business analyst
46.1K views | +0 today
Follow
business analyst
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Visual -Security/Your Computer as a possible Cyber-Weapon!?

Visual -Security/Your Computer as a possible Cyber-Weapon!? | business analyst | Scoop.it

.. . For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections.

 

Why a computer could become a possible Cyber-Weapon who is attacking web-sites and perhaps also your Government’s web-sites!

 

Read more:

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security! | business analyst | Scoop.it

Hi, I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security ;)

 

Part5: Not Only Internet-Safety/ALSO IT-Security!

 

Read more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

- http://gustmeesen.wordpress.com

 

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Kaspersky Is Trying to 'Save the World' One PC at a Time

Kaspersky Is Trying to 'Save the World' One PC at a Time | business analyst | Scoop.it
We speak to Eugene Kaspersky and his cyber security team about how a change of thinking is needed to combat cyber crime.

 

Cybercrime is a multi-billion pound industry and some of the malware and viruses being created by these criminal gangs is among some of the most sophisticated software being developed anywhere in the world. This means that that these gangs are willing to pay serious money to software engineers who can create these programs.

 

Read more: http://www.ibtimes.co.uk/articles/335100/20120430/kaspersky-malware-cybercrime-cyber-security-mindset.htm#ixzz1tYVIMVT4

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

New Mac Trojan: Sabpab

New Mac Trojan: Sabpab | business analyst | Scoop.it

A new Trojan known as “Sabpab” could hurt Mac users who run Java and Microsoft Word. Security researchers are warning users to make sure their computers

 

===> have the latest software updates from both Apple and Microsoft, <=== and to use anti-virus software.

 

In some cases, manual removal of Sabpab may be needed.

 

Word about Sabpab comes on the heels of another nasty piece of malware, Flashback, that infected up to as many as 600,000 Macs, security experts said, by exploiting a vulnerability in Java software.

 

Apple last week issued a software-base removal tool for that malware, which can be used by criminals to steal personal information, including passwords.

 

Read more...

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Comment: Botnets – The Dark Side of Cloud Computing

Comment: Botnets – The Dark Side of Cloud Computing | business analyst | Scoop.it
Botnets pose a serious threat to your network, your business, your partners and your customers. Botnets rival the power of today’s most powerful cloud computing platforms, but these “dark” clouds are controlled by cybercriminals.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Why Antivirus Protection Is Key to Computer Security

Why Antivirus Protection Is Key to Computer Security | business analyst | Scoop.it
To go online is to live dangerously. Aside from the risk of viruses, there are also worms and Trojan horses -- all trying to find an unsecured computer upon which to work their mischief.

 

Check out also:

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

- http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Cybersecurity: Building Safer Computing Experiences in a Connected Society

Cybersecurity: Building Safer Computing Experiences in a Connected Society | business analyst | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

 

Cybersecurity will remain a top priority for governments, policymakers and citizens around the world, especially as they continue to increase their reliance on information and communications technologies.


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

4 BYOD Security Strategies For Small Business - Smb - Security

4 BYOD Security Strategies For Small Business - Smb - Security | business analyst | Scoop.it
Whether or not your company embraces the bring-your-own-device approach, don't ignore the data integrity and retention implications of all the personal smartphones and tablets showing up in the workplace.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

McAfee: Most businesses in denial about security threats | ZDNet

McAfee: Most businesses in denial about security threats | ZDNet | business analyst | Scoop.it
McAfee’s State of Security report explains the present challenges to IT departments when it comes to securing sensitive information in a highly...

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Google calls for a more secure web & expands SSL encryption to local domains

Google calls for a more secure web & expands SSL encryption to local domains | business analyst | Scoop.it
Last year, Google introduced SSL (Secure Sockets Layer) encryption to searches made through Google.com. Now, the effort to strengthen user privacy through encrypted search queries is ...

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security Tools
Scoop.it!

Secunia Personal Software Inspector (PSI) 3.0 Beta

Secunia is on a mission to make all PCs safe worldwide. Find out how easy it is by test-driving our new beta version. You can find out more about the beta he...

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Malware Network Threats Rising, How to Defend Yourself | Computerworld New Zealand

Malware Network Threats Rising, How to Defend Yourself | Computerworld New Zealand | business analyst | Scoop.it
In 2011, cybercriminals stepped up their game with the creation of malware networks (malnets)-distributed network infrastructures that exploit popular places on the Internet like search engines and social networking sites to repeatedly launch a variety of malware attacks.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Military Debates Who Should Pull The Trigger For A Cyber Attack

Military Debates Who Should Pull The Trigger For A Cyber Attack | business analyst | Scoop.it
VIRGINIA BEACH, VA: The American military is intrigued by the offensive uses for cyber-warfare, but it is struggling to figure out how to do it.

 

 

Read more:

http://defense.aol.com/2012/05/22/military-debates-who-should-pull-the-trigger-for-a-cyber-attack/

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Microsoft met en garde les utilisateurs de Mac OS X

Microsoft met en garde les utilisateurs de Mac OS X | business analyst | Scoop.it

Microsoft explique avoir analysé le comportement d'un malware ciblant une faille au sein de Microsoft Office pour Mac. 

