ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

This hush-hush hacker group has been quietly spying since 2011 | #CyberSecurity #Cyberespionage #Remsec #Strider

This hush-hush hacker group has been quietly spying since 2011 | #CyberSecurity #Cyberespionage #Remsec #Strider | ICT Security-Sécurité PC et Internet | Scoop.it
Cybersecurity researchers at Symantec have discovered a previously-unknown hacker group they have dubbed 'Strider', which has been infecting organisations and individuals that would be of potential interest to a nation state's intelligence services.

The group's Remsec malware appears to mainly target organisations and individuals in Russia, but has also infiltrated the systems of an airline in China, an embassy in Belgium, and an unspecified organisation in Sweden. The malware is very much designed to spy on its targets: once it has infected a system, it opens a backdoor through which it can log keystrokes and steal files.

It's thought the highly-targeted malware -- only 36 infections in five years -- has been in operation since October 2011, avoiding detection by the vast majority of antivirus systems for almost five years through a number of features designed to ensure stealth.

Several of the components which make up Remsec are built in the form of a Binary Large Object (BLOB), collections of binary data which are difficult for security software to detect. In addition, the malware's functionality is deployed across a network which means it isn't stored on disk, another factor which makes it difficult to detect.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Remsec

 

Gust MEES's insight:
Cybersecurity researchers at Symantec have discovered a previously-unknown hacker group they have dubbed 'Strider', which has been infecting organisations and individuals that would be of potential interest to a nation state's intelligence services.

The group's Remsec malware appears to mainly target organisations and individuals in Russia, but has also infiltrated the systems of an airline in China, an embassy in Belgium, and an unspecified organisation in Sweden. The malware is very much designed to spy on its targets: once it has infected a system, it opens a backdoor through which it can log keystrokes and steal files.

It's thought the highly-targeted malware -- only 36 infections in five years -- has been in operation since October 2011, avoiding detection by the vast majority of antivirus systems for almost five years through a number of features designed to ensure stealth.

Several of the components which make up Remsec are built in the form of a Binary Large Object (BLOB), collections of binary data which are difficult for security software to detect. In addition, the malware's functionality is deployed across a network which means it isn't stored on disk, another factor which makes it difficult to detect.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Remsec

 

 

No comment yet.
Rescooped by Gust MEES from Luxembourg (Europe)
Scoop.it!

Ninth Annual BSA Global Software Piracy Study

Ninth Annual BSA Global Software Piracy Study | ICT Security-Sécurité PC et Internet | Scoop.it
BSA's annual study shows global PC software theft grew to a record $63 billion in 2011.

 

This year's BSA Global Software Piracy Study marks the first time a large sample of computer users around the world have been asked directly, "How often do you acquire pirated software or software that is not fully licensed?"

 

The answers people have given to that and other questions reveal sharp divides between the habits and outlooks of computer users in emerging and developed markets.

 

Those differences help explain why the global piracy rate hovered at 42 percent in 2011 while a steadily expanding marketplace in the developing world drove the commercial value of software theft to $63.4 billion.

 

Gust MEES: ===> I include also #cybersecurity! Why? Illegal downloads of software can't get updated anymore, so, thus meaning: vulnerabilities found in such software will be not fixed and computers running such software are vulnerable to malware and certainly infected one day!!! <===

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Google overtakes Microsoft in reported security vulnerabilities

Google overtakes Microsoft in reported security vulnerabilities | ICT Security-Sécurité PC et Internet | Scoop.it
Oracle also has a bad quarter to leapfrog Redmond...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Un malware infecte 8 millions de pages web | silicon.fr

Un malware infecte 8 millions de pages web | silicon.fr | ICT Security-Sécurité PC et Internet | Scoop.it
Le malware Willysy exploite une vulnérabillité, pourtant corrigée, d'une plate-forme de e-commerce. Résultat, bientôt 8 millions de pages infectieuses en quelques semaines.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Norton: Cybercrime cost $110 billion last year

Norton: Cybercrime cost $110 billion last year | ICT Security-Sécurité PC et Internet | Scoop.it
Summary: Norton's annual Cybercrime report says that in the last twelve months, cybercrime has cost $110 billion, and may have implications for businesses worldwide.

 

Read more:

http://www.zdnet.com/norton-cybercrime-cost-110-billion-last-year-7000003745/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacktivists stole 100 million records in 2011

Hacktivists stole 100 million records in 2011 | ICT Security-Sécurité PC et Internet | Scoop.it
Hacktivist groups like Anonymous and LulzSec weren’t responsible for the most data breaches in 2011. They did, however, steal the most records from users last year, according to a new report.

 

2011 was the year of the hacktivist. 100 million users saw their data compromised by hacktivist groups such as Anonymous and LulzSec. Out of an estimated 855 data-breach incidents recorded last year, only around 25 were attributed to hacktivists.

 

While their activities accounted for just 2 percent of external breaches, they stole 58 percent of all the 174 million records stolen last year.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Anonymous Clashes With Its Adversaries At Hacker Conference

Anonymous Clashes With Its Adversaries At Hacker Conference | ICT Security-Sécurité PC et Internet | Scoop.it
Even by the standards of a conference of hackers, where the mohawked and kilted flaunted their weirdness like high-rollers flaunting their worth, the scene that unfolded on Saturday evening was strange.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Black Hat: Lots of hacks and a patriotic plea

Black Hat: Lots of hacks and a patriotic plea | ICT Security-Sécurité PC et Internet | Scoop.it
Black Hat hasn't disappointed this year, with research revealing a flaw that undercuts OSPF routing, two separate assertions that security for Apple products in the enterprise isn't that bad and a friendly hand being offered to hackers and crackers...
No comment yet.