ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Another Linux community with malware woes | #CyberSecurity #NobodyIsPerfect #ArchLinux

Another Linux community with malware woes | #CyberSecurity #NobodyIsPerfect #ArchLinux | ICT Security-Sécurité PC et Internet | Scoop.it

Another day, another Linux community with malware woes.

Last time it was Gentoo, a hard-core, source-based Linux distribution that is popular with techies who like to spend hours tweaking their entire operating sytem and rebuilding all their software from scratch to wring a few percentage points of performance out of it.

That sort of thing isn’t for everyone, but it’s harmless fun and it does give you loads of insight into how everything fits together.

That sets it apart from distros such as ElementaryOS and Mint, which rival and even exceed Windows and macOS for ease of installation and use, but don’t leave you with much of a sense of how it all actually works.

This time, the malware poisoning happened to Arch Linux, another distro we’d characterise as hard-core, though very much more widely used than Gentoo.

Three downloadable software packages in the AUR, short for Arch User Respository, were found to have been rebuilt so they contained what you might (perhaps slightly unkindly) refer to as zombie downloader robot overlord malware.

Bots or zombies are malware programs that call home to fetch instructions from the crooks on what to do next.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

 
Gust MEES's insight:

Another day, another Linux community with malware woes.

Last time it was Gentoo, a hard-core, source-based Linux distribution that is popular with techies who like to spend hours tweaking their entire operating sytem and rebuilding all their software from scratch to wring a few percentage points of performance out of it.

That sort of thing isn’t for everyone, but it’s harmless fun and it does give you loads of insight into how everything fits together.

That sets it apart from distros such as ElementaryOS and Mint, which rival and even exceed Windows and macOS for ease of installation and use, but don’t leave you with much of a sense of how it all actually works.

This time, the malware poisoning happened to Arch Linux, another distro we’d characterise as hard-core, though very much more widely used than Gentoo.

Three downloadable software packages in the AUR, short for Arch User Respository, were found to have been rebuilt so they contained what you might (perhaps slightly unkindly) refer to as zombie downloader robot overlord malware.

Bots or zombies are malware programs that call home to fetch instructions from the crooks on what to do next.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Ransomware extorts Los Angeles school to the tune of $28,000 | #CyberSecurity #EDUcation 

Ransomware extorts Los Angeles school to the tune of $28,000 | #CyberSecurity #EDUcation  | ICT Security-Sécurité PC et Internet | Scoop.it

Blackmailers have claimed another scalp, extorting US $28,000 from a school hit by a ransomware attack. Los Angeles Community College District...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:

Blackmailers have claimed another scalp, extorting US $28,000 from a school hit by a ransomware attack. Los Angeles Community College District...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Court Rules that the NSA's Justification for Surveillance Is Bullshit | Privacy

Court Rules that the NSA's Justification for Surveillance Is Bullshit | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Another flimsy justification for mass surveillance bites the dust— the Second Circuit court ruled today that Section 215 of the Patriot Act does not give the National Security Agency any authority to collect metadata. In other words: the NSA’s phone snooping program is straight-up unlawful.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Another flimsy justification for mass surveillance bites the dust— the Second Circuit court ruled today that Section 215 of the Patriot Act does not give the National Security Agency any authority to collect metadata. In other words: the NSA’s phone snooping program is straight-up unlawful.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA



No comment yet.
Scooped by Gust MEES
Scoop.it!

BIOS-Rootkit LightEater | Selbst der Austausch der Festplatte hilft nicht!!!

