't have any borders!!! <===

 

Check ALSO:

 

TOP 20 countries with Malware Resources:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=TOP+20+countries+whit+malware+resources

 

 

 

https://gustmees.wordpress.com/2012/05/28/not-only-rights-but-also-responsibility/

 

https://gustmees.wordpress.com/2013/01/15/safer-internet-day-2013-sid2013-participation/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesfr.wordpress.com/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Botnetze: The Connected Dead | #ICT #CyberSecurity #Botnet #IoT #InternetOfThings 

Botnetze: The Connected Dead | #ICT #CyberSecurity #Botnet #IoT #InternetOfThings  | 21st Century Learning and Teaching | Scoop.it
Botnetze steuern Computer und IoT-Geräte, um einflussreiche Websites vom Netz zu nehmen und online für Chaos zu sorgen. Gehören Ihre Geräte dazu?

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

Gust MEES's insight:
Botnetze steuern Computer und IoT-Geräte, um einflussreiche Websites vom Netz zu nehmen und online für Chaos zu sorgen. Gehören Ihre Geräte dazu?

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What Is DNS and Why Does It Make the Internet Break? | #ICT #CyberSecurity #DDoS #CyberAttacks 

What Is DNS and Why Does It Make the Internet Break? | #ICT #CyberSecurity #DDoS #CyberAttacks  | 21st Century Learning and Teaching | Scoop.it
Today, half of America’s internet shut down when hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s still unclear exactly who carried out the attack and why, but regardless, the event served as a demonstration of how easily large swaths of the web can be wiped out if attacked by determined hackers.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

Gust MEES's insight:
Today, half of America’s internet shut down when hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s still unclear exactly who carried out the attack and why, but regardless, the event served as a demonstration of how easily large swaths of the web can be wiped out if attacked by determined hackers.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Simda botnet taken down in global operation

Simda botnet taken down in global operation | 21st Century Learning and Teaching | Scoop.it

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet





Gust MEES's insight:

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet



Gust MEES's curator insight, April 13, 2015 8:17 AM

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Scooped by Gust MEES
Scoop.it!

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills

So schützen Sie sich effektiv gegen Botnetze | CyberSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/



Gust MEES's insight:
Deutsche PC-Nutzer sind ein beliebtes Ziel von Botnetz-Betreibern. Haben Sie wirklich noch die Kontrolle über Ihren PC?


Botnetze werden oft über zentrale Kommando-Server, auch als Mutterschiffe bezeichnet, gesteuert. Die infizierten Rechner, Zombies genannt, halten Kontakt mit einem der Mutterschiffe oder untereinander. Sie geben ausgespähte Daten wie etwa Passwörter für Online-Spiele und Banken-Websites, aber auch gesammelte Mail-Adressen oder Kreditkartendaten weiter. Sie erhalten vom Mutterschiff, teils über zwischen geschaltete Relay-Rechner (Repeater), Instruktionen, etwa Adressen und Inhalte von zu versendenden Spam-Mails.


Learn more / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Botnets: What are They, and How can You Protect Your Computer?

Botnets: What are They, and How can You Protect Your Computer? | 21st Century Learning and Teaching | Scoop.it
The average computer user tends to look blank if the word "botnet" is said. So, here's a summary of what botnets are and how to secure your information.


Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:
The average computer user tends to look blank if the word "botnet" is said. So, here's a summary of what botnets are and how to secure your information.


Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No.

On NSA Hijacking of IRC Bots - F-Secure Weblog : Hijacking a botnet. Is it ethical? No. | 21st Century Learning and Teaching | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Le réseau Tor, utilisé pour cacher botnets et darknets

Le réseau Tor, utilisé pour cacher botnets et darknets | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:


En savoir plus :


- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | 21st Century Learning and Teaching | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet

 

http://gustmees.wordpress.com/

 

 

Scooped by Gust MEES
Scoop.it!

Botnets now target enterprise apps

Botnets now target enterprise apps | 21st Century Learning and Teaching | Scoop.it
Instead of being used as spam during DDoS attacks, botnets are now used to bring down enterprise apps, leaving the more connected countries more vulnerable, according to Barracuda Networks.
Gust MEES's insight:

 

A MUST READ!!!

 

IT managers should not only guard against older forms of attacks but newer forms, as the variety of attack methods continue to expand...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet


 

Gust MEES's curator insight, June 21, 2013 6:17 AM

 

A MUST READ!!!

 

IT managers should not only guard against older forms of attacks but newer forms, as the variety of attack methods continue to expand...

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Botnet

 

Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

WordPress - Brute Force Attacks and Their Consequences

WordPress - Brute Force Attacks and Their Consequences | 21st Century Learning and Teaching | Scoop.it
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security

 

Gust MEES's insight:

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security

 

A MUST read to understand the WHY and HOW!!!

 
Gust MEES's curator insight, April 13, 2013 9:51 AM

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security


A MUST read to understand the WHY and HOW!!!


Scooped by Gust MEES
Scoop.it!

Nearly two-thirds of organizations are already infected with bots

Nearly two-thirds of organizations are already infected with bots | 21st Century Learning and Teaching | Scoop.it
70% of those infections communicate with their C&C servers at least once every two hours, and more than half of organizations across the globe have had malware downloaded onto their networks via these bots.
Gust MEES's insight:

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Microsoft et Symantec ferment un botnet touchant 8 millions de PC

Microsoft et Symantec ferment un botnet touchant 8 millions de PC | 21st Century Learning and Teaching | Scoop.it

Microsoft annonce avoir fermé un nouveau botnet en collaboration avec Symantec et affectant les requêtes des internautes sur les moteurs de recherche. 

 


Sur l'un de ses blogs officiels, Microsoft explique que le botnet en question, Bamital, était constitué d'environ huit millions d'ordinateurs zombies. Ces derniers étaient infectés d'un malware modifiant les liens cibles au sein des moteurs de recherche. Ce click jacking était opéré sur Google, Bing et Yahoo! ainsi que sur leurs plateformes publicitaires.


Gust MEES's insight:

Microsoft et Symantec ferment un botnet touchant 8 millions de PC


Gust MEES's curator insight, February 7, 2013 8:01 AM

Microsoft et Symantec ferment un botnet touchant 8 millions de PC