E-Learning-Inclusivo (Mashup)
1.1M views | +10 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Future attacks: Hiding exploit code in images | CyberSecurity | Stegosploit | imajs

Future attacks: Hiding exploit code in images | CyberSecurity | Stegosploit | imajs | E-Learning-Inclusivo (Mashup) | Scoop.it

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it?

Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.


He is not the first one to try and hide exploits in images. But he created Stegosploit, a technology that lets attackers deliver executable JavaScript code via images, and trigger them, too.

The technology opens the door for attacks executed as simply as pointing users to sites containing a booby-trapped image or delivering the image via email. By virtue of simply viewing the image, the exploit code is triggered and can deliver malware on the victim's computer.

"A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time," he explains. 

"Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit."

This type of attack won't show in network traffic, he pointed out, be invisible to the naked eye, and the image will "autorun" in the browser.

In order to make the attack payload look harmless and not trigger defenses, Shah split it into two: dangerous pixel data (exploit code), and a safe decoder. 


Via Gust MEES
Gust MEES's curator insight, June 2, 2015 5:56 AM

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? 

Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.


He is not the first one to try and hide exploits in images. But he created Stegosploit, a technology that lets attackers deliver executable JavaScript code via images, and trigger them, too.

The technology opens the door for attacks executed as simply as pointing users to sites containing a booby-trapped image or delivering the image via email. By virtue of simply viewing the image, the exploit code is triggered and can deliver malware on the victim's computer.

"A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time," he explains. 

"Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit."

This type of attack won't show in network traffic, he pointed out, be invisible to the naked eye, and the image will "autorun" in the browser.


In order to make the attack payload look harmless and not trigger defenses, Shah split it into two: dangerous pixel data (exploit code), and a safe decoder. 


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Adding Security to the Internet of Everything | Internet of Things | CyberSecurity

Adding Security to the Internet of Everything | Internet of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.

The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, February 9, 2015 10:12 AM
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.

The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Spencer Tan's curator insight, February 20, 2015 11:49 AM

Thus with the above news from Cisco one can be sure that with the increase of devices, internet security will be the next big thing and top investment from Small Business to Large Scale Enterprises? One could deny the need of investing in as simple as SSL certificates to DOS prevention  or even large scale hardware and Software firewall.


I deem ICT companies will make a big ding investing in specialization of deploying and implementing in Internet Security.


Also Read up on how to verify that the Website you visit or intend to make purchases is secure. 


Insights from Spencer Tan

Rescooped by juandoming from business analyst
Scoop.it!

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
The New Security Landscape of IoT


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Via Gust MEES, michel verstrepen
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

La maison connectée | Internet Of Things | YouTube

Au salon International CES qui se tient à Las Vegas du 6 au 9 janvier 2015, une large place est consacrée à la "maison intelligente", avec beaucoup d'électroménag...


En savoir plus :



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks | E-Learning-Inclusivo (Mashup) | Scoop.it
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Via Gust MEES
Gust MEES's curator insight, December 30, 2014 9:22 AM
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches | E-Learning-Inclusivo (Mashup) | Scoop.it
In this lesson, students will learn about the extent of cyberattacks just in the past year and the risks they pose for companies, governments and individuals.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Video

 

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

 


Via Gust MEES
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Regin: Top-tier espionage tool enables stealthy surveillance

Regin: Top-tier espionage tool enables stealthy surveillance | E-Learning-Inclusivo (Mashup) | Scoop.it
An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from Symantec, Backdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.

Via Gust MEES
Gust MEES's curator insight, November 23, 2014 12:52 PM

An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from SymantecBackdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | E-Learning-Inclusivo (Mashup) | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/




Via Gust MEES
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data | Cyberespionage

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data | Cyberespionage | E-Learning-Inclusivo (Mashup) | Scoop.it
Dubbed “AirHopper” by the researchers at Cyber Security Labs at Ben Gurion University, the proof-of-concept technique allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer using radio signals generated and transmitted by the computer and received by a mobile phone. The research was conducted by Mordechai Guri, Gabi Kedma, Assaf Kachlon, and overseen by their advisor Yuval Elovici.

The attack borrows in part from previous research showing how radio signals (.pdf) can be generated by a computer’s video card (.pdf). The researchers in Israel have developed malware that exploits this vulnerability by generating radio signals that can transmit modulated data that is then received and decoded by the FM radio receiver built into mobile phones. FM receivers come installed in many mobile phones as an emergency backup, in part, for receiving radio transmissions when the internet and cell networks are down. Using this function, however, attackers can turn a ubiquitous and seemingly innocuous device into an ingenious spy tool. Though a company or agency may think it has protected its air-gapped network by detaching it from the outside world, the mobile phones on employee desktops and in their pockets still provide attackers with a vector to reach classified and other sensitive data.

