ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Android App Activities Prone to Abuse

Android App Activities Prone to Abuse | ICT Security-Sécurité PC et Internet | Scoop.it
We've recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks.
Gust MEES's insight:

We’ve recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks. The two affected apps we investigated are both highly popular...


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


Scooped by Gust MEES
Scoop.it!

Android Botnets Hop on the TOR Train

Android Botnets Hop on the TOR Train | ICT Security-Sécurité PC et Internet | Scoop.it
Cyber criminals can infiltrate your mobile devices with the just discovered first "TOR Trojan for Android".
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Malware Infects Millions; LTE Spurs Growth

Mobile Malware Infects Millions; LTE Spurs Growth | ICT Security-Sécurité PC et Internet | Scoop.it
How pervasive is the mobile malware threat? New research shows that malicious code is infecting more than 11.6 million mobile devices at any given time, putting their owners at increased risk for stolen personal and financial information; bill shock resulting from pirated data usage; and extortion in exchange for device control.
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD: Another Android “master key” bug revealed

BYOD: Another Android “master key” bug revealed | ICT Security-Sécurité PC et Internet | Scoop.it
The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a....
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | ICT Security-Sécurité PC et Internet | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Botnet


Gust MEES's insight:

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Botne

 

http://www.scoop.it/t/securite-pc-et-internet

 

http://gustmees.wordpress.com/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | ICT Security-Sécurité PC et Internet | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Gust MEES's insight:

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Most BYOD businesses exposing data to cyber criminals

Most BYOD businesses exposing data to cyber criminals | ICT Security-Sécurité PC et Internet | Scoop.it
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber criminals by failing to implement effective BYOD strategies.
Gust MEES's insight:

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, July 18, 2013 4:31 AM

 

Meanwhile, nearly 80 per cent of respondents said they haven’t educated staff on the risks of BYOD.


Learn more:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Convenience or security: You can't have both when it comes to Wi-Fi

Convenience or security: You can't have both when it comes to Wi-Fi | ICT Security-Sécurité PC et Internet | Scoop.it
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them e
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's curator insight, June 27, 2013 9:38 AM

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Zhao KQiang's curator insight, March 28, 2014 6:24 AM

consider about free wifi is security or not,  when you start to connect it ,just takes few seconds to check the security setting 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | ICT Security-Sécurité PC et Internet | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

Gust MEES's insight:

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 12:03 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

#BYOD: Mobile malware growth hits all-time high

#BYOD: Mobile malware growth hits all-time high | ICT Security-Sécurité PC et Internet | Scoop.it
Researchers continue to find that the pace of mobile malware development is accelerating.

 

Researchers continue to find that the pace of mobile malware development is accelerating.A total of 22,750 new modifications of malicious programs targeting mobile devices were detected this past quarter by Kaspersky Lab, which is more than half of the total number of modifications detected in all of 2012.A full 99.9% of them target the Android platform.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | ICT Security-Sécurité PC et Internet | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.

 

So why is this important? It highlights the reality of the threat landscape.

 

The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.

 

 

 

 

 

Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:07 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Scooped by Gust MEES
Scoop.it!

CryptoLocker Ransomware Moves to Android

CryptoLocker Ransomware Moves to Android | ICT Security-Sécurité PC et Internet | Scoop.it
The Reveton ransomware gang is selling a version of CryptoLocker that can infect Android devices.


The version of the kit that’s being advertised by the Reveton gang has variants for victims in more than 30 countries, including the United States, UK, France, Germany, Australia and Spain.


Gust MEES's insight:

The version of the kit that’s being advertised by the Reveton gang has variants for victims in more than 30 countries, including the United States, UK, France, Germany, Australia and Spain.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Android Trojan delivered via Facebook

Android Trojan delivered via Facebook | ICT Security-Sécurité PC et Internet | Scoop.it

Researchers have uncovered a potentially massive attack on Android users. This highly elaborate ploy originates on Facebook, where cyber-criminals advertise a series of apps...


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Android


No comment yet.
Scooped by Gust MEES
Scoop.it!

First Android bootkit malware spotted; reportedly found on over 350,000 mobile devices

First Android bootkit malware spotted; reportedly found on over 350,000 mobile devices | ICT Security-Sécurité PC et Internet | Scoop.it
A new trojan for Android has been discovered that resides in the memory of infected devices and launches itself early on in the OS loading stage. Even if some elements of the threat ...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Major flaw discovered in mobile software used by govt agencies

Major flaw discovered in mobile software used by govt agencies | ICT Security-Sécurité PC et Internet | Scoop.it
The vulnerability discovered by an Israeli security researcher affects Samsungs Galaxy S4 device, which is currently used by government agencies.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security: madware and malware analysis [pdf]

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Device+Security

 

No comment yet.
Rescooped by Gust MEES from Security Infographics
Scoop.it!

Infographic: Q&A on Information Security Workforce

Infographic: Q&A on Information Security Workforce | ICT Security-Sécurité PC et Internet | Scoop.it
(ISC)2 conducted a worldwide survey in the last quarter of 2012 called 2013 Global Information Security Workforce Study. Our newest infographic presents some of the study’s highlights in an easy-to-read question & answer format.

Via Praetorian Guard
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Protect Your Tablets and Smartphone From Malware Attacks - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the steps we can take to ensure that our mobile devices - our tablets and smartphones - are...
Gust MEES's insight:

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones

SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones | ICT Security-Sécurité PC et Internet | Scoop.it

SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


Gust MEES's insight:

 

SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Android botnets on the rise - case study

Android botnets on the rise - case study | ICT Security-Sécurité PC et Internet | Scoop.it
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Fake Antivirus Holds Android Phones for Ransom

Fake Antivirus Holds Android Phones for Ransom | ICT Security-Sécurité PC et Internet | Scoop.it
Fake antivirus, also called scareware, is a well-known Windows problem. Symantec researchers have found fake antivirus aimed at Android devices, and it's even nastier.
Gust MEES's insight:

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Gust MEES's curator insight, June 25, 2013 9:35 AM

 

Naturally Hamada advises using Norton Mobile Security for protection. PCMag's own Editors' Choice in this area Bitdefender Mobile Security and Antivirus 1.2.3; Lookout Mobile Security Premium held the Editors' Choice honor previously.

 

===> Whichever you choose, it does seem you'd be wise to protect your Android phone. <===

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
INFOGRAPHIC: Mobile Threat in Action
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Mobile Malware - Security Spotlight Series: Episode Three

Tune in to watch Security Spotlight's third episode, on Mobile Malware. In 2012, we saw a 58% increase in mobile malware, and it continues to grow. Cybercrim...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security