ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

eBay confirms hack, confirms users *should* change passwords

eBay confirms hack, confirms users *should* change passwords | ICT Security-Sécurité PC et Internet | Scoop.it
Auction site confirms that hackers compromised an eBay database containing encrypted eBay passwords and other non-financial information.
Gust MEES's insight:

It seems that someone at eBay let the cat out of the bag earlier today, pre-releasing advice to users to change their passwords before the rest of the company was ready to make an announcement.

Well, now the company *has* made an official announcement.

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Simple Explanation Of "The Internet Of Things"

A Simple Explanation Of "The Internet Of Things" | ICT Security-Sécurité PC et Internet | Scoop.it
The "internet of things" (IoT) is becoming an increasingly growing topic of conversation both in the workplace and outside of it. It's a concept that not only has the potential to impact how we live but also how we work.  But what exactly is the "internet of things" and what [...]


The reality is that the IoT allows for virtually endless opportunities and connections to take place, many of which we can’t even think of or fully understand the impact of today.  It’s not hard to see how and why the IoT is such a hot topic today, it certainly opens the door to a lot of opportunities but also to many challenges.

 

Security is big issues that is oftentimes brought up.  With billions of devices being connect together what can people to do make sure that their information stays secure?  Will someone be able to hack into your toaster and thereby get access to your entire network?  The IoT also opens up companies all over the world to more security threats.


 Then we have the issue of privacy and data sharing.  This is a hot button topic even today so one can only imagine how the conversation and concerns will escalate when we are talking about many billions of devices being connected. 


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Des logiciels espions de la NSA cachés dans des équipements US ?

Des logiciels espions de la NSA cachés dans des équipements US ? | ICT Security-Sécurité PC et Internet | Scoop.it
Selon des révélations de Snowden, la NSA aurait inséré des logiciels espions dans des équipements informatiques, en particulier réseau, destinés à l’exportation, mais sans a priori la collaboration des constructeurs.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA



Via Frederic GOUTH
Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mangelnder Datenschutz: Behörden-Aufsicht für Snapchat wegen Nutzertäuschung

Mangelnder Datenschutz: Behörden-Aufsicht für Snapchat wegen Nutzertäuschung | ICT Security-Sécurité PC et Internet | Scoop.it
Von selbst sollten sich die über Snapchat verschickten Fotos und Videos auflösen, und das innerhalb von zehn Sekunden. Am Wahrheitsgehalt dieses Versprechens schien bisher niemand zu zweifeln. Zu Unrecht, wie sich nun zeigte.


Snapchat: Ortsdaten der User gespeichert


Außerdem kritisierten die Prüfer der FTC, Snapchat würde wesentlich mehr Daten über seine User sammeln, als zugegeben: So soll die Android-Version von Snapchat die Ortsdaten der User an Snapchat weitergeleitet haben, obwohl die Privacy Policy das Gegenteil versprach.

"Wenn eine Firma mit dem Schutz der Privatsphäre und Sicherheitwirbt, dann muss sie diese Versprechen auch einhalten," zitiert diePressemitteilung der FTC die Behörden-Chefin Edith Ramirez.

Gust MEES's insight:
Snapchat: Ortsdaten der User gespeichert


Außerdem kritisierten die Prüfer der FTC, Snapchat würde wesentlich mehr Daten über seine User sammeln, als zugegeben: So soll die Android-Version von Snapchat die Ortsdaten der User an Snapchat weitergeleitet haben, obwohl die Privacy Policy das Gegenteil versprach.

"Wenn eine Firma mit dem Schutz der Privatsphäre und Sicherheitwirbt, dann muss sie diese Versprechen auch einhalten," zitiert diePressemitteilung der FTC die Behörden-Chefin Edith Ramirez.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Près de 320 000 serveurs encore vulnérables à la faille Heartbleed

Près de 320 000 serveurs encore vulnérables à la faille Heartbleed | ICT Security-Sécurité PC et Internet | Scoop.it
Un chercheur indique que près de 320 000 serveurs sont encore vulnérables à la faille Heartbleed.