Via Gust MEES
Gust MEES's curator insight, November 9, 2014 8:53 AM

Dubbed “AirHopper” by the researchers at Cyber Security Labs at Ben Gurion University, the proof-of-concept technique allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer using radio signals generated and transmitted by the computer and received by a mobile phone. The research was conducted by Mordechai Guri, Gabi Kedma, Assaf Kachlon, and overseen by their advisor Yuval Elovici.

The attack borrows in part from previous research showing how radio signals(.pdf) can be generated by a computer’s video card (.pdf). The researchers in Israel have developed malware that exploits this vulnerability by generating radio signals that can transmit modulated data that is then received and decoded by the FM radio receiver built into mobile phones. FM receivers come installed in many mobile phones as an emergency backup, in part, for receiving radio transmissions when the internet and cell networks are down. Using this function, however, attackers can turn a ubiquitous and seemingly innocuous device into an ingenious spy tool. Though a company or agency may think it has protected its air-gapped network by detaching it from the outside world, the mobile phones on employee desktops and in their pockets still provide attackers with a vector to reach classified and other sensitive data.

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Same Security Threats, Different Devices: Wearables and Watchables

Same Security Threats, Different Devices: Wearables and Watchables | E-Learning-Inclusivo (Mashup) | Scoop.it
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.


“In coming months, we’ll see wearable devices becoming the next attack targets, highlighting the need to pay special attention to these devices, their capabilities, and the information they handle.”


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/




Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Cyber Security | The Economic Impact Of Cybercrime [pdf]

Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



Via Gust MEES
Rescooped by juandoming from Handy Online Tools for Schools
Scoop.it!

Botnets: What are They, and How can You Protect Your Computer?

Botnets: What are They, and How can You Protect Your Computer? | E-Learning-Inclusivo (Mashup) | Scoop.it
The average computer user tends to look blank if the word "botnet" is said. So, here's a summary of what botnets are and how to secure your information.

 

Learn more:

 

http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/

 


Via Gust MEES, Petra Pollum
Gust MEES's curator insight, August 8, 2014 2:31 PM
The average computer user tends to look blank if the word "botnet" is said. So, here's a summary of what botnets are and how to secure your information.


Learn more:


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Objets connectés : 70 % sont vulnérables

Objets connectés : 70 % sont vulnérables | E-Learning-Inclusivo (Mashup) | Scoop.it
Hewlett-Packard s'est penché sur la sécurité des objets connectés. Résultat, 70 % présentent des vulnérabilités.

Les objets connectés se développent et se diversifient, mais cela n'est que le début. Le cabinet d'analyses Gartner estime notamment...


En savoir plus :


-  http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things



Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip | E-Learning-Inclusivo (Mashup) | Scoop.it

That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand.

.

Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Or even worse a combination of all the above; plus a malware or trojan laden url embedded in it.

.

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.

.

Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Via Gust MEES
Gust MEES's curator insight, March 8, 2015 3:21 PM

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.


Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Connected homes could pose major security concerns to early adopters | Privacy | CyberSecurity

Connected homes could pose major security concerns to early adopters | Privacy | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it

Following Edward Snowden's leaks unveiling NSA and GCHQ surveillance, privacy has become a hot topic - and the IoT could pose great challenges...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO



Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

SID2015: Safer Internet Day 2015-Participation | Learning basics of CyberSecurity | eSkills

SID2015: Safer Internet Day 2015-Participation | Learning basics of CyberSecurity | eSkills | E-Learning-Inclusivo (Mashup) | Scoop.it

Safer Internet Day 2015 - Save the date! Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online...


Learn more:


https://gustmees.wordpress.com


https://gustmeesen.wordpress.com/


https://gustmeesfr.wordpress.com/


https://gustmeesfr.wordpress.com/



Via Gust MEES
Gust MEES's curator insight, January 7, 2015 10:26 AM

Safer Internet Day 2015 - Save the date! Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online...


Learn more:


https://gustmees.wordpress.com


https://gustmeesen.wordpress.com/


https://gustmeesfr.wordpress.com/


https://gustmeesde.wordpress.com/



Mony Chávez's curator insight, January 8, 2015 1:35 PM

Súper importante, considerarlo a cualquier edad.

Wron Ga's curator insight, January 18, 2015 1:41 PM

Kolejny post który temat opiera sie na biezpiecznym internecie, twórzmy go razem i zabiezpieczajmy przed skażonymi treściami i niedozwolonymi dla tych najmlodzsych

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

World's Biggest Data Breaches | Selected losses greater than 30,000 records | Learning basics of CyberSecurity

World's Biggest Data Breaches | Selected losses greater than 30,000 records | Learning basics of CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES



Via Gust MEES
Iva Santos's curator insight, January 5, 2015 7:55 PM

Segurança e educação devem andar juntos.

 

Oksana Borukh's curator insight, January 7, 2015 2:15 AM

Nice visualization of data breaches by year, by type, by industry etc.