BIOS-Rootkit LightEater | Selbst der Austausch der Festplatte hilft nicht!!! | ICT Security-Sécurité PC et Internet | Scoop.it
Ein Rootkit, das unabhängig vom Betriebssystem operiert, sämtlichen Speicher auslesen kann und durch den Tausch der Festplatte im System nicht gestoppt wird – was klingt wie eine IT-Gruselgeschichte haben zwei Forscher nun öffentlich präsentiert.
Gust MEES's insight:

Ein Rootkit, das unabhängig vom Betriebssystem operiert, sämtlichen Speicher auslesen kann und durch den Tausch der Festplatte im System nicht gestoppt wird – was klingt wie eine IT-Gruselgeschichte haben zwei Forscher nun öffentlich präsentiert.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Massenüberwachung: Wikipedia verklagt NSA | Privacy | Human Rights

Massenüberwachung: Wikipedia verklagt NSA | Privacy | Human Rights | ICT Security-Sécurité PC et Internet | Scoop.it
Die Bürgerrechtsorganisation American Civil Liberties Union (ACLU) hat im Namen der Wikimedia Foundation und weiteren US-Organisationen Klage gegen die NSA eingereicht. Die Bürgerrechtler bezweifeln, dass die massenhafte Speicherung von Kommunikationsdaten verfassungskonform ist.
Gust MEES's insight:

Die Bürgerrechtsorganisation American Civil Liberties Union (ACLU) hat im Namen der Wikimedia Foundation und weiteren US-Organisationen Klage gegen die NSA eingereicht. Die Bürgerrechtler bezweifeln, dass die massenhafte Speicherung von Kommunikationsdaten verfassungskonform ist.


No comment yet.
Scooped by Gust MEES
Scoop.it!

3 million strong RAMNIT botnet taken down | CyberCrime | CyberSecurity

3 million strong RAMNIT botnet taken down | CyberCrime | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
3 million strong RAMNIT botnet taken down
Posted on 25.02.2015
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol’s European Cybercrime Centre (EC3), to shut down command and control servers used by the RAMNIT botnet.

RAMNIT spread malware via seemingly trustworthy links sent out on phishing emails or social networking websites. If users running Windows clicked on the links, the malware would be installed, infecting the computer. Infected computers would then be under the control of criminals, enabling them to access personal or banking information, steal passwords and disable antivirus protection.

Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts. Analysis is now taking place on the servers and an investigation is ongoing.
Gust MEES's insight:

3 million strong RAMNIT botnet taken down
Posted on 25.02.2015
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol’s European Cybercrime Centre (EC3), to shut down command and control servers used by the RAMNIT botnet.

RAMNIT spread malware via seemingly trustworthy links sent out on phishing emails or social networking websites. If users running Windows clicked on the links, the malware would be installed, infecting the computer. Infected computers would then be under the control of criminals, enabling them to access personal or banking information, steal passwords and disable antivirus protection.

Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts. Analysis is now taking place on the servers and an investigation is ongoing.


No comment yet.
Scooped by Gust MEES
Scoop.it!

CMS: Sicherheitslücke in Typo3 ===> Update asap!!! <=== | CyberSecurity | Awareness

CMS: Sicherheitslücke in Typo3 ===> Update asap!!! <=== | CyberSecurity | Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

Über eine gravierende Sicherheitslücke in alten Versionen des CMS Typo3 kann sich jeder authentifizieren, der nur den Namen eines registrierten Benutzers kennt. Es gibt Updates und einen Patch.

Gust MEES's insight:

Über eine gravierende Sicherheitslücke in alten Versionen des CMS Typo3 kann sich jeder authentifizieren, der nur den Namen eines registrierten Benutzers kennt. Es gibt Updates und einen Patch.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Teen hacks car with $15 worth of parts | Internet of Things | Internet of Everything | CyberSecurity

Teen hacks car with $15 worth of parts | Internet of Things | Internet of Everything | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

Lenovo admits security issues with Superfish, releases removal tool | CyberSecurity | Adware

Lenovo admits security issues with Superfish, releases removal tool | CyberSecurity | Adware | ICT Security-Sécurité PC et Internet | Scoop.it
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden-Papier: Geheimdienste entschlüsseln SIM-Karten | Cyberespionage | CyberSecurity | Privacy

Snowden-Papier: Geheimdienste entschlüsseln SIM-Karten | Cyberespionage | CyberSecurity | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Die Geheimdienste der USA und Großbritanniens können offenbar die SIM-Karten in Mobiltelefonen entschlüsseln. Das berichtet die Internetseite "The Intercept". Handys seien somit unauffällig anzapfbar. Der Bericht bezieht sich auf ein Snowden-Papier.