Pour trouver ce chiffre, il a scanné des millions de serveurs sur le port 443 qui est utilisé pour les communications TLS/SSL. A la découverte de la faille, plus de 600 000 serveurs étaient exposés. Robert Graham reste prudent sur ce chiffre de 320 000 en indiquant qu’il existe d’autres tests que le port 443 et qu’il peut donc y avoir plus de serveurs vulnérables.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Heartbleed


Gust MEES's insight:

Pour trouver ce chiffre, il a scanné des millions de serveurs sur le port 443 qui est utilisé pour les communications TLS/SSL. A la découverte de la faille, plus de 600 000 serveurs étaient exposés. Robert Graham reste prudent sur ce chiffre de 320 000 en indiquant qu’il existe d’autres tests que le port 443 et qu’il peut donc y avoir plus de serveurs vulnérables.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Heartbleed


No comment yet.
Scooped by Gust MEES
Scoop.it!

CryptoLocker Ransomware Moves to Android

CryptoLocker Ransomware Moves to Android | ICT Security-Sécurité PC et Internet | Scoop.it
The Reveton ransomware gang is selling a version of CryptoLocker that can infect Android devices.


The version of the kit that’s being advertised by the Reveton gang has variants for victims in more than 30 countries, including the United States, UK, France, Germany, Australia and Spain.


Gust MEES's insight:

The version of the kit that’s being advertised by the Reveton gang has variants for victims in more than 30 countries, including the United States, UK, France, Germany, Australia and Spain.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Serious security flaw in OAuth, OpenID discovered

Serious security flaw in OAuth, OpenID discovered | ICT Security-Sécurité PC et Internet | Scoop.it

Attackers can use the "Covert Redirect" vulnerability in both open-source log-in systems to steal your data and redirect you to unsafe sites.

Gust MEES's insight:

Attackers can use the "Covert Redirect" vulnerability in both open-source log-in systems to steal your data and redirect you to unsafe sites.

No comment yet.
Scooped by Gust MEES
Scoop.it!

The rising strategic risks of cyberattacks | McKinsey & Company

The rising strategic risks of cyberattacks | McKinsey & Company | ICT Security-Sécurité PC et Internet | Scoop.it
Research by McKinsey and the World Economic Forum points to a widening range of technology vulnerabilities and potentially huge losses in value tied to innovation. A McKinsey Quarterly article.


According to McKinsey’s ongoing cyberrisk-maturity survey research, large companies reported cross-sector gaps in their risk-management capabilities. Ninety percent of those most recently surveyed had “nascent” or “developing” ones. Only 5 percent were rated “mature” overall across the practice areas studied (exhibit).


Notably, we found no correlation between spending levels and risk-management maturity. Some companies spend little but do a comparatively good job of making risk-management decisions. Others spend vigorously, but without much sophistication. Even the largest firms had substantial room for improvement.


In finance, for instance, senior nontechnical executives struggled to incorporate cyberrisk management into discussions on enterprise risk management and often couldn’t make informed decisions, because they lacked data.


Gust MEES's insight:

According to McKinsey’s ongoing cyberrisk-maturity survey research, large companies reported cross-sector gaps in their risk-management capabilities. Ninety percent of those most recently surveyed had “nascent” or “developing” ones. Only 5 percent were rated “mature” overall across the practice areas studied (exhibit).


No comment yet.
Scooped by Gust MEES
Scoop.it!

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon | ICT Security-Sécurité PC et Internet | Scoop.it

Nations must be ready for a remote attack on critical infrastructure, including power and transport systems, says security expert. 




- Risk one: DDoS attack


Risk two: attacking critical data


Risk three: damaging infrastructure



In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.


Gust MEES's curator insight, May 1, 2014 9:45 AM

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


Scooped by Gust MEES
Scoop.it!

Attackers use reflection techniques for larger DDoS attacks

Attackers use reflection techniques for larger DDoS attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in fa...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Got Adobe Reader on your Android device? You Had Best Update it ASAP

Got Adobe Reader on your Android device? You Had Best Update it ASAP | ICT Security-Sécurité PC et Internet | Scoop.it
A critical security vulnerability has been found in Adobe Reader Mobile, the version of the popular PDF Reader developed for the Android operating system, which [...]


