ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

#BYOD: Mobile malware growth hits all-time high

#BYOD: Mobile malware growth hits all-time high | ICT Security-Sécurité PC et Internet | Scoop.it
Researchers continue to find that the pace of mobile malware development is accelerating.

 

Researchers continue to find that the pace of mobile malware development is accelerating.A total of 22,750 new modifications of malicious programs targeting mobile devices were detected this past quarter by Kaspersky Lab, which is more than half of the total number of modifications detected in all of 2012.A full 99.9% of them target the Android platform.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | ICT Security-Sécurité PC et Internet | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.

 

So why is this important? It highlights the reality of the threat landscape.

 

The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.

 

 

 

 

 

Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:07 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Scooped by Gust MEES
Scoop.it!

In The Security World, Android Is The New Windows

In The Security World, Android Is The New Windows | ICT Security-Sécurité PC et Internet | Scoop.it

 

 

Android is now the focus for security attacks and prevention — even if it doesn't get as much attention in this regard as Windows used to.

 

Ironically, as Android's secuirty issues grow, Windows is actually getting better. "Microsoft deserves kudos for making Windows more and more secure," Cobb said. And with the move to Windows 8, Microsoft is shifting toward a more closed, more secure model, specifically by by not allowing apps unless they are from a legitimate developer.

 

Plus, Windows' issues over the years have had the effect of training people to be more careful. "Someone who's been using Windows for the last 10 years is probably better protected than a Mac person," Cobb joked. "They've had to learn the hard way."



Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Android

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security in 2013: The rise of mobile malware and fall of hacktivism | PCWorld

Security in 2013: The rise of mobile malware and fall of hacktivism | PCWorld | ICT Security-Sécurité PC et Internet | Scoop.it
McAfee makes some predictions about what to expect and trends to watch for security in 2013.
Gust MEES's insight:

                       ===> Be AWARE of the MALWARE! <===

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Spoofing, banking attacks, authentication flaws, and more top the list of 2012's biggest mobile security headaches
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

McAfee : comment sécuriser les Smartphones, tablettes et autres Xbox - Global Security Mag Online

McAfee : comment sécuriser les Smartphones, tablettes et autres Xbox - Global Security Mag Online | ICT Security-Sécurité PC et Internet | Scoop.it
Au même titre que les années passées, les appareils connectés et en particulier les tablettes et les smartphones, seront sûrement dans de nombreuses (...)
No comment yet.
Scooped by Gust MEES
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Android botnet abuses people's phones for SMS spam

Android botnet abuses people's phones for SMS spam | ICT Security-Sécurité PC et Internet | Scoop.it
Security vendor Cloudmark says it is the first time they've detected a botnet that abuses other people's phones to send spam
No comment yet.
Scooped by Gust MEES
Scoop.it!

Sophisticated botnet steals more than $47M by infecting PCs and phones

Sophisticated botnet steals more than $47M by infecting PCs and phones | ICT Security-Sécurité PC et Internet | Scoop.it
Intercepts SMS messages from bank, defeating two-factor authentication.

 

A new version of the Zeus trojan—a longtime favorite of criminals conducting online financial fraud—has been used in attacks on over 30,000 electronic banking customers in Europe, ===> infecting both their personal computers and smartphones. <===

 

The sophisticated attack is designed to circumvent banks' use of two-factor authentication for transactions by intercepting messages sent by the bank to victims' mobile phones.

 

Read more, a MUST:

http://arstechnica.com/security/2012/12/sophisticated-botnet-steals-more-than-47m-by-infecting-pcs-and-phones/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The global expansion of cybercrime

The global expansion of cybercrime | ICT Security-Sécurité PC et Internet | Scoop.it

McAfee released a new report which explores techniques in cybercrime as well as the global evolution of cyber exploits. It uncovers new details of “Operation High Roller,” tracks that ===> mobile malware almost doubled the previous quarter’s total, <=== and reveals an all-time high in database breaches.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2318

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

New trojan targets image files

New trojan targets image files | ICT Security-Sécurité PC et Internet | Scoop.it
Increasingly, malware creators are moving from stealing information from text files and key-logging into the audio-visual realm.

 

Recently this has spread to Android phones via a new threat called PlaceRaider, which can secretly take photos or video every few seconds without the owner ever noticing.

 

===> Combined with information from a smartphone’s GPS system and accelerometer sensors, the visual data can be assembled into a three-dimensional map of the phone's surroundings. <===

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/29156/new-trojan-targets-image-files/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Suspected Android SMS malware author arrested in France

Suspected Android SMS malware author arrested in France | ICT Security-Sécurité PC et Internet | Scoop.it
French police have arrested a 20-year-old man in Northern France, in connection with an attack that infected thousands of Android smartphones with money-making malware.

