ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

And the winners of the 2013 Social Security Blogger Awards Are

And the winners of the 2013 Social Security Blogger Awards Are | ICT Security-Sécurité PC et Internet | Scoop.it

Well it was an epic Security Blogger Meetup and awards this year. In many ways it was the best one we have had. But nothing is perfect and we are already planning to be bigger, better and more inclusive next year.  In the meantime I know many folks have been waiting to see who the winners of the Social Security Blogger Awards were.  So without further adieu, for the record here are the nominees and winners:

 

Check in the article...

 

Gust MEES's insight:


Check the list and bookmark them to learn about Security, IT-Security, Cyber-Security, Privacy, Cyberwar, Cybercrime...


Gust MEES's curator insight, March 4, 2013 12:45 PM

 

Check the list and bookmark them to learn about Security, IT-Security, Cyber-Security, Privacy, Cyberwar, Cybercrime...

 

Rescooped by Gust MEES from Free Tutorials in EN, FR, DE
Scoop.it!

Visual -Security/Your Computer as a possible Cyber-Weapon!?

Visual -Security/Your Computer as a possible Cyber-Weapon!? | ICT Security-Sécurité PC et Internet | Scoop.it

.. . For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections.

 

Why a computer could become a possible Cyber-Weapon who is attacking web-sites and perhaps also your Government’s web-sites!

 

Read more:

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malicious PowerPoint File Contains Exploit, Drops Backdoor

Malicious PowerPoint File Contains Exploit, Drops Backdoor | ICT Security-Sécurité PC et Internet | Scoop.it
We uncovered a PowerPoint file containing an exploit that targets a vulnerability in Flash Player in order to drop the backdoor BKDR_SIMBOT.EVL...

 

 

 

 

 

Read more:

http://blog.trendmicro.com/malicious-powerpoint-file-contains-exploit-drops-backdoor/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar Is With Us: Details Emerge About Use Of Stuxnet Worm In Iran

Cyberwar Is With Us: Details Emerge About Use Of Stuxnet Worm In Iran | ICT Security-Sécurité PC et Internet | Scoop.it
In an excellent piece by David Sanger, the NY Times has confirmed what we all suspected: that the US deployed the Stuxnet worm, a powerful worm that targets very specific machines within Iran's nuclear enrichment program.

 

Read more:

http://techcrunch.com/2012/06/01/cyberwar-is-with-us-details-emerge-about-use-of-stuxnet-worm-in-iran/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Romanian hackers arrested for hitting government websites

Romanian hackers arrested for hitting government websites | ICT Security-Sécurité PC et Internet | Scoop.it

Twelve individuals have been arrested across Romania for having allegedly compromised and defaced 29 websites of Romanian public institutions, and having stolen and leaked information exfiltrated from its databases.

 

According to a statement (via Google Translate) released by the Romanian Directorate for Investigating Organized Crime and Terrorism (DIICOT), the hacking group consists of 14 people in all, with three hackers at its core:


24-year-old Gabriel Baleasa, the founder of the group, who went by a myriad of handles ("lulzcart", "anonsboat", "anonsweb" and "Cartman"),
one Gabor Fabian
one Mihai Emil Picos.

 

Read more:

http://www.net-security.org/secworld.php?id=13010&utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Flame surveillance worm described as one of the most complex threats ever discovered

Flame surveillance worm described as one of the most complex threats ever discovered | ICT Security-Sécurité PC et Internet | Scoop.it
A worm described as the the most sophisticated cyber weapon yet unleashed has been detected attacking nations in the Middle East.

 

 

 

 

Read more:

http://www.scmagazineuk.com/flame-surveillance-worm-described-as-one-of-the-most-complex-threats-ever-discovered/article/243086/

No comment yet.
Scooped by Gust MEES
Scoop.it!

McAfee reports big spike in malware New malware for the Mac exploded...

McAfee reports big spike in malware New malware for the Mac exploded... | ICT Security-Sécurité PC et Internet | Scoop.it
A quarterly threat report found password-stealing Trojans on the rise...

 

PC malware had its "busiest quarter in recent history," according to McAfee's quarterly security report released Wednesday.

 

The security company registered the biggest increase in malware in four years during the first quarter of this year, bringing the total number of samples to 83 million. Fake antivirus programs declined in popularity, but software with faked security signatures, rootkits and password-stealing Trojans rose.

