ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

BSIFB - Informationen - Ist Ihr Smartphone so sicher wie Ihr PC? | #CyberSecurity #MobileSecurity #Awareness

BSIFB - Informationen - Ist Ihr Smartphone so sicher wie Ihr PC? | #CyberSecurity #MobileSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

28. Oktober 2016 | Drei von vier Menschen (74,6%) speichern sensible Daten auf ihrem Smartphone ie private Bilder und Videos (57,8%) sowie Kontaktdaten von Dritten (47,9%). Zudem erlauben 29,8 Prozent der Nutzer den Direktzugriff ohne Passwortabfrage auf Nutzerkonten bei sozialen Netzwerken, E-Mail- sowie Cloud-Diensten. Fast jeder Fünfte (19,7%) hat auch Apps installiert, die persönliche Daten, etwa zur eigenen Gesundheit oder Fitness, speichern und auswerten. Gleichzeitig gaben fast 20 Prozent der Nutzer an, keinerlei Sicherheitsfunktionen zum Schutz dieser kritischen Informationen eingerichtet zu haben.

 

Nicht einmal die Hälfte (46,3%) führt regelmäßige Software-Updates durch, um Sicherheitslücken zu schließen.


Zu diesen Ergebnissen kommt eine repräsentative Online-Befragung von TNS Infratest im Auftrag des BSI anlässlich des European Cyber Security Month (ECSM) unter dem Motto "Smartphone & Co – sicher mobil"

 

Weitere Informationen zum Rundum-Schutz für mobile Geräte können auf der Seite "Schutz für Smartphone und Co" nachgelesen werden.

 

Gust MEES's insight:

28. Oktober 2016 | Drei von vier Menschen (74,6%) speichern sensible Daten auf ihrem Smartphone ie private Bilder und Videos (57,8%) sowie Kontaktdaten von Dritten (47,9%). Zudem erlauben 29,8 Prozent der Nutzer den Direktzugriff ohne Passwortabfrage auf Nutzerkonten bei sozialen Netzwerken, E-Mail- sowie Cloud-Diensten. Fast jeder Fünfte (19,7%) hat auch Apps installiert, die persönliche Daten, etwa zur eigenen Gesundheit oder Fitness, speichern und auswerten. Gleichzeitig gaben fast 20 Prozent der Nutzer an, keinerlei Sicherheitsfunktionen zum Schutz dieser kritischen Informationen eingerichtet zu haben.

 

Nicht einmal die Hälfte (46,3%) führt regelmäßige Software-Updates durch, um Sicherheitslücken zu schließen.


Zu diesen Ergebnissen kommt eine repräsentative Online-Befragung von TNS Infratest im Auftrag des BSI anlässlich des European Cyber Security Month (ECSM) unter dem Motto "Smartphone & Co – sicher mobil"

 

Weitere Informationen zum Rundum-Schutz für mobile Geräte können auf der Seite "Schutz für Smartphone und Co" nachgelesen werden.

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security-Ratgeber kostenlos als PDF-Download | CyberSecurity | BYOD | eSkills | eLeaderShip

Security-Ratgeber kostenlos als PDF-Download | CyberSecurity | BYOD | eSkills | eLeaderShip | ICT Security-Sécurité PC et Internet | Scoop.it
Anlässlich der vom 16. bis 20. März 2015 stattfindenden IT-Messe Cebit stellt Kaspersky Lab zwei Security-Ratgeber der Dummy-Serie als kostenlosen PDF-Download bereit.
Gust MEES's insight:

Anlässlich der vom 16. bis 20. März 2015 stattfindenden IT-Messe Cebit stellt Kaspersky Lab zwei Security-Ratgeber der Dummy-Serie als kostenlosen PDF-Download bereit.


No comment yet.
Scooped by Gust MEES
Scoop.it!

iOS tombe et Windows Phone résiste lors d’une compétition de hackers

iOS tombe et Windows Phone résiste lors d’une compétition de hackers | ICT Security-Sécurité PC et Internet | Scoop.it
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.
Gust MEES's insight:

L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Gust MEES's curator insight, November 15, 2014 4:02 AM
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.


Scooped by Gust MEES
Scoop.it!

Android App Activities Prone to Abuse

Android App Activities Prone to Abuse | ICT Security-Sécurité PC et Internet | Scoop.it
We've recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks.
Gust MEES's insight:

We’ve recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks. The two affected apps we investigated are both highly popular...