 

===> « Aucun système d'exploitation sortant des laboratoires est immunisé contre les malwares », conclut ainsi Microsoft même si la vulnérabilité en question se trouve tout de même au sein d'une suite de logiciels développés par ses propres soins. <===

 

Quoi qu'il en soit, l'éditeur conseille aux utilisateurs de Microsoft Office pour Mac 2004/2008 d'activer les mises à jour. Notons que Mac OS X Lion n'est pas concerné par ce malware.

 

La suite sur Clubic.com : Sécurité : Microsoft met en garde les utilisateurs de Mac OS X http://www.clubic.com/antivirus-securite-informatique/actualite-489960-microsoft-office-malware-mac-os.html#ixzz1u1jjCqV3
Informatique et high tech

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Kaspersky Is Trying to 'Save the World' One PC at a Time

Kaspersky Is Trying to 'Save the World' One PC at a Time | business analyst | Scoop.it
We speak to Eugene Kaspersky and his cyber security team about how a change of thinking is needed to combat cyber crime.

 

Cybercrime is a multi-billion pound industry and some of the malware and viruses being created by these criminal gangs is among some of the most sophisticated software being developed anywhere in the world. This means that that these gangs are willing to pay serious money to software engineers who can create these programs.

 

Read more: http://www.ibtimes.co.uk/articles/335100/20120430/kaspersky-malware-cybercrime-cyber-security-mindset.htm#ixzz1tYVIMVT4

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security Tools
Scoop.it!

HTTPS Everywhere | Electronic Frontier Foundation

HTTPS Everywhere | Electronic Frontier Foundation | business analyst | Scoop.it

HTTPS Everywhere is a Firefox and Chrome extension that encrypts your communications with many major websites, making your browsing more secure.


Encrypt the web: Install HTTPS Everywhere today.

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Oxford University: Cyber Security Centre

Oxford University: Cyber Security Centre | business analyst | Scoop.it
Cyber Security Centre...

 

Cyber security is an increasingly important requirement for global business and modern society. We exist in a data-centric world, where information technology and associated communications networks and services pervade every aspect of our lives.

 

This makes the protection of our digital assets and activities in cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex.

 

We are increasingly dependent upon such information and communications infrastructures and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

IBM X-Force: Ahead of the Threat - Overview

IBM X-Force: Ahead of the Threat - Overview | business analyst | Scoop.it
Insights into the Evolving Threat Landscape for Business and IT Leaders...

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Malicious Web Apps: How to Spot Them, How to Beat Them

Malicious Web Apps: How to Spot Them, How to Beat Them | business analyst | Scoop.it
These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for.

 

Tim Keanini, CTO of nCircle, says cyberattackers are talented, creative developers who are motivated to find innovative ways to part you from your money or information.

 

Typically, a malicious Web app is a form of Trojan horse: The app claims to be something else--and it may in fact run some legitimate utility or application--but once you click it, it runs malicious code in the background that may compromise your system or secretly download other malicious payloads from the Internet.

Speaking of Web apps, Camp warns, "While they allow increased functionality within the browser, users should be aware of how deeply into your system they may be able to reach."

 

===> Don't assume that you're safe if you avoid Microsoft Windows. Web apps do frequently target specific vulnerabilities, and Windows is often a primary focus, but Web apps--both benign and malicious--are fundamentally platform-agnostic. <===

 

Gust MEES: check out also my #itsecurity #tutorials (FREE courses) here

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

- http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/

 

 


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Researchers hack into newest Firefox with zero-day flaw

Researchers hack into newest Firefox with zero-day flaw | business analyst | Scoop.it
The exploit was triggered against a use-after-free vulnerability in the open-source browser and successfully evaded DEP and ALSR, two anti-exploit mit...

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Les cinq règles d'or de la sécurité informatique

Les cinq règles d'or de la sécurité informatique | business analyst | Scoop.it
Une association soutenue par la Confédération a édicté cinq mesures avec un but ultime: éviter que vous ne soyez une proie facile pour les virus et les truands informatiques.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

CITE Conference to tackle BYOD issues

CITE Conference to tackle BYOD issues | business analyst | Scoop.it

Bring-your-own-device policies are forcing companies to confront a myriad of IT challenges related to support architecture, security policies and mobile platforms. Dealing with those challenges is topic No.1


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Anatomie d’une attaque informatique des Anonymous

Anatomie d’une attaque informatique des Anonymous | business analyst | Scoop.it
Des chercheurs en sécurité d’Imperva ont décortiqué une attaque échelonnée sur 25 jours lancée en 2011 par les Anonymous.

 

Il ressort que les Anonymous se composent de hackers confirmés, en petit nombre, utilisant des outils conventionnels et de membres techniquement novices pour la phase de DDoS.


Via Gust MEES
No comment yet.