information analyst
43.8K views | +2 today
Follow
information analyst
km, ged / edms, workflow, collaboratif
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

ChatGPT : une faille de sécurité menace la vie privée sur Internet

ChatGPT : une faille de sécurité menace la vie privée sur Internet | information analyst | Scoop.it

ChatGPT est victime d’une nouvelle faille de sécurité. En exploitant cette brèche, il est possible d’extraire des données sensibles concernant des individus en s’adressant au chatbot d’OpenAI.

 

 
 
 

Via Gust MEES
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Resetting Your IoT Device Before Reselling It Isn't Enough, Researchers Find | #CyberSecurity #Privacy #InternetOfThings 

Resetting Your IoT Device Before Reselling It Isn't Enough, Researchers Find | #CyberSecurity #Privacy #InternetOfThings  | information analyst | Scoop.it

As IoT devices like Amazon Echo become more and more popular, it isn’t unusual for users to re-sell them. Indeed, it’s increasingly common to come across them on eBay or even at the occasional yard sale. Amazon suggests that, when users are done with a product, they factory reset the device so as to erase any personal information stored within it before sending it back out into the world.

However, it would appear that simply resetting your device won’t actually expunge that data from the face of the Earth and that reselling your device could hypothetically lead to your old information getting boosted.

Researchers with Northeastern University recently spent 16 months buying and reverse engineering 86 used Amazon Echo Dot devices in an attempt to understand any security deficiencies they might have.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=iot

 


Via Gust MEES
Gust MEES's curator insight, July 4, 2021 11:02 AM

As IoT devices like Amazon Echo become more and more popular, it isn’t unusual for users to re-sell them. Indeed, it’s increasingly common to come across them on eBay or even at the occasional yard sale. Amazon suggests that, when users are done with a product, they factory reset the device so as to erase any personal information stored within it before sending it back out into the world.

However, it would appear that simply resetting your device won’t actually expunge that data from the face of the Earth and that reselling your device could hypothetically lead to your old information getting boosted.

Researchers with Northeastern University recently spent 16 months buying and reverse engineering 86 used Amazon Echo Dot devices in an attempt to understand any security deficiencies they might have.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=iot

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Cryptolunch.lu, la cybersécurité à la portée des citoyens  | CyberSecurity | Luxembourg | Europe | Encryption

Cryptolunch.lu, la cybersécurité à la portée des citoyens  | CyberSecurity | Luxembourg | Europe | Encryption | information analyst | Scoop.it
Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 


 


Via Gust MEES
michel verstrepen's insight:

Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Gust MEES's curator insight, March 4, 2016 6:39 PM

Cryptolunch.lu, la cybersécurité à la portée des citoyens


Cryptolunch.lu est un évènement gratuit, organisé au Luxembourg, dédié à l'information des citoyens européens à la protection de la vie privée et la sécurité en ligne.
 
L'utilisation massive des Technologies de l'Information et de l'Information a fait évoluer les limites entre vie privée et vie publique. Alors que nous sommes toujours plus connectés, une masse exponentielle de données personnelles nous concernant est échangée, tant en ligne que hors ligne. La vie privée est pourtant un droit qu'il est important de défendre.
 
Organisé en partenariat entre la maison de l'Europe et Securitymadein.lu, la finalité des cryptolunch est de mettre à disposition un lieu de rencontre où les citoyens européens auront l'opportunité de s'entretenir avec des experts en sécurité afin d'obtenir des informations sur des sujets tels que la vie privée et la sécurité numérique.
 
Créé afin de permettre à un public non spécialisé d'obtenir des réponses claires et simples à ses questions, ce rassemblement est idéal pour  répondre aux attentes de profils très variées  en termes  de  sécurité sur Internet.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

Rescooped by michel verstrepen from E-Learning-Inclusivo (Mashup)
Scoop.it!

[Cookieviz] Un logiciel pour visualiser en temps réel les cookies lors de votre navigation ! | Privacy | eSkills | eLeaderShip

TUTORIEL - La CNIL met à disposition de tous un outil de visualisation qui identifie en temps réel les cookies qui transmettent des informations vous concernant à d’autres sites. Dans cette vidéo, découvrez comment utiliser l'outil Cookieviz !


Pour télécharger Cookieviz : http://www.cnil.fr/vos-droits/vos-traces/les-cookies/telechargez-cookieviz/


En savoir plus :


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cookies



Via Gust MEES, juandoming
Gust MEES's curator insight, February 1, 2015 12:40 PM
TUTORIEL - La CNIL met à disposition de tous un outil de visualisation qui identifie en temps réel les cookies qui transmettent des informations vous concernant à d’autres sites. Dans cette vidéo, découvrez comment utiliser l'outil Cookieviz !