 

===> New malware for the Mac exploded in the second quarter of 2011 <===

 

Read more:

http://www.networkworld.com/news/2012/052312-mcafee-reports-big-spike-in-259575.html?source=nww_rss

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

World teeters on cyber-war brink

World teeters on cyber-war brink | ICT Security-Sécurité PC et Internet | Scoop.it

Just as the NATO summit drew to its conclusion in Chicago, internet security maven Eugene Kaspersky, today warned global leaders that the world needs international agreements about cyber-weapons in the same way as it needs agreements about nuclear or biological weaponry...

 

Read more:

http://www.itwire.com/business-it-news/security/54865-world-teeters-on-cyber-war-brink

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Banking malware spies on victims by hijacking webcams, microphones, researchers say

Banking malware spies on victims by hijacking webcams, microphones, researchers say | ICT Security-Sécurité PC et Internet | Scoop.it
A new variant of SpyEye malware allows cybercriminals to monitor potential bank fraud victims by hijacking their webcams and microphones, according to security researchers from antivirus vendor Kaspersky Lab.

 

 

 

 

 

 

Read more:

http://www.computerworld.com/s/article/9227387/Banking_malware_spies_on_victims_by_hijacking_webcams_microphones_researchers_say

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Bredolab: Jail for man who masterminded botnet of 30 million computers

Bredolab: Jail for man who masterminded botnet of 30 million computers | ICT Security-Sécurité PC et Internet | Scoop.it
A man who was in command of a botnet of some 30 million computers worldwide has been sentenced to four years jail in Armenia.

 

 

 

 

 

 

 

 

 

Read more:

http://nakedsecurity.sophos.com/2012/05/23/bredolab-jail-botnet/?utm_source=twitter&amp;amp;amp;utm_medium=gcluley&amp;amp;amp;utm_campaign=naked%2Bsecurity

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

A new solution for authenticating BYOD

A new solution for authenticating BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
New start-up SaaSID today launches a product at CloudForce London that seeks to solve a pressing and growing problem: the authentication of personal devices to the cloud.

 

 

 

Read more:

http://www.infosecurity-magazine.com/view/25911/a-new-solution-for-authenticating-byod/?utm_source=twitterfeed&amp;amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Social Networking Security in the Workplace

Social Networking Security in the Workplace | ICT Security-Sécurité PC et Internet | Scoop.it
At any given moment today, on-the-clock employees are updating their social media status, reading feeds and networking on business media sites.

 

Remember that hackers now target mobile devices such as smartphones and tablet PCs. Businesses should specify whether employees are permitted to access social networking sites from these devices and which apps may be used to do so.

 

Once policies are established, it may be necessary to reinforce them with a carefully considered combination of network monitoring and data protection technologies. In some cases, these technologies may already be in place as part of standard IT security measures.

 

===> If so, they should be configured to include social networking controls. <===

 

Read more:

http://www.computerworld.com/s/article/9227325/Social_Networking_Security_in_the_Workplace?source=rss_security&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed:+computerworld/s/feed/topic/17+(Computerworld+Security+News)

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware now can spy using web camera. Who still has their cameras unblocked?

Malware now can spy using web camera. Who still has their cameras unblocked? | ICT Security-Sécurité PC et Internet | Scoop.it

Twitter Topic Text from https://twitter.com/#!/e_kaspersky

 

Text from SECURELIST by:

 

Dmitry Tarakanov
Kaspersky Lab Expert
Posted May 21, 14:10 GMT
Tags: SpyEye

 

Malware now can spy using web camera. Who still has their cameras unblocked?

 

It seems that development of the main module of SpyEye stopped with last autumn’s version 1.3.48. But just because the authors are not developing this platform further, it doesn’t mean that SpyEye is no longer getting new functions.

 

This is not the first time that cybercriminals using online banks have tried to get video and audio footage of victims. My colleague Dmitry Bestuzhev recalls a case when a malicious program targeting clients of an Ecuadorian bank also had functionality to record video and audio footage on the infected computer and to send it to intruders.

 

This too was not related to optical client recognition - the Ecuadorian bank had no such feature implemented.