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


Scooped by Gust MEES
Scoop.it!

Backdoor in Samsung-Galaxy-Geräten entdeckt

Backdoor in Samsung-Galaxy-Geräten entdeckt | ICT Security-Sécurité PC et Internet | Scoop.it
Android-Entwickler wollen eine geheime Hintertür in Samsung-Galaxy-Smartphones entdeckt haben. Auch zwei von Samsung produzierte Nexus-Phones sollen betroffen sein.
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Android


No comment yet.
Scooped by Gust MEES
Scoop.it!

Android Botnets Hop on the TOR Train

Android Botnets Hop on the TOR Train | ICT Security-Sécurité PC et Internet | Scoop.it
Cyber criminals can infiltrate your mobile devices with the just discovered first "TOR Trojan for Android".
No comment yet.
Scooped by Gust MEES
Scoop.it!

VPN bypass vulnerability affects Android Jelly Bean and KitKat, researchers say | PCWorld

VPN bypass vulnerability affects Android Jelly Bean and KitKat, researchers say | PCWorld | ICT Security-Sécurité PC et Internet | Scoop.it
The vulnerability could allow attackers to intercept traffic from Android devices despite an active VPN connection


A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researchers from Ben-Gurion University of the Negev in Israel.


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Major flaw discovered in mobile software used by govt agencies

Major flaw discovered in mobile software used by govt agencies | ICT Security-Sécurité PC et Internet | Scoop.it
The vulnerability discovered by an Israeli security researcher affects Samsungs Galaxy S4 device, which is currently used by government agencies.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security: madware and malware analysis [pdf]

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

28 Schutz-Apps für Android geprüft

28 Schutz-Apps für Android geprüft | ICT Security-Sécurité PC et Internet | Scoop.it
Das AV-Test Institut in Magdeburg hat 28 Schutzprogramme für Android-Geräte getestet. Bei der Zertifizierungsprüfung sind drei Apps wegen mangelhafter Schutzwirkung durchgefallen.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | ICT Security-Sécurité PC et Internet | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security




Via Gust MEES
Gust MEES's insight:

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:47 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gust MEES from Security Infographics
Scoop.it!

Infographic: Q&A on Information Security Workforce

Infographic: Q&A on Information Security Workforce | ICT Security-Sécurité PC et Internet | Scoop.it
(ISC)2 conducted a worldwide survey in the last quarter of 2012 called 2013 Global Information Security Workforce Study. Our newest infographic presents some of the study’s highlights in an easy-to-read question & answer format.

Via Praetorian Guard
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Neuer Handy-Virus: Simplocker schleust Malware aufs Smartphone | Mobile Security

Neuer Handy-Virus: Simplocker schleust Malware aufs Smartphone | Mobile Security | ICT Security-Sécurité PC et Internet | Scoop.it
Simplocker ist eine sogenannte Ransomware, die Handydaten verschlüsselt und den Zugriff auf Handydaten sperrt. Der Virus tarnt sich als gefälschte Flashplayer-App.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Simplocker


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Gust MEES's insight:
Simplocker ist eine sogenannte Ransomware, die Handydaten verschlüsselt und den Zugriff auf Handydaten sperrt. Der Virus tarnt sich als gefälschte Flashplayer-App.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Simplocker


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


No comment yet.
Scooped by Gust MEES
Scoop.it!

The Rise Of The Resilient Mobile Botnet | MobileSecurity | BYOD | CyberSecurity

The Rise Of The Resilient Mobile Botnet | MobileSecurity | BYOD | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Botnet


Gust MEES's insight:
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Botnet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Every fifth Android user faces cyber attacks

Every fifth Android user faces cyber attacks | ICT Security-Sécurité PC et Internet | Scoop.it

A total of 1,000,000 Android device users around the world encountered dangerous software between August 2013 and July 2014, according to the results of a survey carried out by Kaspersky Lab and INTERPOL. In fact, this period was the peak of cyber attacks registered in recent years.

The most popular malicious programs are SMS Trojans that send messages to premium rate numbers without the owner’s awareness.


Gust MEES's insight:

A total of 1,000,000 Android device users around the world encountered dangerous software between August 2013 and July 2014, according to the results of a survey carried out by Kaspersky Lab and INTERPOL. In fact, this period was the peak of cyber attacks registered in recent years.