===> Der gläserne Surfer!!! <===


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards



Gust MEES's insight:
Die Geheimdienste der USA und Großbritanniens können offenbar die SIM-Karten in Mobiltelefonen entschlüsseln. Das berichtet die Internetseite "The Intercept". Handys seien somit unauffällig anzapfbar. Der Bericht bezieht sich auf ein Snowden-Papier.


===> Der gläserne Surfer!!! <===


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards



No comment yet.
Scooped by Gust MEES
Scoop.it!

What You Need to Know About Superfish | LENOVO | Adware | CyberSecurity | Ethics

What You Need to Know About Superfish | LENOVO | Adware | CyberSecurity | Ethics | ICT Security-Sécurité PC et Internet | Scoop.it
FAQ about the man-in-the-middle adware installed on Lenovo PCs.



Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
FAQ about the man-in-the-middle adware installed on Lenovo PCs.



Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Lenovo's Bundled Adware Comes With A Big Security Problem | Adware | CyberSecurity #Ethics

Lenovo's Bundled Adware Comes With A Big Security Problem | Adware | CyberSecurity #Ethics | ICT Security-Sécurité PC et Internet | Scoop.it

We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought. 


The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO



Gust MEES's insight:

We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought. 


The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Onion.city - a search engine bringing the Dark Web into the light

Onion.city - a search engine bringing the Dark Web into the light | ICT Security-Sécurité PC et Internet | Scoop.it
Last week, user Virgil Griffith went onto the Tor-talk mailing list and announced Onion City, a Dark Web search engine that allows regular web users to delve into the Dark Web.


The search engine delves into the anonymous Tor network, finds .onion sites and makes them available to regular users on the ordinary World Wide Web.


Up to now the best way to search for .onion sites has been to get on the Tor network using something like the Tor browser, but Onion City effectively does that bit for you so you can search from the comfort of your favourite, insecure web browser.


Gust MEES's insight:
Last week, user Virgil Griffith went onto the Tor-talk mailing list and announced Onion City, a Dark Web search engine that allows regular web users to delve into the Dark Web.


The search engine delves into the anonymous Tor network, finds .onion sites and makes them available to regular users on the ordinary World Wide Web.


Up to now the best way to search for .onion sites has been to get on the Tor network using something like the Tor browser, but Onion City effectively does that bit for you so you can search from the comfort of your favourite, insecure web browser.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hijackers deface 800 school websites with pro-Islamic State messages | #US #CyberSecurity #iFrame

Hijackers deface 800 school websites with pro-Islamic State messages | #US #CyberSecurity #iFrame | ICT Security-Sécurité PC et Internet | Scoop.it
Early Monday morning, the websites for about 800 US schools and school districts were hijacked and replaced with an image of Saddam Hussein on a black background, a recruitment video in Arabic and the statement “I Love Islamic State” in English, according Jim Brogan, director of technology services for schools in Gloucester County, Virginia.

This should all ring a bell, given that hackers going by the same name have been more or less making the same defacements for years. Namely, a photo of Hussein accompanied by an Arabic message seen on an IS flag that reportedly reads “There is no god but Allah” and “Mohammed is the Messenger of God.”

According to the International Business Times, the web hosting company that services the sites – SchoolDesk, in Atlanta – confirmed the attack and said that a group going by the name “Team System DZ” claimed responsibility.

SchoolDesk’s statement:

Our technical staff discovered that a small file had been injected into the root of one of the SchoolDesk websites, redirecting approximately 800 school and district websites to an iFramed YouTube page containing an audible Arabic message, unknown writing and a picture of Saddam Hussein.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=US

 

Gust MEES's insight:
Early Monday morning, the websites for about 800 US schools and school districts were hijacked and replaced with an image of Saddam Hussein on a black background, a recruitment video in Arabic and the statement “I Love Islamic State” in English, according Jim Brogan, director of technology services for schools in Gloucester County, Virginia.