Pour télécharger Cookieviz : http://www.cnil.fr/vos-droits/vos-traces/les-cookies/telechargez-cookieviz/


En savoir plus :


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=cookies


Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

NSA's Gigantic Surveillance Program Xkeyscore Revealed

NSA's Gigantic Surveillance Program Xkeyscore Revealed | information analyst | Scoop.it
In a story no doubt timed to the keynote speech from NSA Director General Keith Alexander at this year's Black Hat conference in Las Vegas, the Guardian has released information on Xkeyscore, a surveillance program run by the NSA.

Via Gust MEES
Rescooped by michel verstrepen from Knowledge for Entrepreneurs
Scoop.it!

How Thieves Use Social Media To Rob You

How Thieves Use Social Media To Rob You | information analyst | Scoop.it
Thinking of tweeting about an upcoming holiday? Don’t. Thinking of sharing a photo of your latest grand purchase? Don’t. Thinking of checking in at the airport before your vacation? Don’t.

Via Gust MEES, ABroaderView, Dolly Bhasin
Jhonathan Garcia's curator insight, July 10, 2013 9:33 PM

Social Media Security Post:  Be careful with all the things you post!

Michelle Gilstrap's curator insight, July 11, 2013 1:13 PM

Never show photos of your vacation while you are on vacation. Always show photos when you get back home.

Carmenne Kalyaniwala's curator insight, October 15, 2013 2:36 AM

An infographic with some important information we can share with students

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

GCHQ intercepted foreign politicians' communications at G20 summits

GCHQ intercepted foreign politicians' communications at G20 summits | information analyst | Scoop.it
Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009

Via Gust MEES
Gust MEES's curator insight, June 16, 2013 4:23 PM

 

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

 

WOW!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=GHCQ

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Privacy

 

Rescooped by michel verstrepen from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Infographic - What Permissions Apps & Websites Ask for When You Connect

Infographic - What Permissions Apps & Websites Ask for When You Connect | information analyst | Scoop.it
Facebook users have scanned with MyPermissions to find out what third party apps and websites have access to their information and just what permissions they have granted. We've created this infogr...

Via Gust MEES
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Dozens of COVID passport apps put user's privacy at risk | #CyberSecurity #COVID19 #CoronaVirus 

Dozens of COVID passport apps put user's privacy at risk | #CyberSecurity #COVID19 #CoronaVirus  | information analyst | Scoop.it

Roughly two-thirds of test digital vaccination applications commonly used today as safe passes and travel passports exhibit behavior that may put users' privacy at risk.

The risks are substantial as these apps are required for large populations worldwide, allowing hackers an extensive target base.

Digital passports
Digital passport apps store proof of a person's COVID-19 vaccination status, full name, ID number, date of birth, and other personally identifiable information (PII) encoded in a QR code or displayed directly in the app.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Privacy

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Coronavirus

 

 


Via Gust MEES
Gust MEES's curator insight, March 7, 2022 3:10 PM

Roughly two-thirds of test digital vaccination applications commonly used today as safe passes and travel passports exhibit behavior that may put users' privacy at risk.

The risks are substantial as these apps are required for large populations worldwide, allowing hackers an extensive target base.

Digital passports
Digital passport apps store proof of a person's COVID-19 vaccination status, full name, ID number, date of birth, and other personally identifiable information (PII) encoded in a QR code or displayed directly in the app.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Privacy

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Coronavirus

 

 

Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

EU GDPR Infographic: What the new Regulation means in 1 minute – IT Governance Blog | #Privacy #EU #laws

EU GDPR Infographic: What the new Regulation means in 1 minute – IT Governance Blog | #Privacy #EU #laws | information analyst | Scoop.it
If your organisation does business within the European Union or collects data on European citizens you’ve likely been told about the newly approved EU General Data Protection Regulation (GDPR), which will come into force in spring 2018.

The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the law.

Are you prepared to take the steps necessary for compliance? Here’s a brief overview of everything you need to know about the new Regulation and what it means for your business.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
Gust MEES's curator insight, May 10, 2016 1:54 PM
If your organisation does business within the European Union or collects data on European citizens you’ve likely been told about the newly approved EU General Data Protection Regulation (GDPR), which will come into force in spring 2018.

The GDPR will increase privacy for individuals and give regulatory authorities greater powers to take action against businesses that breach the law.