The most popular malicious programs are SMS Trojans that send messages to premium rate numbers without the owner’s awareness.


No comment yet.
Scooped by Gust MEES
Scoop.it!

CryptoLocker Ransomware Moves to Android

CryptoLocker Ransomware Moves to Android | ICT Security-Sécurité PC et Internet | Scoop.it
The Reveton ransomware gang is selling a version of CryptoLocker that can infect Android devices.


The version of the kit that’s being advertised by the Reveton gang has variants for victims in more than 30 countries, including the United States, UK, France, Germany, Australia and Spain.


Gust MEES's insight:

The version of the kit that’s being advertised by the Reveton gang has variants for victims in more than 30 countries, including the United States, UK, France, Germany, Australia and Spain.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Heartbleed-Bug: Über 1.000 Android-Apps betroffen

Heartbleed-Bug: Über 1.000 Android-Apps betroffen | ICT Security-Sécurité PC et Internet | Scoop.it
Längst hat die Heartbleed-Lücke auch mobile Geräte erreicht: Sicherheitsexperten von Trend Micro zufolge, verbinden sich rund 1.300 Android-Apps mit angreifbaren Servern - darunter auch 15 Banking-Apps.





Learn more:



Gust MEES's insight:


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

Android Trojan delivered via Facebook

Android Trojan delivered via Facebook | ICT Security-Sécurité PC et Internet | Scoop.it

Researchers have uncovered a potentially massive attack on Android users. This highly elaborate ploy originates on Facebook, where cyber-criminals advertise a series of apps...


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Android


No comment yet.
Scooped by Gust MEES
Scoop.it!

First Android bootkit malware spotted; reportedly found on over 350,000 mobile devices

First Android bootkit malware spotted; reportedly found on over 350,000 mobile devices | ICT Security-Sécurité PC et Internet | Scoop.it
A new trojan for Android has been discovered that resides in the memory of infected devices and launches itself early on in the OS loading stage. Even if some elements of the threat ...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Malware Infects Millions; LTE Spurs Growth

Mobile Malware Infects Millions; LTE Spurs Growth | ICT Security-Sécurité PC et Internet | Scoop.it
How pervasive is the mobile malware threat? New research shows that malicious code is infecting more than 11.6 million mobile devices at any given time, putting their owners at increased risk for stolen personal and financial information; bill shock resulting from pirated data usage; and extortion in exchange for device control.
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD: Another Android “master key” bug revealed

BYOD: Another Android “master key” bug revealed | ICT Security-Sécurité PC et Internet | Scoop.it
The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a....
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke | ICT Security-Sécurité PC et Internet | Scoop.it
Security-SuperGAU für alle Nutzer von iPhones und iPads: Experten haben eine Lücke in iOS-Apps entdeckt, die es erlaubt, die komplette Kommunikation über fremde Server umzuleiten. Tausende Apps sollen betroffen sein.

 

Über HTTP Request Hijacking sollen sich Hacker in iOS-Apps einschleichen und so den Datentraffic über eigene Server umleiten können. Nach erfolgreichem Angriff soll die Umleitung dann permanent aktiv sein.

 

===> Einzige Abhilfe schafft ein Update oder eine Neuinstallation der App. <===

 

 


Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Hotspots Wi-Fi au service de l'espionnage industriel

Hotspots Wi-Fi au service de l'espionnage industriel | ICT Security-Sécurité PC et Internet | Scoop.it
Une récente étude montre qu'en Grande-Bretagne, les salariés exposent très facilement les données de leurs entreprises sur les réseaux Wi-Fi publics (hotspots).

 

L'étude de GFI ne concerne malheureusement pas les travailleurs français, mais la problématique de la sécurité des données des entreprises est aujourd'hui la même dans tous les pays : les données numériques sont à la fois volatiles et précieuses. Cela dit, les informations personnelles valent aussi de l'or ! Prudence donc sur les hotspots Wi-Fi…

 

 

Gust MEES's insight:

 

L'étude de GFI ne concerne malheureusement pas les travailleurs français, mais la problématique de la sécurité des données des entreprises est aujourd'hui la même dans tous les pays : les données numériques sont à la fois volatiles et précieuses. Cela dit, les informations personnelles valent aussi de l'or ! Prudence donc sur les hotspots Wi-Fi…

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.