 

Read more:

http://nakedsecurity.sophos.com/2012/10/19/android-malware-author-france/?utm_source=twitter&amp;utm_medium=status%2Bmessage&amp;utm_campaign=naked%2Bsecurity

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Is Google about to start scanning your Android for malware?

Is Google about to start scanning your Android for malware? | ICT Security-Sécurité PC et Internet | Scoop.it
A new edition of the Google Play app (Android's equivalent to the iOS App Store) appears to be preparing to add anti-virus functionality to the mobile operating system.

 

Read more, a MUST:

http://nakedsecurity.sophos.com/2012/10/12/google-scanning-android-malware/?utm_source=twitter&amp;utm_medium=status%2Bmessage&amp;utm_campaign=naked%2Bsecurity

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Mobile Malware - Security Spotlight Series: Episode Three

Tune in to watch Security Spotlight's third episode, on Mobile Malware. In 2012, we saw a 58% increase in mobile malware, and it continues to grow. Cybercrim...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

Scooped by Gust MEES
Scoop.it!

Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings [Video]

Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings [Video] | ICT Security-Sécurité PC et Internet | Scoop.it
Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings

 

Two of the vulnerabilities can be leveraged to silently install highly privileged apps without requiring any user interaction. A different issue can be exploited by an attacker to send SMS messages without requiring the android.permission.SEND_SMS permission. 

Another vulnerability can be used to silently make phone calls, send emails and SMSs, and perform “almost any action.”


Gust MEES's insight:

 

Two of the vulnerabilities can be leveraged to silently install highly privileged apps without requiring any user interaction. A different issue can be exploited by an attacker to send SMS messages without requiring the android.permission.SEND_SMS permission. 

Another vulnerability can be used to silently make phone calls, send emails and SMSs, and perform “almost any action.”


No comment yet.
Scooped by Gust MEES
Scoop.it!

Many Fed smartphones have zero password protection

Many Fed smartphones have zero password protection | ICT Security-Sécurité PC et Internet | Scoop.it

A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread.

Sponsored by EMC, VMware, Cisco, and Carahsoft, the report reveals that more than half of smartphone users in the Federal government use their personal smartphone for job-related tasks. Out of this group, one in three workers do not have password protection.


Gust MEES's insight:

Isn't that Naivety!?

 

Check also:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

99% of mobile malware targets Android

99% of mobile malware targets Android | ICT Security-Sécurité PC et Internet | Scoop.it
The fact that Android malware is an escalating issue comes as no surprise, but a recent analysis of its sheer 'market share' of the mobile malware universe is noteworthy.
Gust MEES's insight:

                      ===> Be AWARE of the MALWARE! <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to improve your Android security

How to improve your Android security | ICT Security-Sécurité PC et Internet | Scoop.it
Android is the mobile equivalent of Windows -- hugely popular and open to security threats such as malware. Here's how to keep safe.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Une faille de sécurité affecte les derniers smartphones Samsung

Une faille de sécurité affecte les derniers smartphones Samsung | ICT Security-Sécurité PC et Internet | Scoop.it
Affectant au moins les Galaxy S2 et Galaxy Note 2, la faille permet à une application d'accéder à l'ensemble de la mémoire de l'appareil. Des correctifs temporaires sont proposés par la communauté.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symbian malware scene far from dead

Symbian malware scene far from dead | ICT Security-Sécurité PC et Internet | Scoop.it
Despite Android’s dominance in the mobile threat landscape, the Symbian malware scene is far from dead. 21 new families and variants were discovered in the third quarter of 2012, a 17% increase compared to the second quarter.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2314

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

F-Secure: Mobile Threat Report Q3-202012 [pdf]

THIS REPORT DISCUSSES THE MOBILE THREAT LANDSCAPE AS SEEN IN THE THIRD QUARTER OF 2012, AND INCLUDES STATISTICS AND DETAILS OF THE MOBILE THREATS THAT F-SECURE RESPONSE LABS HAVE SEEN AND ANALYZED DURING THAT PERIOD. THE DATA PRESENTED IN THIS REPORT WAS LAST UPDATED ON 30 SEPTEMBER 2012.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

FBI: Smartphone Users Should be Aware of Malware Targeting Mobile Devices

FBI: Smartphone Users Should be Aware of Malware Targeting Mobile Devices | ICT Security-Sécurité PC et Internet | Scoop.it

To report potential e-scams, please go the Internet Crime Complaint Center and file a report. Note: the FBI does not send mass e-mails to private citizens about cyber scams, so if you received an e-mail that claims to be from the FBI Director or other top official, it is most likely a scam.

 

If you receive unsolicited e-mail offers or spam, you can forward the messages to the Federal Trade Commission at spam@uce.gov.

 

Read more:

http://www.fbi.gov/scams-safety/e-scams?utm_campaign=email-Immediate&amp;utm_content=145512

 

No comment yet.