 

It all begs the question – why film your victim? Apparently, cybercriminals watch the user’s reaction when the theft is in process. As usual, money is stolen in the following way: the user types his/her login data into the bank site, but the code of the bank’s page is modified by malware directly in the browser and after authorization the user doesn’t see the bank account but the malware creates a window with a message saying, for example, “Loading... Please wait...”. At the same time, injected malicious code prepares to send the stolen money to an accomplice’s bank account.

 

Once that’s done, in order to confirm the transaction, cybercriminals have to persuade the user to enter a secret code, which could be received by SMS. This is when social engineering is used: the intruder’s program puts a request on the victim’s screen, something like: “We have strengthened security measures. Please confirm your identity entering the secret code we have sent to your phone.”

 

Very interesting, learn more:

http://www.securelist.com/en/blog/208193513/Big_Brother

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Sécurité : Apple a donné trop facilement accès à un compte iCloud

Sécurité : Apple a donné trop facilement accès à un compte iCloud | ICT Security-Sécurité PC et Internet | Scoop.it
L'affaire a fait grand bruit ce week-end : vendredi, Mat Honan, journaliste chez Wired a perdu les données personnelles sur son iPhone, iPad et son Mac.

 

En savoir plus :

http://www.macgeneration.com/news/voir/254122/securite-apple-a-donne-trop-facilement-acces-a-un-compte-icloud

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

LinkedIn confirms hack, over 60% of stolen passwords already cracked

LinkedIn confirms hack, over 60% of stolen passwords already cracked | ICT Security-Sécurité PC et Internet | Scoop.it
LinkedIn has acknowledged the password database posted online appears to be from their network. 60% of the passwords have already been discovered and we are still seeing very poor password choices ...
No comment yet.
Scooped by Gust MEES
Scoop.it!

BitDefender Removal Tool Trojan.Flamer.A/B

BitDefender Removal Tool Trojan.Flamer.A/B | ICT Security-Sécurité PC et Internet | Scoop.it
Sicherheitsexperten sind auf eine neue Schadsoftware gestoßen und bezeichnen den Trojaner Flame als eines der kompliziertesten Spy-Tools das je entwickelt wurde.

 

BitDefender bietet ein Removal-Tool, das Flame im Falle einer Infektion des Rechners erkennt und entfernt.

 

Weiter lesen:

http://www.pcwelt.de/downloads/Sicherheit-BitDefender-Removal-Tool-Trojan-Flamer-A-B-5883519.html?r=161527821705661&amp;lid=178176

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security App of the Week: Bitdefender USB Immunizer

Security App of the Week: Bitdefender USB Immunizer | ICT Security-Sécurité PC et Internet | Scoop.it
Security App of the Week: Bitdefender USB Immunizer...

 

The infamous AutorunInf Trojan and the Conficker worm are threats that show up in most of the quarterly or yearly reports released by security solutions providers and it’s well known that one of their favorite ways of spreading is via USB storage devices utilized by computer users to transfer data from one machine to the other.

 

Bitdefender comes to the aid of individuals who rely on USB memory sticks, SD cards, and portable hard drives in their daily activities, with the USB Immunizer.

 

The free utility’s main purpose is to mitigate threats designed to step into play as soon as the storage unit on which they're hosted is plugged in.

 

Read more and download it:

http://news.softpedia.com/news/Security-App-of-the-Week-Bitdefender-USB-Immunizer-273095.shtml?utm_source=twitter&amp;utm_medium=twitter&amp;utm_campaign=twitter_web

 

 

See also:

http://www.scoop.it/t/ict-security-tools?q=usb+immunizer

 

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Flame: Questions and Answers

The Flame: Questions and Answers | ICT Security-Sécurité PC et Internet | Scoop.it
Flame is a sophisticated attack toolkit, which is a lot more complex than Duqu. It is a backdoor, a Trojan, and it has worm-like features, allowing it to replicate in a local network and on removable media if it is commanded so by its master.

 

Read more, very interesting:

http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

The current state of the cybercrime ecosystem' featuring Mikko Hypponen

The current state of the cybercrime ecosystem' featuring Mikko Hypponen | ICT Security-Sécurité PC et Internet | Scoop.it
By Dancho Danchev | May 25, 2012, 7:20am PDT

 

In this week’s Q&A, I chat with Mikko Hypponen, the Chief Research Officer of F-Secure on the current state of the cybercrime ecosystem.

