ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Ransomware campaigns: behind the scenes… - SECURITYMADEIN.LU | CyberCrime | CyberSecurity

Ransomware campaigns: behind the scenes… - SECURITYMADEIN.LU | CyberCrime | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Ransomware persists as one of the top crimeware threats at the start of 2016 but is definitively not a new threat and goes back to 1989, with a strong growth in 2015. Let’s take an in-depth look at it… A short history of ransomware The start… The first known ransomware goes back to 1989 with...


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/ict-security-tools/?tag=Ransomware


Gust MEES's insight:

Ransomware persists as one of the top crimeware threats at the start of 2016 but is definitively not a new threat and goes back to 1989, with a strong growth in 2015. Let’s take an in-depth look at it… A short history of ransomware The start… The first known ransomware goes back to 1989 with...


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/ict-security-tools/?tag=Ransomware


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Cartons pleins pour hack.lu

Cartons pleins pour hack.lu | ICT Security-Sécurité PC et Internet | Scoop.it
Avec 250 inscrits en provenance de 41 pays, la convention Hack.lu s’impose comme référence en tant que conférence sur la cyber-sécurité.
Gust MEES's insight:

 

Elle pourrait même accueillir le plus grand challenge Capture The Flag au monde… 

 

En savoir plus :

 

www.hack.lu

 

Gust MEES's curator insight, October 22, 2013 10:12 AM

 

Elle pourrait même accueillir le plus grand challenge Capture The Flag au monde… 


En savoir plus :


- www.hack.lu

 


Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Visual Cyber-Security: See Attacks On Real Time

Visual Cyber-Security: See Attacks On Real Time | ICT Security-Sécurité PC et Internet | Scoop.it

Introduction .In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is the human...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Scooped by Gust MEES
Scoop.it!

TR-10 - Red October / Sputnik malware - Recommendations

TR-10 - Red October / Sputnik malware - Recommendations | ICT Security-Sécurité PC et Internet | Scoop.it

Overview

Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations.

 

As a cover, different office file formats have been used to transport the loader of the malware, using different exploits to drop the malicious content. After several stages of unpacking, the malware is running persistently on the computer and only when it successfully probes internet connectivity, it decrypts a separate file and starts to behave maliciously: it connects to a Command and Control server, awaiting new commands or downloading and executing specific malware modules.

 

Detection

 

Currently, the domains in this document are known to be used for Command and Control activity.

 

Any hit in your organisation's Proxy or DNS log files or firewall logs during the last 6 years indicate a compromised host in your organization.

 

Proactive measures

 

- Block access to below mentioned domains and IP addresses.

 

- Reactive measures

 

- Review log files, also those from backups regarding hits on the domains / IP addresses. In case of a hit, identify and isolate the machine by unplugging it from the network. CIRCL can assist with the analysis of memory and file system dumps.

 

Read more...

Gust MEES's insight:

Stay informed...

 

Philip Verghese 'Ariel's curator insight, January 18, 2013 1:31 AM

Overview

Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations.

Scooped by Gust MEES
Scoop.it!

Tageblatt Online - 241 Computer mit Schadsoftware infiziert - Nachrichten

Tageblatt Online - 241 Computer mit Schadsoftware infiziert - Nachrichten | ICT Security-Sécurité PC et Internet | Scoop.it
In Luxemburg waren im Dezember 2011 genau 241 IP-Adressen registriert worden, welche mit Hilfe von Servern in den USA manipuliert wurden. Die Betroffenen sind informiert.
No comment yet.
Scooped by Gust MEES
Scoop.it!

circl-training-2016.pdf

CIRCL offers courses to its members and organizations based in Luxembourg. In their mission to improve information security, CIRCL is sharing its field experience through a set of training or technical courses. Due to diversity of competences within the team, CIRCL is able to provide a large diversity of information security trainings. Courses target technical experts but also non-technical staff in the topics of incident handling, malware analysis, operational security and system forensics. CIRCL sees the trainings and technical course as a great opportunity to learn from their partners, too, and to improve the security handling procedures. By attending the courses, partners are not only helping their own organization but also the overall security in Luxembourg (i.e. it is beneficial for both the organization and CIRCL if the technical staff is prepared for Incident Response). Courses can be held at CIRCL’s training room or the premises of the organization unless specific requirements are noted. Courses however have specific requirements in terms of technical equipment. These requirements are specified in the course description or will be specified before the course starts. CIRCL provides these courses under tailored terms and conditions in order to fit your organizational structure. Don’t hesitate to Contact us for more information.

Gust MEES's insight:

CIRCL offers courses to its members and organizations based in Luxembourg. In their mission to improve information security, CIRCL is sharing its field experience through a set of training or technical courses. Due to diversity of competences within the team, CIRCL is able to provide a large diversity of information security trainings. Courses target technical experts but also non-technical staff in the topics of incident handling, malware analysis, operational security and system forensics. CIRCL sees the trainings and technical course as a great opportunity to learn from their partners, too, and to improve the security handling procedures. By attending the courses, partners are not only helping their own organization but also the overall security in Luxembourg (i.e. it is beneficial for both the organization and CIRCL if the technical staff is prepared for Incident Response). Courses can be held at CIRCL’s training room or the premises of the organization unless specific requirements are noted. Courses however have specific requirements in terms of technical equipment. These requirements are specified in the course description or will be specified before the course starts. CIRCL provides these courses under tailored terms and conditions in order to fit your organizational structure. Don’t hesitate to Contact us for more information.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Luxembourg: CIRCL-Internet safety agency creates tool against cyber attacks

Luxembourg: CIRCL-Internet safety agency creates tool against cyber attacks | ICT Security-Sécurité PC et Internet | Scoop.it
The Computer Incident Response Center in Luxembourg (CIRCL) has developed a new tool to battle security breaches and cyber attacks.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=CIRCL

 

http://www.scoop.it/t/ict-security-tools/?tag=BGP+ranking

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=CASES-LU

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

CIRCL map - potential network attacks targeting IP addresses in Luxembourg

CIRCL map - potential network attacks targeting IP addresses in Luxembourg | ICT Security-Sécurité PC et Internet | Scoop.it
Gust MEES's insight:

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Gust MEES's curator insight, May 13, 2013 12:10 PM

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Gust MEES's curator insight, May 13, 2013 12:14 PM

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Rescooped by Gust MEES from Luxembourg (Europe)
Scoop.it!

Octobre Rouge sur l'Alzette

Octobre Rouge sur l'Alzette | ICT Security-Sécurité PC et Internet | Scoop.it
Le Luxembourg a été mentionné comme une des victimes d’une cyberattaque connue sous le nom de code "Red October"...

 

Les investigations menées par le Computer Emergency Response Team (CERT) gouvernemental permettent de constater que l’attaque a été limitée à une machine du réseau informatique de l’État. L’analyse en détail de l’incident informatique par le CERT gouvernemental a permis de conclure que cette attaque peut être considérée comme n’étant pas exceptionnellement grave.

 

Des mesures de protection adéquates ont été mises en place, qui ont permis un arrêt immédiat de transferts illicites de données. Le gouvernement rappelle dans ce contexte que les mesures tant proactives que réactives mises en œuvre par les services compétents du gouvernement, notamment le Centre des technologies de l’information de l’État, ont permis de maîtriser l’attaque en question.

 

Gust MEES's curator insight, January 17, 2013 12:26 PM

De bonnes infrastructures et des mesures proactives aident à contrer des attaques...

 

                           ===> Proactive Thinking! <===