ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Malware attacks up due to social media

Malware attacks up due to social media | ICT Security-Sécurité PC et Internet | Scoop.it

63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent report having the necessary security controls in place to mitigate it.

 

More than 50 percent of respondents report an increase in malware due to social media use.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Does Facebook keep tracking users after they have logged out?

Does Facebook keep tracking users after they have logged out? | ICT Security-Sécurité PC et Internet | Scoop.it

Australian hacker and blogger Nik Cubrilovic claims that Facebook keeps tracking its users after they have logged out from the site.

 

To do that, the social network allegedly uses cookies which, instead of being deleted once the users log out, are simply modified in such a way to send information about users visiting sites that have a Facebook "Like" button, "Share" button or any other widget or plugin.

No comment yet.
Scooped by Gust MEES
Scoop.it!

FortiNet FortiAnalyzer XSS and script insertion vulnerabilities

FortiNet FortiAnalyzer XSS and script insertion vulnerabilities | ICT Security-Sécurité PC et Internet | Scoop.it

Two vulnerabilities have been reported in FortiNet FortiAnalyzer, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks, according to Secunia.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Linux Foundation suffers security breach

Both websites are sporting a message from the Linux Foundation saying that the sites and their subdomains are down for maintenance due to a security breach that was discovered on September 8, 2011 and is believed to be connected to the intrusion on kernel.org.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile malware criminal command-and-control activity

Mobile malware criminal command-and-control activity | ICT Security-Sécurité PC et Internet | Scoop.it

Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is now successfully infiltrating the mobile space, according to Gunter Ollmann, VP of research for Damballa.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners | ICT Security-Sécurité PC et Internet | Scoop.it

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts.

 

The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Spam king facing criminal charges for Facebook spamming

Spam king facing criminal charges for Facebook spamming | ICT Security-Sécurité PC et Internet | Scoop.it

Sanford "Spamford" Wallace has long been a thorn in the side of social networks and has already been successfully sued in civil court by the FCC, MySpace and Facebook.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Global analysis of 10 million web attacks

Global analysis of 10 million web attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks across 30 applications as well as onion router (TOR) traffic, monitoring more than 10 million individual attacks targeted at web applications over a period of six months.

The analysis shows:
When websites came under automated attack they received up to 25,000 attacks in one hour, or 7 attacks every second.

Four dominant attack types comprise the vast majority of attacks targeting web applications: Directory Traversal, Cross-Site Scripting, SQL injection, and Remote File Inclusion.
No comment yet.
Scooped by Gust MEES
Scoop.it!

LulzSec hacks News International servers, "kills" Murdoch

LulzSec hacks News International servers, "kills" Murdoch | ICT Security-Sécurité PC et Internet | Scoop.it
Hacktivist group LulzSec is back in business. It has added to the pressure put on Rupert Murdoch following the phone hacking scandal by hacking into News International servers, hijacking the front page of The Sun and redirecting users to the (also compromised) new-times.co.uk site where a fake story about Murdoch's suicide was featured:

No comment yet.
Scooped by Gust MEES
Scoop.it!

The state of hacked accounts

The state of hacked accounts | ICT Security-Sécurité PC et Internet | Scoop.it

Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to Commtouch.

 

The increased preference for compromised accounts is illustrated by the graph below which compares the percentage of spam received over sample periods in Q2 and Q3 2011, where the “from” field includes “Gmail” or “Hotmail.”

No comment yet.
Scooped by Gust MEES
Scoop.it!

New Mac Trojan copies successful Windows Trojan technique

New Mac Trojan copies successful Windows Trojan technique | ICT Security-Sécurité PC et Internet | Scoop.it

Windows users have been warned time and time again of malware hiding behind icons and extensions belonging to files associated with legitimate software - most notably PDF, DOC and XLS files.

 

In spite of that, malware peddlers have had a lot success with this simple technique. It is no wonder, then, that they would try to use it on Mac users as well.

 

F-Secure shared its knowledge about a new dropper Trojan targeting that particular segment of users, disguised as a PDF file.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Improved SpyEye variant actively attacking Android devices

Improved SpyEye variant actively attacking Android devices | ICT Security-Sécurité PC et Internet | Scoop.it

The first SpyEye variant, called SPITMO, has been spotted attacking Android devices in the wild.

According to Amit Klein, Trusteer’s chief technology officer, the threat posed by DriodOS/Spitmo has escalated the danger of SpyEye now that this malicious software has been able to shift its delivery and infection methods.

No comment yet.
Scooped by Gust MEES
Scoop.it!

App piracy is hurting Android developers

App piracy is hurting Android developers | ICT Security-Sécurité PC et Internet | Scoop.it

App downloads in the U.S. are booming to the tune of 40 apps per user per year, according to the Yankee Group.

 

However, not all platforms are participating equally in the frenzy.

 

Android developers make much less money from paid apps than do Apple iOS developers.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mass injection attack compromised 20,000+ domains, delivers fake AV

Mass injection attack compromised 20,000+ domains, delivers fake AV | ICT Security-Sécurité PC et Internet | Scoop.it

A simple mistake on the part of cyber attackers has revealed another mass malicious iFrames injection attack that is currently under way, according to Armorize's researchers.

 

Initially, they forgot to include a tag before the actual malicious code, so it was indexed by Google and, therefore, searchable. The initial number of compromised domains was around 22,400, with a total of 536,000+ infected pages.

No comment yet.
Scooped by Gust MEES
Scoop.it!

4,300+ compromised WordPress blogs poison Google Image Search results

4,300+ compromised WordPress blogs poison Google Image Search results | ICT Security-Sécurité PC et Internet | Scoop.it

Google Image Search has for a while now been littered with images that lure users to compromised sites that serve as doorway pages to other malicious sites.

No comment yet.
Scooped by Gust MEES
Scoop.it!

phpMyAdmin multiple vulnerabilities

phpMyAdmin multiple vulnerabilities | ICT Security-Sécurité PC et Internet | Scoop.it
Multiple vulnerabilities have been reported in phpMyAdmin, according to Secunia. These can be exploited by malicious users to conduct cross-site scripting attacks and potentially compromise a vulnerable system and by malicious people to disclose potentially sensitive information and potentially compromise a vulnerable system.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Oslo bombing Facebook scams infecting 1 user per second

Oslo bombing Facebook scams infecting 1 user per second | ICT Security-Sécurité PC et Internet | Scoop.it
1.Websense has found an alarming number of Facebook scams taking advantage of yesterday's tragedy in Oslo, Norway.

Right now it seems to be infecting one user every second. The scam is a form of ‘clickjacking’ that replicates itself on users’ walls after they click on fake posts within their news feed. ..
No comment yet.