 

Gust MEES: A MUST READ

 

Read more:

http://www.zdnet.com/blog/security/q-a-of-the-week-the-current-state-of-the-cybercrime-ecosystem-featuring-mikko-hypponen/12147

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Military Debates Who Should Pull The Trigger For A Cyber Attack

Military Debates Who Should Pull The Trigger For A Cyber Attack | ICT Security-Sécurité PC et Internet | Scoop.it
VIRGINIA BEACH, VA: The American military is intrigued by the offensive uses for cyber-warfare, but it is struggling to figure out how to do it.

 

 

Read more:

http://defense.aol.com/2012/05/22/military-debates-who-should-pull-the-trigger-for-a-cyber-attack/

 

 

Check also:

 http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Google to help rid PCs of trojan that will prevent web access

Google to help rid PCs of trojan that will prevent web access | ICT Security-Sécurité PC et Internet | Scoop.it
With a July 9 deadline looming for machines infected with the DNSChanger trojan to still be able to access the internet, Google is lending a helping hand to inform users of compromise.

 

"We believe directly messaging affected users on a trusted site and in their preferred language will produce the best possible results," Menscher wrote. "While we expect to notify over 500,000 users within a week, we realize we won't reach every affected user. Some ISPs have been taking their own actions, a few of which will prevent our warning from being displayed on affected devices. We also can't guarantee that our recommendation will always clean infected devices completely, so some users may need to seek additional help."

 

DHS, in the blog post, recommended that users visit the DNSChanger Working Group website to test their computers for infection and to receive instructions on removing the trojan.

 

Read more:

http://www.scmagazine.com/google-to-help-rid-pcs-of-trojan-that-will-prevent-web-access/article/242530/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

McAfee Labs Threat Report for Q1 2012: Threats Gone Wild

McAfee Labs Threat Report for Q1 2012: Threats Gone Wild | ICT Security-Sécurité PC et Internet | Scoop.it

===> United States the Primary Source of Cyberattacks <===

 

A compromised machine is often used as a proxy for spam, botnets, denial of service, or other types of malicious activities. These machines can be located anywhere in the world, but this quarter many were located in the United States.

 

Based on data collected from the McAfee Global Threat Intelligence™ network, the United States was the primary source of SQL-injection attacks and cross-site scripting attacks, and also had the highest number of victims of both attacks.

 

===> The United States currently houses the most botnet control servers, and the location point for the vast majority of new malicious websites, with an average of 9,000 new bad sites recorded per day. <===

 

 

Read more:

http://blogs.mcafee.com/mcafee-labs/mcafee-labs-threat-report-for-q1-2012-threats-gone-wild

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Anonymous Hacks U.S. Bureau of Justice Statistics Server | SecurityWeek.Com

Anonymous Hacks U.S. Bureau of Justice Statistics Server | SecurityWeek.Com | ICT Security-Sécurité PC et Internet | Scoop.it
In an effort to spread information, associates of Anonymous targeted the U.S. Bureau of Justice Statistics’ website, compromising nearly 2GB of data before the server was taken offline.

 

 

Read more:

http://www.securityweek.com/anonymous-hacks-us-bureau-justice-statistics-server?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Stop Think Connect-USE SECURITY SETTINGS TO CONTROL ONLINE IDENTITY.

Stop Think Connect-USE SECURITY SETTINGS TO CONTROL ONLINE IDENTITY. | ICT Security-Sécurité PC et Internet | Scoop.it

When you cross the street, you look both ways to make sure it’s safe. Staying safe on the Internet is similar. It takes some common sense steps.

 

- STOP: Before you use the Internet, take time to understand the risks and learn how to spot potential problems.

 

- THINK: Take a moment to be certain the path ahead is clear. Watch for warning signs and consider how your actions online could impact your safety, or your family’s.

 

- CONNECT: Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.

Protect yourself and help keep the web a safer place for everyone.

 

The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign.

 

Read more and watch the videos:

http://www.stopthinkconnect.org/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac users' indifference toward security 'worrying'

Mac users' indifference toward security 'worrying' | ICT Security-Sécurité PC et Internet | Scoop.it
Consumers not paying attention to growing threats to Apple's Mac platform, leading security vendors to warn such mindset "worrying" and industry needs to do more to educate them of risks.

 

Read more:

http://www.zdnetasia.com/mac-users-indifference-toward-security-worrying-62304850.htm

 

No comment yet.