This should all ring a bell, given that hackers going by the same name have been more or less making the same defacements for years. Namely, a photo of Hussein accompanied by an Arabic message seen on an IS flag that reportedly reads “There is no god but Allah” and “Mohammed is the Messenger of God.”

According to the International Business Times, the web hosting company that services the sites – SchoolDesk, in Atlanta – confirmed the attack and said that a group going by the name “Team System DZ” claimed responsibility.

SchoolDesk’s statement:

Our technical staff discovered that a small file had been injected into the root of one of the SchoolDesk websites, redirecting approximately 800 school and district websites to an iFramed YouTube page containing an audible Arabic message, unknown writing and a picture of Saddam Hussein.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=US

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Surgical robots hacked by researchers to alter commands and disrupt functions | CyberSecurity

Surgical robots hacked by researchers to alter commands and disrupt functions | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
University of Washington researchers mount cyberattacks on surgical robot, exposing vulnerabilities.


Security vulnerabilities in surgical robots have been exposed by researchers, who hacked next generation systems to prove that they could be hijacked remotely.

Researchers from the University of Washington (UW) carried out a series of cyberattacks on teleoperated (remotely operated) surgical robots using non-private networks.

Various attack techniques were utilised, including a denial-of-service (DoS) attack that overloaded the robot with useless data and made it difficult to operate.

A "man in the middle" attack succeeded in altering the commands sent from the operator to the robot, disrupting a wide range of the machine's functions. 

Gust MEES's insight:

Security vulnerabilities in surgical robots have been exposed by researchers, who hacked next generation systems to prove that they could be hijacked remotely.

Researchers from the University of Washington (UW) carried out a series of cyberattacks on teleoperated (remotely operated) surgical robots using non-private networks.

Various attack techniques were utilised, including a denial-of-service (DoS) attack that overloaded the robot with useless data and made it difficult to operate.

A "man in the middle" attack succeeded in altering the commands sent from the operator to the robot, disrupting a wide range of the machine's functions. 

Scooped by Gust MEES
Scoop.it!

NSA-Skandal: Gericht erklärt US-Telefonüberwachung für gesetzeswidrig | Privacy

NSA-Skandal: Gericht erklärt US-Telefonüberwachung für gesetzeswidrig | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Ein US-Berufungsgericht hat entschieden, dass die Überwachung aller US-Telefonate nicht durch den dafür herangezogenen Patriot Act legitimiert ist. Wie sich die Entscheidung auf die derzeit verhandelte Verlängerung des Patriot Act auswirkt, ist unklar.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Ein US-Berufungsgericht hat entschieden, dass die Überwachung aller US-Telefonate nicht durch den dafür herangezogenen Patriot Act legitimiert ist. Wie sich die Entscheidung auf die derzeit verhandelte Verlängerung des Patriot Act auswirkt, ist unklar.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA



No comment yet.
Scooped by Gust MEES
Scoop.it!

Networked Healthcare and the Internet of Things | CyberSecurity Awareness | Privacy

Networked Healthcare and the Internet of Things | CyberSecurity Awareness | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
The Internet of Things (IoT) is upon us and it is not only moving into our homes through our networks and refrigerators, it is also moving into our bodies through networked medical devices. Wearable, temporarily ingested, or even embedded devices for medical treatment, medication and general health and wellness represent the future of healthcare. The advancements can come in the form of high-tech medical equipment like insulin pumps and pacemakers, but they can also be the Fitbits and other health monitoring devices commonly found on the wrists and in the pockets of the general public.


There is no doubt that networked healthcare offers numerous benefits, not only to the individuals involved, but to the healthcare industry as a whole — one estimate notes that these technologies could save $63 billion in healthcare costs over 15 years with a 15-to-30 percent reduction in hospital equipment costs. But if security is just an afterthought, and the technologies greatly outpace their protection, then we’ll be exposing the entire healthcare ecosystem to risks.


