ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

WordPress 3.4.2 hardens security

WordPress 3.4.2 hardens security | ICT Security-Sécurité PC et Internet | Scoop.it

WordPress 3.4.2, now available for download, is a maintenance and security release for all previous versions.

 

Version 3.4.2 also fixes a few security issues and contains some security hardening.

 

The vulnerabilities included potential privilege escalation and a bug that affects multisite installs with untrusted users. These issues were discovered and fixed by the WordPress security team.

 

                           ===> UPDATE NOW!!! <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Des sites gouvernementaux ouverts aux quatre vents

Des sites gouvernementaux ouverts aux quatre vents | ICT Security-Sécurité PC et Internet | Scoop.it
Des sites gouvernementaux ouverts aux quatre vents - Intrusion, Hacking et Pare-feu - Heureusement, aucun pirate ne semble être passé par là.

 

CMS non-patché, failles non-comblées, mot de passe par défaut... Des sites ministériels étaient en fait de véritables passoires suite à des négligences dans la maintenance et les politiques de sécurité.

Heureusement, aucun pirate ne semble être passé par là. Mais plusieurs sites web gouvernementaux étaient, selon le Canard Enchaîné, victimes de graves négligences de sécurité de la part de leurs responsables techniques.

 

Les sites web concernés étaient notamment ceux du Ministère de l'Economie, du Ministère de la Fonction Publique, du Ministère du Redressement Productif et du Ministère de l'Emploi. Construits sur un CMS open-source très courant, en l'occurrence Drupal, ces sites n'avaient pas été mis à jour techniquement depuis au moins 2010 malgré la découverte de failles de sécurité majeures, failles corrigées dans des patchs disponibles depuis longtemps. L'une des failles permettait de prendre le contrôle de chaque site avec les droits d'administration.


Toujours selon notre confrère, le mot de passe d'administration avait été laissé à sa valeur par défaut (« password »).

 

Gust MEES: et pourtant c'est simple de tester son propre site Internet et ce même avec des outils gratuits, voir mon article (cours) ici 

 

http://gustmeesfr.wordpress.com/2012/01/02/securite-pc-et-internetsecurite-sites-internet/

 

 

En savoir plus :

 

http://www.lemondeinformatique.fr/actualites/lire-des-sites-gouvernementaux-ouverts-aux-quatre-vents-50325.html#.UEn3MvlMtsA.twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Waterhole Attack [Infographic]

The group behind the now infamous Hydraq (Aurora) targeted attacks continues to be very active.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Botnet master gets 30-month prison

Botnet master gets 30-month prison | ICT Security-Sécurité PC et Internet | Scoop.it

A hacker who controlled a botnet of 72,000 computers and rented out command-and-control access to various malcontents was sentenced to 30 months in prison today, the Department of Justice said.

 

Joshua Schichtel, 30, of Phoenix, Ariz., pleaded guilty in August of last year to one count of "attempting to cause damage to multiple computers without authorization by the transmission of programs, codes, or commands, a violation of the Computer Fraud and Abuse Act," the DOJ said. Schichtel sold botnet access to various individuals who paid to have him install malware on victims' computers. Although the DOJ said multiple people paid Schichtel to install malware on computers, he pleaded guilty to a charge involving one customer who paid $1,500 to have malware installed on 72,000 computers.

 

Read more:

http://mcaf.ee/icyst

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

As BYOD Trend Grows So Do Malware Attacks

As BYOD Trend Grows So Do Malware Attacks | ICT Security-Sécurité PC et Internet | Scoop.it
As BYOD Trend Grows So Do Malware Attacks
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected.

 

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor.

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.

 

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.

 

The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22364-As-BYOD-Trend-Grows-So-Do-Malware-Attacks.html?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Launch a Successful BYOD Program

How to Launch a Successful BYOD Program | ICT Security-Sécurité PC et Internet | Scoop.it


Katy Independent School District (ISD) has a student population of 63,000 students and 56 schools – elementary, middle and high schools. There are 83 languages spoken by students in the district and 31 percent of the student population is on free or reduced lunch programs.

 

In 2009, Katy began a three-year plan to change instruction in the school district by promoting a standardized toolbox of web-based tools dubbed “Web 2.0.” They also set out guidelines for behavior in the digital space called “Digital Citizenship,” in the hopes that the school would not just teach kids math and reading, but also how to behave in a public digital world.

 

Gust MEES: while using "Bring Your Own Device" (Hashtag on Twitter = #BYOD) you must also take care about IT-Security and Privacy! Check my FREE course who explains in detail:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Read more:

http://knolinfos.visibli.com/share/ZcOoM3

 

No comment yet.