A critical security vulnerability has been found in Adobe Reader Mobile, the version of the popular PDF Reader developed for the Android operating system, which could lead to remote hackers compromising documents stored on your Android device and its SD memory card.

If you were feeling smug that you had managed to avoid the Heartbleed flaw affecting  up to 50 million Android users because you’re not running Android 4.1.1 of Jellybean, then perhaps you should wipe that smile off your face.

Gust MEES's insight:


A critical security vulnerability has been found in Adobe Reader Mobile, the version of the popular PDF Reader developed for the Android operating system, which could lead to remote hackers compromising documents stored on your Android device and its SD memory card.

If you were feeling smug that you had managed to avoid the Heartbleed flaw affecting  up to 50 million Android users because you’re not running Android 4.1.1 of Jellybean, then perhaps you should wipe that smile off your face.

.

No comment yet.
Scooped by Gust MEES
Scoop.it!

The U.S. Government Wants 6,000 New 'Cyber Warriors' by 2016

The U.S. Government Wants 6,000 New 'Cyber Warriors' by 2016 | ICT Security-Sécurité PC et Internet | Scoop.it
Salaries for that kind of talent are much higher in the private sector


The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

A few days later, FBI Supervisory Special Agent Charles Gilgen said at a conference on cybercrime that his agency’s cyber division plans to hire 1,000 agents and 1,000 analysts in the coming year.

Just those two agencies are looking for 6,000 people with cybersecurity skills in the next two years. That’s a very tall order. A look at one way the government has tried to build and recruit such talent—offering university scholarships—shows why.

Gust MEES's insight:


The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

A few days later, FBI Supervisory Special Agent Charles Gilgen said at a conference on cybercrime that his agency’s cyber division plans to hire 1,000 agents and 1,000 analysts in the coming year.

Just those two agencies are looking for 6,000 people with cybersecurity skills in the next two years. That’s a very tall order. A look at one way the government has tried to build and recruit such talent—offering university scholarships—shows why.

No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA Allegedly Intercepts Shipments of Servers To Install Spying Backdoors

NSA Allegedly Intercepts Shipments of Servers To Install Spying Backdoors | ICT Security-Sécurité PC et Internet | Scoop.it

Today in a published excerpt of his forthcoming book, No Place to Hide,Glenn Greenwald reports, citing documents from 2010, that the NSA intercepts routers and servers being shipped from the United States overseas and compromises them.


Gust MEES's insight:

NSA intercepts routers and servers being shipped from the United States overseas and compromises them.


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA manipuliert US-Netzwerktechnik

NSA manipuliert US-Netzwerktechnik | ICT Security-Sécurité PC et Internet | Scoop.it
Bereits Anfang des Jahres hatte Jacob Appelbaum behauptet, die NSA fange per Post versandte Geräte ab, um darauf Spyware zu installieren. Nun untermauert Glenn Greenwald diese Anschuldigung: Betroffen seien unter anderem Router und Server von Cisco.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Scooped by Gust MEES
Scoop.it!

Android App Activities Prone to Abuse

Android App Activities Prone to Abuse | ICT Security-Sécurité PC et Internet | Scoop.it
We've recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks.
Gust MEES's insight:

We’ve recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks. The two affected apps we investigated are both highly popular...


No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet security researchers use Heartbleed bug to target hackers

Internet security researchers use Heartbleed bug to target hackers | ICT Security-Sécurité PC et Internet | Scoop.it
Anti-malware researchers have turned the tables on cyber criminals by using the Heartbleed bug to gain access to online forums where hackers congregate.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Heartbleed


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Heartbleed


No comment yet.
Scooped by Gust MEES
Scoop.it!

Bitly breached, gives (shortened) details to customers on blog

Bitly breached, gives (shortened) details to customers on blog | ICT Security-Sécurité PC et Internet | Scoop.it
Popular URL shortener Bitly is the latest cloud service to say, "Er, looks like crooks have been wandering around in our network."

Paul Ducklin tries to make sense of Bitly's breach notification...






Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


No comment yet.
Scooped by Gust MEES
Scoop.it!

The internet of everything - bringing more risk to more places

The internet of everything - bringing more risk to more places | ICT Security-Sécurité PC et Internet | Scoop.it

The Internet of Things (IoT) is a ubiquitous buzz-phrase these days. The idea is that just about everything we make or use could be connected, allowing anything to be remotely controlled or monitored, inspires excitement and trepidation in equal measure.


The applications of a completely connected world are immense, letting us control all aspects of our lives and our environments from anywhere.

=====> The dangers are similarly epic. <=====


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


Gust MEES's insight:

The applications of a completely connected world are immense, letting us control all aspects of our lives and our environments from anywhere.


=====> The dangers are similarly epic. <=====


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things




No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Security | Secunia Country Reports | A MUST READ!

Cyber Security | Secunia Country Reports | A MUST READ! | ICT Security-Sécurité PC et Internet | Scoop.it
Secunia Country Reports tell the state of security among PC users by country. Read about vulnerabilities in software like Chrome, Java and Flash in your country


Learn more:


http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/



Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/



Scooped by Gust MEES
Scoop.it!

Widespread uncertainty about cloud security

Widespread uncertainty about cloud security | ICT Security-Sécurité PC et Internet | Scoop.it

More and more organizations are transferring sensitive or confidential information to public cloud services even though more than a third expect a negative impact on security posture. In response, the use of encryption is increasing but more than half of respondents still admit their sensitive data goes unprotected when it is stored in the cloud, despite data security topping the global news agenda.


Deployed correctly encryption can help organizations to migrate sensitive data and high risk applications to the cloud, allowing them to safely unlock the full potential for economic benefit the cloud can deliver.


Gust MEES's insight:

Deployed correctly encryption can help organizations to migrate sensitive data and high risk applications to the cloud, allowing them to safely unlock the full potential for economic benefit the cloud can deliver.

.


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées | ICT Security-Sécurité PC et Internet | Scoop.it
Mets-en de côté, ça peut servir.


La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




Gust MEES's insight:

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




Gust MEES's curator insight, April 30, 2014 1:08 PM

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.

.


Scooped by Gust MEES
Scoop.it!

Biggest EU cyber security exercise taking place today

Biggest EU cyber security exercise taking place today | ICT Security-Sécurité PC et Internet | Scoop.it
Today European countries kick off the Cyber Europe 2014 (CE2014), a sophisticated cyber exercise, involving more than 600 security actors ac...


More than 200 organizations and 400 cyber security professionals across Europe join forces. Twenty-nine EU and EFTA countries are participating.


Gust MEES's insight:


More than 200 organizations and 400 cyber security professionals across Europe join forces. Twenty-nine EU and EFTA countries are participating.

.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackonomics: Street prices for black market bugs

Hackonomics: Street prices for black market bugs | ICT Security-Sécurité PC et Internet | Scoop.it
A recent RAND Corporation report on the black market for hacks, cracks, data theft, botnets, and zero days tells us your hacked Amex Black fetches a decent price, but only if you're not an American.


As RAND explained, the black market for cybercrime, once a "varied landscape of discrete, ad hoc networks of individuals motivated by ego and notoriety, has now become a burgeoning powerhouse of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states."


Learn more:



Gust MEES's insight:


The black market for cybercrime, once a "varied landscape of discrete, ad hoc networks of individuals motivated by ego and notoriety, has now become a burgeoning powerhouse of highly organized groups, often connected with traditional crime groups (e.g., drug cartels, mafias, terrorist cells) and nation-states."


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

Massive FBI facial recognition database raises privacy fears

Massive FBI facial recognition database raises privacy fears | ICT Security-Sécurité PC et Internet | Scoop.it

The FBI is building a massive facial recognition database that could contain as many as 52 million images by 2015, including 4.3 million non-criminal images, according to information obtained by th...







Learn more:



Gust MEES's insight:


The FBI is building a massive facial recognition database that could contain as many as 52 million images by 2015, including 4.3 million non-criminal images, according to information obtained by th...


Learn more:


No comment yet.