Mehr erfahren / Learn more / En savoir plus:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:
The Internet of Things (IoT) is upon us and it is not only moving into our homes through our networks and refrigerators, it is also moving into our bodies through networked medical devices. Wearable, temporarily ingested, or even embedded devices for medical treatment, medication and general health and wellness represent the future of healthcare. The advancements can come in the form of high-tech medical equipment like insulin pumps and pacemakers, but they can also be the Fitbits and other health monitoring devices commonly found on the wrists and in the pockets of the general public.


There is no doubt that networked healthcare offers numerous benefits, not only to the individuals involved, but to the healthcare industry as a whole — one estimate notes that these technologies could save $63 billion in healthcare costs over 15 years with a 15-to-30 percent reduction in hospital equipment costs. But if security is just an afterthought, and the technologies greatly outpace their protection, then we’ll be exposing the entire healthcare ecosystem to risks.


Mehr erfahren / Learn more / En savoir plus:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Lenovo.com hijacking made possible by compromise of Webnic registrar | CyberSecurity

Lenovo.com hijacking made possible by compromise of Webnic registrar | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Lenovo simply can't catch a break. After the massive negative attention it received for their ill-advised decision to ship some of its notebooks with pre-installed adware that also uses MITM SSL certificates, for a short time on Wednesday their main domain - Lenovo.com - has been hijacked and effectively defaced by the hacker collective Lizard Squad.

The defaced page showed a slideshow of photos of two youngsters - according to Brian Krebs, they are Ryan King (aka “Starfall”) and Rory Andrew Godfrey (“KMS”), two former members of the hacker collective Hack The Planet - accompanied with music. The reason for the defacement is purportedly Lenovo's Superfish blunder.

The defaced page pointed to Lizard Squad's Twitter feed and served as an advertisement for its LizardStresser DoS service.

The hackers didn't compromise Lenovo's servers. Instead, they (apparently) compromised those of Web Commerce Communications (Webnic.cc), a popular Malaysia-based Internet registrar with whom the Lenovo domain is registered.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Executive Cyber Intelligence Report: Februrary 23, 2015 | CyberSecurity

Executive Cyber Intelligence Report: Februrary 23, 2015 | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

This report was prepared by INSS and CSFI to create better cyber situational awareness of the nature and scope of threats to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-­up measures.


Gust MEES's insight:

This report was prepared by INSS and CSFI to create better cyber situational awareness of the nature and scope of threats to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-­up measures.


Oksana Borukh's curator insight, March 6, 2015 1:46 AM

Quoted:

This report was prepared by The Institute for National Security Studies (INSS) and The Cyber Security Forum Initiative (CSFI) to create better cyber situational awareness (Cyber SA) of the nature and scope of threats and hazards to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-­up measures.

Scooped by Gust MEES
Scoop.it!

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity

Gust MEES's insight:

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity


No comment yet.
Scooped by Gust MEES
Scoop.it!

Größter Mobilfunkskandal aller Zeiten: NSA hat seit 2010 Zugriff auf Handy-SIM-Karten weltweit | Cyberespionage

Größter Mobilfunkskandal aller Zeiten: NSA hat seit 2010 Zugriff auf Handy-SIM-Karten weltweit | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

 CyberespionageIn einem der folgenreichsten Hacks der IT-Geschichte verschafften sich amerikanischer und britischer Geheimdienst Zugang zum größten Handy-SIM-Karten-Hersteller der Welt und klauten dort die Verschlüsselungskeys, mit denen nahezu jede SIM weltweit gesichert ist. Damit haben NSA und GCHQ seit 2010 Zugriff auf Telefonate, SMS und mobile Internet-Verbindungen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


 

Gust MEES's insight:

