ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Schweizer Krypto-Technik gegen NSA & Co. | Privacy | ICT | Cryptography

Schweizer Krypto-Technik gegen NSA & Co. | Privacy | ICT | Cryptography | ICT Security-Sécurité PC et Internet | Scoop.it
Mit dem Schweizer Verschlüsselungs-Token IndependenceKey lassen sich ganze Festplatten chiffrieren - und das ohne Hintertüren. Sogar sichere VoIP-Gespräche sollen damit möglich sein.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cryptography


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Cryptography




Gust MEES's insight:
Mit dem Schweizer Verschlüsselungs-Token IndependenceKey lassen sich ganze Festplatten chiffrieren - und das ohne Hintertüren. Sogar sichere VoIP-Gespräche sollen damit möglich sein.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cryptography


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Cryptography


Krishan Maggon 's comment, October 31, 2015 6:21 PM
Gust Hi, does it exist in English or French? If yes, Please post it.
Scooped by Gust MEES
Scoop.it!

Always-On IoT Devices Will Create a Hacker's Paradise | CyberSecurity | ICT | eSkills

Always-On IoT Devices Will Create a Hacker's Paradise | CyberSecurity | ICT | eSkills | ICT Security-Sécurité PC et Internet | Scoop.it
Behind the clouds of opportunity posed by the IoT lurks the harsh reality.


According to Nexusguard in the past seven days the company saw 64 internet-based scans for SSDP services.


In a recent attack the company has tracked 559 edge devices — devices that provide an entry point into enterprise or service provider core networks — that were actively being exploited, with more than half located in the US, China, Bulgaria and Russia.


Mehr erfahren/ En savoir plus / Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
Behind the clouds of opportunity posed by the IoT lurks the harsh reality.


According to Nexusguard in the past seven days the company saw 64 internet-based scans for SSDP services.


In a recent attack the company has tracked 559 edge devices — devices that provide an entry point into enterprise or service provider core networks — that were actively being exploited, with more than half located in the US, China, Bulgaria and Russia.


Mehr erfahren/ En savoir plus / Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

New Windows 10 scam will encrypt your files for ransom | Awareness | DigitalCitiZEN

New Windows 10 scam will encrypt your files for ransom | Awareness | DigitalCitiZEN | ICT Security-Sécurité PC et Internet | Scoop.it

Just days after Microsoft released its latest operating system, hackers have begun targeting soon-to-be Windows 10 users with an emerging kind of malware.


Cisco security researchers are warning users against opening email attachments purporting to be from the software giant. The "ransomware" malware, which encrypts files until a ransom is paid, is being sent as part of an email spam campaign.


Gust MEES's insight:

Just days after Microsoft released its latest operating system, hackers have begun targeting soon-to-be Windows 10 users with an emerging kind of malware.


Cisco security researchers are warning users against opening email attachments purporting to be from the software giant. The "ransomware" malware, which encrypts files until a ransom is paid, is being sent as part of an email spam campaign.


No comment yet.
Rescooped by Gust MEES from E-Learning-Inclusivo (Mashup)
Scoop.it!

"Learners" know more than you about learning

"Learners" know more than you about learning | ICT Security-Sécurité PC et Internet | Scoop.it
Stop trying to control everything. Learners know best.


The learners know more than you do about what learning experiences are right for them.
I don’t think we should necessarily build our own versions of YouTube, Pinterest, Twitter etc either, we just need to be the champions of these tools for learning.
In someways, L&D’s job should be much easier than we’re making it and in other ways, with the entrenched spoon-feeding learners have come to expect from corporate training, it’s much harder then it seems. What I’d hope you take away from this post is that there is a new way, and it’s your job (if you work in learning) to explain this to decision-makers who don’t know any better.
.
Learn more:
.
.

Via juandoming
Gust MEES's insight:
Stop trying to control everything. Learners know best.


The learners know more than you do about what learning experiences are right for them.
I don’t think we should necessarily build our own versions of YouTube, Pinterest, Twitter etc either, we just need to be the champions of these tools for learning.
In someways, L&D’s job should be much easier than we’re making it and in other ways, with the entrenched spoon-feeding learners have come to expect from corporate training, it’s much harder then it seems. What I’d hope you take away from this post is that there is a new way, and it’s your job (if you work in learning) to explain this to decision-makers who don’t know any better.
Learn more:
No comment yet.
Scooped by Gust MEES
Scoop.it!