Wron Ga's curator insight, January 18, 2015 1:46 PM

Ukazuje wizualizacje najwiekszych danych,sztuczek oraz przecieków  dotyczacych róznych premier danego producenta

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World | E-Learning-Inclusivo (Mashup) | Scoop.it
The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Via Gust MEES
Gust MEES's curator insight, December 21, 2014 10:44 AM

The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip | E-Learning-Inclusivo (Mashup) | Scoop.it

Software sollte generell immer auf dem neuesten Stand sein. Manche Programme sind aber besonders gefährdet – Virenbefall und Hacker-Angriffe drohen. Aktualisieren Sie sie schnellstmöglich!


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Via Gust MEES
Rescooped by juandoming from Trending Intelligence
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | E-Learning-Inclusivo (Mashup) | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES, Next Level
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

OnionDuke: APT Attacks Via the Tor Network | Cyber Security

OnionDuke: APT Attacks Via the Tor Network | Cyber Security | E-Learning-Inclusivo (Mashup) | Scoop.it

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR




Via Gust MEES
Gust MEES's curator insight, November 14, 2014 11:18 AM

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Octobre : le Mois européen de la cyber-sécurité - Cases

Octobre : le Mois européen de la cyber-sécurité -  Cases | E-Learning-Inclusivo (Mashup) | Scoop.it
L’ENISA fête cette année ses 10 ans au service de la cyber-sécurité. C’était également l’occasion d’ouvrir le Mois européen de la cyber-sécurité.


Impliquer le citoyen était au cœur du débat mené par François Thill, responsable CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg. 

 
Le Luxembourg est l’un des pays pilotes en Europe quant à la sensibilisation grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par « Security made in Lëtzebuerg » (SMILE), le groupement d'intérêt économique qui a été mandaté en 2010 par le ministère de l'Economie pour renforcer la sécurité de l'information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.  



Via Gust MEES
Gust MEES's curator insight, October 18, 2014 10:21 AM
L’ENISA fête cette année ses 10 ans au service de la cyber-sécurité. C’était également l’occasion d’ouvrir le Mois européen de la cyber-sécurité.


Impliquer le citoyen était au cœur du débat mené par François Thill, responsable CASES, membre du conseil d’administration de l’ENISA et coordinateur des activités ECSM pour le Luxembourg. 

 
Le Luxembourg est l’un des pays pilotes en Europe quant à la sensibilisation grand public aux bonnes pratiques des technologies de l’information. Les initiatives telles que CASES, CIRCL et BEE SECURE ont commencé à émerger au Grand-Duché il y a une bonne dizaine d’années déjà. Elles sont aujourd’hui coordonnées par « Security made in Lëtzebuerg » (SMILE), le groupement d'intérêt économique qui a été mandaté en 2010 par le ministère de l'Economie pour renforcer la sécurité de l'information au Grand-Duché de Luxembourg. CASES, CIRCL et BEE SECURE ont pour mission de

développer le niveau de savoir-faire de la population en matière d’Internet, en démocratisant les informations, les méthodes et les connaissances existantes. Leur objectif ultime est de faire bénéficier les utilisateurs des opportunités que livre l’Internet dans un climat de confiance et de résilience par rapport aux risques.  


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

H1 2014 Threat Report - F-Secure [Infographic]

H1 2014 Threat Report - F-Secure [Infographic] | E-Learning-Inclusivo (Mashup) | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.

Via Gust MEES
Gust MEES's curator insight, September 8, 2014 9:34 AM

F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Why we continue to fail on cyber security - (ISC)2 Blog

Why we continue to fail on cyber security - (ISC)2 Blog | E-Learning-Inclusivo (Mashup) | Scoop.it
I've been asked a lot of times, especially when I was working for an antivirus producer, why can't we simply write a software that always protects the users. Well, there is a short answer and a long answer. Short answer: Because 100% security does not exist and because most people are hackable due to being ignorant on what security is (of course, until he/she is hacked first time, and sometimes not even after such an event).

Long answer, which I massively shortened by not touching all areas and not going into details: The reason is the ignorance about everything that might happen but it is not certain that it will happen. I mean, would anyone close an insurance if it would have not been required by law or be afraid of the consequences? By the way, you can use this article to convince your C-level people to pay for that expensive cyber security training for the entire company.


According to Webster.com, the definition of IGNORANCE is: - a lack of knowledge, understanding, or education : the state of being ignorant [noncount] ignorance is bliss — used to say that a person who does not know about a problem does not...


Learn more:


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/



Via Gust MEES
Gust MEES's curator insight, August 24, 2014 8:11 AM

Learn more:


http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/


Roger Smith's curator insight, August 25, 2014 7:44 PM

Ignorance is such a problem when it comes to understanding cybercrime.   Common sense -  (I.E. free, no such thing, but a friend sent it to me so it must be OK) and Paranoia are primary weapons in the fight against becoming a cybercrime statistic.

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

How to Hack a Mobile App: It's Easier than You Think!

How to Hack a Mobile App: It's Easier than You Think! | E-Learning-Inclusivo (Mashup) | Scoop.it
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/



Via Gust MEES
Gust MEES's curator insight, August 7, 2014 11:44 AM
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/