Are you prepared to take the steps necessary for compliance? Here’s a brief overview of everything you need to know about the new Regulation and what it means for your business.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 

 

Bruillon's curator insight, May 23, 2016 1:52 PM
Nouvelle réglementation sur PDP
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Google Maps now lets you revisit your location history in a detailed timeline | DigitalFootPrint | DigitalCitiZEN

Google Maps now lets you revisit your location history in a detailed timeline | DigitalFootPrint | DigitalCitiZEN | information analyst | Scoop.it

It’s inspiring — in a crazy sort of way — to consider how efficient Google can be in keeping track of information about you. Today, Google announced the launch of “Your Timeline,” a tool in Google Maps that shares with you all the places you have been. It works if you chose to store your Location History with Google.


Product manager Gerard Sanz detailed the feature in blog post, as the company gradually rolls out the timeline for Maps users.


It could definitely serve as a convenience. What with our busy lives, sometimes it’s hard to remember all the stops along the way. Google sees Your Timeline as a way to quickly recall, and even view your past whereabouts.



Via Gust MEES
Mei Lin Fung's curator insight, July 28, 2015 10:40 AM

like fire.... it has risks and rewards

Calliope Global Fran's curator insight, July 31, 2015 2:36 PM

It’s inspiring — in a crazy sort of way — to consider how efficient Google can be in keeping track of information about you. Today, Google announced the launch of “Your Timeline,” a tool in Google Maps that shares with you all the places you have been. It works if you chose to store your Location History with Google.


Product manager Gerard Sanz detailed the feature in blog post, as the company gradually rolls out the timeline for Maps users.

 

It could definitely serve as a convenience. What with our busy lives, sometimes it’s hard to remember all the stops along the way. Google sees Your Timeline as a way to quickly recall, and even view your past whereabouts.

 

Dennis Swender's curator insight, August 10, 2015 12:00 PM

It’s inspiring — in a crazy sort of way — to consider how efficient Google can be in keeping track of information about you. Today, Google announced the launch of “Your Timeline,” a tool in Google Maps that shares with you all the places you have been. It works if you chose to store your Location History with Google.

 

Product manager Gerard Sanz detailed the feature in blog post, as the company gradually rolls out the timeline for Maps users.

 

It could definitely serve as a convenience. What with our busy lives, sometimes it’s hard to remember all the stops along the way. Google sees Your Timeline as a way to quickly recall, and even view your past whereabouts.

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy | information analyst | Scoop.it
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
Gust MEES's curator insight, January 30, 2015 3:32 PM
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Do You Know Who’s Watching You? [INFOGRAPHIC]

Do You Know Who’s Watching You? [INFOGRAPHIC] | information analyst | Scoop.it
Do You Know Who’s Watching You?: INFOGRAPHIC

Via Gust MEES
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

PRISM: NSA accused of hacking EU computers and bugging buildings

PRISM: NSA accused of hacking EU computers and bugging buildings | information analyst | Scoop.it
New allegations also suggest EU computer networks were hacked

 

The US intelligence service may have placed bugs in European Union (EU) buildings as part of its PRISM spying program, it has emerged from documents released by whistle-blower Edward Snowden.

 

Documents seen by the German newspaper Spiegel suggest that not only were bugs installed in the EU's offices in Washington, but also that the building's computer network was infiltrated.

 

Through this, surveillance teams had the capability to listen to discussions in several offices belonging to the EU, as well as being able to access emails and documents on computers.

 


Via Gust MEES
Gust MEES's curator insight, July 1, 2013 9:25 AM

 

Documents seen by the German newspaper Spiegel suggest that not only were

 

===> bugs installed in the EU's offices in Washington <===,

 

but also that the building's computer network was infiltrated.

 

THIS is going TOO FAR!!!

Gust MEES's curator insight, July 1, 2013 9:30 AM

 

Documents seen by the German newspaper Spiegel suggest that not only were

 

===> bugs installed in the EU's offices in Washington <===,

 

but also that the building's computer network was infiltrated.

 

THIS is going TOO FAR!!!

 

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Boundless Informant: the NSA's secret tool to track global surveillance data

Boundless Informant: the NSA's secret tool to track global surveillance data | information analyst | Scoop.it
Revealed: The NSA's powerful tool for cataloguing data – including figures on US collection

Via Gust MEES
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

How to protect your privacy better than CIA director David Petraeus! [Infographic]

How to protect your privacy better than CIA director David Petraeus! [Infographic] | information analyst | Scoop.it
The scandal involving the Director of the U.S. Central Intelligence Agency (CIA), David Petraeus, shocked the nation.

Via Gust MEES
Gust MEES's curator insight, December 25, 2012 6:43 PM

 

Check out also my curation about "Privacy" here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Privacy