CyberespionageIn einem der folgenreichsten Hacks der IT-Geschichte verschafften sich amerikanischer und britischer Geheimdienst Zugang zum größten Handy-SIM-Karten-Hersteller der Welt und klauten dort die Verschlüsselungskeys, mit denen nahezu jede SIM weltweit gesichert ist. Damit haben NSA und GCHQ seit 2010 Zugriff auf Telefonate, SMS und mobile Internet-Verbindungen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Geheimdienste unterwandern SIM- und Kreditkarten | Cyberespionage | Privacy | CyberSecurity

Geheimdienste unterwandern SIM- und Kreditkarten | Cyberespionage | Privacy | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Seit Jahren kopieren NSA und GCHQ bei den Herstellern von SIM-Karten und Smart Cards die zugehörigen Schlüssel ab. Damit können sie die übertragenen Informationen mitlesen und manipulieren. Auch die Rechnungssysteme vieler Mobilfunker sind unterwandert.

Der britische Geheimdienst GCHQ und die US-amerikanische NSA haben schon vor Jahren die Sicherheitsvorkehrungen der Chiphersteller ausgehebelt. Also sind SIM-Karten, elektronische Reisepässe, Kredit- und Debitkarten, elektronische Türöffner, TAN-Generatoren und so weiter unsicher. Den darin verbauten Chips und den mit ihnen fix verbundenen Schlüsseln kann nicht mehr vertraut werden. Die Dienste können beispielsweise mobile Übertragungen einfach mitlesen oder rückwirkend entschlüsseln. Und es ist schlimmer.


SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


Gust MEES's insight:

Seit Jahren kopieren NSA und GCHQ bei den Herstellern von SIM-Karten und Smart Cards die zugehörigen Schlüssel ab. Damit können sie die übertragenen Informationen mitlesen und manipulieren. Auch die Rechnungssysteme vieler Mobilfunker sind unterwandert.

Der britische Geheimdienst GCHQ und die US-amerikanische NSA haben schon vor Jahren die Sicherheitsvorkehrungen der Chiphersteller ausgehebelt. Also sind SIM-Karten, elektronische Reisepässe, Kredit- und Debitkarten, elektronische Türöffner, TAN-Generatoren und so weiter unsicher. Den darin verbauten Chips und den mit ihnen fix verbundenen Schlüsseln kann nicht mehr vertraut werden. Die Dienste können beispielsweise mobile Übertragungen einfach mitlesen oder rückwirkend entschlüsseln. Und es ist schlimmer.


SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards




No comment yet.
Scooped by Gust MEES
Scoop.it!

Until Superfish fix, Lenovo devices can't be trusted for secure work | CyberSecurity | Adware

Until Superfish fix, Lenovo devices can't be trusted for secure work  | CyberSecurity | Adware | ICT Security-Sécurité PC et Internet | Scoop.it
Enterprise customers are not said to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Enterprise customers are not said to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Scandale "Superfish" : quand Lenovo installe des malwares dans ses PC | Adware | CyberSecurity #Ethics

Scandale "Superfish" : quand Lenovo installe des malwares dans ses PC | Adware | CyberSecurity #Ethics | ICT Security-Sécurité PC et Internet | Scoop.it


Un logiciel préinstallé dans des PC Lenovo compromet gravement la sécurité des échanges chiffrés via SSL.




Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO

Gust MEES's insight:
Un logiciel préinstallé dans des PC Lenovo compromet gravement la sécurité des échanges chiffrés via SSL.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

PC-Adware von Lenovo korrumpiert SSL/TLS | Adware | CyberSecurity | Ethics

PC-Adware von Lenovo korrumpiert SSL/TLS | Adware | CyberSecurity | Ethics | ICT Security-Sécurité PC et Internet | Scoop.it
Der PC-Hersteller Lenovo installiert auf seine neuen PCs anscheinend Adware ab Werk, die im Browser Zusatz-Werbung anzeigt und sichere SSL/TLS-Verbindungen korrumpiert.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Der PC-Hersteller Lenovo installiert auf seine neuen PCs anscheinend Adware ab Werk, die im Browser Zusatz-Werbung anzeigt und sichere SSL/TLS-Verbindungen korrumpiert.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.