ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Serious security: Three changes that could turn the tide on hackers | #ProactiveTHINKing #CyberSecurity

Serious security: Three changes that could turn the tide on hackers | #ProactiveTHINKing #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
It's all gone. All the passwords, all the user names, all the credit card numbers, the selfies, the fingerprints, the emails.

The state of tech security is currently so dire that it feels like anything you have ever stored on a computer, or a company or government has ever stored about you, has already been hacked into by somebody.

It's become so bad that it's already generated a mirthless cliché -- that there are only two types of companies: the ones that have been hacked and the ones that don't yet know they've been hacked.

 

So what can we do? I'd suggest three decent starting points.

 

First, as consumers we need to stop shrugging and accepting data leaks as business as usual. Security should influence our buying decisions: the organisations we deal with won't take security seriously unless customers and the public do, too. Our behaviour should signal to companies that good security can be a competitive differentiator. At the moment our apathy too often lets them off the hook. We as consumers need to understand the value of our data and then hold those that store it to account.

 

Second, companies should design security as a fundamental part of the services we use, not a nice-to-have addition. Few hackers will give a new service time to implement security before attacking it, yet too many innovations (the IoT, I'm looking at you) seem to think security is a secondary consideration until they make it big. Until that changes, security will always be an afterthought.

 

Third, the use of strong encryption should be the standard, not the exception. The digital services we use are now too intimate, too important, to be left unencrypted. The revelations of the last few years have shown us that no stream of data on the internet will go untapped by crooks or government.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

Gust MEES's insight:
It's all gone. All the passwords, all the user names, all the credit card numbers, the selfies, the fingerprints, the emails.

The state of tech security is currently so dire that it feels like anything you have ever stored on a computer, or a company or government has ever stored about you, has already been hacked into by somebody.

It's become so bad that it's already generated a mirthless cliché -- that there are only two types of companies: the ones that have been hacked and the ones that don't yet know they've been hacked.

 

So what can we do? I'd suggest three decent starting points.

 

First, as consumers we need to stop shrugging and accepting data leaks as business as usual. Security should influence our buying decisions: the organisations we deal with won't take security seriously unless customers and the public do, too. Our behaviour should signal to companies that good security can be a competitive differentiator. At the moment our apathy too often lets them off the hook. We as consumers need to understand the value of our data and then hold those that store it to account.

 

Second, companies should design security as a fundamental part of the services we use, not a nice-to-have addition. Few hackers will give a new service time to implement security before attacking it, yet too many innovations (the IoT, I'm looking at you) seem to think security is a secondary consideration until they make it big. Until that changes, security will always be an afterthought.

 

Third, the use of strong encryption should be the standard, not the exception. The digital services we use are now too intimate, too important, to be left unencrypted. The revelations of the last few years have shown us that no stream of data on the internet will go untapped by crooks or government.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple's OS X and Safari get biggish security fixes

Apple's OS X and Safari get biggish security fixes | ICT Security-Sécurité PC et Internet | Scoop.it

Apple has published updates for all supported versions of OS X and for Safari version 6.

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 


Via Gust MEES
Gust MEES's insight:

 

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

===> NOBODY IS PERFECT!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 5, 2013 1:21 PM

 

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

===> NOBODY IS PERFECT!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 5, 2013 1:29 PM

 

===> A largish number of remote code execution vulnerabilities have been patched, so these aren't just cosmetic... <===

 

===> NOBODY IS PERFECT!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Prediction BYOD may go away in 2013

Prediction BYOD may go away in 2013 | ICT Security-Sécurité PC et Internet | Scoop.it
With a new year come new challenges. But while many see bringyourowndevice gaining momentum, more organizations may be ready to issue their own handhelds to employees.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacktivists and cybercriminals: Is there really a difference?

Hacktivists and cybercriminals: Is there really a difference? | ICT Security-Sécurité PC et Internet | Scoop.it
I always look at security reports with skepticism. It's too easy to spin the numbers and motives in ways that distort the true meaning of what's been found.
No comment yet.
Scooped by Gust MEES
Scoop.it!

In der Kritik: Die umstrittenen Empfehlungen des BSI

In der Kritik: Die umstrittenen Empfehlungen des BSI | ICT Security-Sécurité PC et Internet | Scoop.it
Chrome als sicherster Browser? Ausschließlich Gratis-Virenschutz? Gefährliches 32-Bit-Windows? Die zwiespältigen Tipps des BSI.
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why aren't we learning long-term lessons from security disasters?

Why aren't we learning long-term lessons from security disasters? | ICT Security-Sécurité PC et Internet | Scoop.it
Shouldn't we be thinking further ahead, developing new protocols, processes and technologies that don't stick a hasty patch over the latest problem, but push us towards a world where whole categori...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

Scooped by Gust MEES
Scoop.it!

Teaching Students (and Teachers) to Dig Deeper

Teaching Students (and Teachers) to Dig Deeper | ICT Security-Sécurité PC et Internet | Scoop.it

A backwoodsman went to a home improvement store and purchased a chainsaw to replace an old, worn-out saw. After a month, the backwoodsman returned the saw to the store, complaining,

 

===> In order to think critically, one must understand what one is criticizing. The way to understand something is to look at it analytically... <===



 

 

Gust MEES's insight:

 

===> In order to think critically, one must understand what one is criticizing. The way to understand something is to look at it analytically... <===

 Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Critical-Thinking&nbsp;-&nbsp;http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking&nbsp;There is much more, BUT start first with the mentioned above ;) 
No comment yet.
Scooped by Gust MEES
Scoop.it!

France's Anti-Script Kiddie Strategy

France's Anti-Script Kiddie Strategy | ICT Security-Sécurité PC et Internet | Scoop.it
Tomorrow is a significant day in the history of the French language. AFNIC, a French organization that manages domain names, will authorize .FR, .RE, .PM, .YT, .WF, and .TF domain owners to register the accented form of their domain that currently don't contain accents.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Governments must recruit underground for cyber security

Governments must recruit underground for cyber security | ICT Security-Sécurité PC et Internet | Scoop.it
The Indian government will continue to be attacked until officials begin to recruit hackers from the underground, a cyber security specialist has said.
No comment yet.