Smart Home Sicherheit: Schwachstellen & Schutzmaßnahmen | IoT | IoE | Internet of Things | CyberSecurity

Smart Home Sicherheit: Schwachstellen & Schutzmaßnahmen | IoT | IoE | Internet of Things | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Auch im Smart Home sollten Sie auf Sicherheit achten. Wir zeigen Schwachstellen und verraten, welche Schutzmaßnahmen Sie treffen können.




Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
Auch im Smart Home sollten Sie auf Sicherheit achten. Wir zeigen Schwachstellen und verraten, welche Schutzmaßnahmen Sie treffen können.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

Bruce Schneier: 'We're in early years of a cyber arms race' | CyberSecurity

Bruce Schneier: 'We're in early years of a cyber arms race' | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
LinuxCon 2015 Security guru Bruce Schneier says there's a kind of cold war now being waged in cyberspace, only the trouble is we don't always know who we're waging it against.

Schneier appeared onscreen via Google Hangouts at the LinuxCon/CloudOpen/Containercon conference in Seattle on Tuesday to warn attendees that the modern security landscape is becoming increasingly complex and dangerous.

"We know, on the internet today, that attackers have the advantage," Schneier said. "A sufficiently funded, skilled, motivated adversary will get in. And we have figure out how to deal with that."

Using the example of last November's crippling online attack against Sony Pictures, Schneier said it was clear that many of these new attacks were the work of well-funded nation-states.

"Many of us, including myself, were skeptical for several months. By now it does seem obvious that it was North Korea, as amazing as that sounds," he said.

But what's troubling about many of these new attacks, he added, is that they can be hard to spot when they don't come in the form that security experts typically expect.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattack


http://www.scoop.it/t/securite-pc-et-internet



Gust MEES's insight:
LinuxCon 2015 Security guru Bruce Schneier says there's a kind of cold war now being waged in cyberspace, only the trouble is we don't always know who we're waging it against.

Schneier appeared onscreen via Google Hangouts at the LinuxCon/CloudOpen/Containercon conference in Seattle on Tuesday to warn attendees that the modern security landscape is becoming increasingly complex and dangerous.

"We know, on the internet today, that attackers have the advantage," Schneier said. "A sufficiently funded, skilled, motivated adversary will get in. And we have figure out how to deal with that."

Using the example of last November's crippling online attack against Sony Pictures, Schneier said it was clear that many of these new attacks were the work of well-funded nation-states.

"Many of us, including myself, were skeptical for several months. By now it does seem obvious that it was North Korea, as amazing as that sounds," he said.

But what's troubling about many of these new attacks, he added, is that they can be hard to spot when they don't come in the form that security experts typically expect.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattack


http://www.scoop.it/t/securite-pc-et-internet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware on Linux - When Penguins Attack | NobodyIsPerfect | ICT | eSkills | CyberSecurity

Malware on Linux - When Penguins Attack | NobodyIsPerfect | ICT | eSkills | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
What about malware on Linux?

Here's how the argument might go if you were to ask that question:

Malware is impossible on Linux because Linux is secure by design, unlike Windows.
Even if Linux malware were possible, users would have to agree to run it, so that wouldn't count.
Even if users agreed to run it, they wouldn't be root, so that wouldn't count.
Even if they were root, who cares? There isn't any malware for Linux, so there.
The simple truth, of course, is that Linux is much more similar to Windows – in design, implementation and real-world security – than it is different.

As a result: there is malware for Linux; it can do plenty of harm even if you aren't root; and it may be able to infect without you realising.

Just like on Windows.

For all that, the "malware scene" on Linux simply never unfolded like it did on Windows, because the vast


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


Gust MEES's insight:
What about malware on Linux?

Here's how the argument might go if you were to ask that question:

Malware is impossible on Linux because Linux is secure by design, unlike Windows.
Even if Linux malware were possible, users would have to agree to run it, so that wouldn't count.
Even if users agreed to run it, they wouldn't be root, so that wouldn't count.
Even if they were root, who cares? There isn't any malware for Linux, so there.
The simple truth, of course, is that Linux is much more similar to Windows – in design, implementation and real-world security – than it is different.

As a result: there is malware for Linux; it can do plenty of harm even if you aren't root; and it may be able to infect without you realising.

Just like on Windows.

For all that, the "malware scene" on Linux simply never unfolded like it did on Windows, because the vast


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


No comment yet.