ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Deepweb and Cybercrime [pdf]

Gust MEES's insight:

 

A MUST READ!!!


Gust MEES's curator insight, November 25, 2013 2:51 AM

 

A MUST READ!!!

 

Scooped by Gust MEES
Scoop.it!

Trend Micro introduces defense against targeted attacks

Trend Micro introduces defense against targeted attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Trend Micro is introducing Custom Defense – an advanced threat protection solution that enables businesses and government agencies not only to detect and analyze APTs and targeted attacks, but also to adapt their protection and respond to these attacks.

 

Read more:

http://www.net-security.org/secworld.php?id=13744

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime goes mobile

Cybercrime goes mobile | ICT Security-Sécurité PC et Internet | Scoop.it

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings.

 

Gust MEES: watch the video who explains in detail; very well explained...

http://www.net-security.org/secworld.php?id=13015

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mac Users Now Also Susceptible to Targeted Attacks

Mac Users Now Also Susceptible to Targeted Attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Mac users are now prime targets as an APT attempts to execute on a Mac OS.

 

This development in targeted attacks just shows that the groups behind campaigns such as this one are taking into consideration changes in the computing landscape, such as the increase in the number of Mac users.

 

===> This adjustment to affect Macs also shows that they are refining their scope, and are really customizing their tools to suit their targets. <===


In this light, and knowing that the MAC OSX arena has seen in its fair share of threats increasing, it is advisable to be aware that MAC OSX can also be targeted, and ===> seen as a new playing field for these groups behind targeted attacks and APTs to further their agenda. <===

 

More on this as we are continuously investigating this. Stay tuned.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Privacy in the Digital Age: Whose Data Is It, Anyway?

Privacy in the Digital Age: Whose Data Is It, Anyway? | ICT Security-Sécurité PC et Internet | Scoop.it
Concerns about privacy on the Internet have always been out there, but news events of late seem to be bringing this problem more and more into the public...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware Blog | TrendLabs - by Trend Micro

Malware Blog | TrendLabs - by Trend Micro | ICT Security-Sécurité PC et Internet | Scoop.it

On November 8, a long-living botnet of more than 4,000,000 bots was taken down by the FBI and Estonian police in cooperation with Trend Micro and a number of other industry partners.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malicious Links on Twitter Lead to Bitcoin Mining | Trend Micro Malware Blog

Malicious Links on Twitter Lead to Bitcoin Mining | Trend Micro Malware Blog | ICT Security-Sécurité PC et Internet | Scoop.it
Web Reputation Services (WRS) encountered spammed malicious shortened URLs on Twitter that contains a JPEG file and with a Facebook domain.
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

#Cybersecurity #Cybercrime: Sensibilisierung und Abwehr

#Cybersecurity #Cybercrime: Sensibilisierung und Abwehr | ICT Security-Sécurité PC et Internet | Scoop.it
Kurze Einführungsvideos, die Sie auf ein bestimmtes Problem aufmerksam machen und Ihnen dabei helfen, Sicherheitsbedrohungen abzuwehren.
Gust MEES's insight:

 

A MUST watch!!! The video is in English with German subtitles...


Gust MEES's curator insight, May 25, 2013 9:12 AM

 

A MUST watch!!! The video is in English with German subtitles...

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mythbusting - Mac Security

As the popularity of Mac OS has increased, so has its attractiveness to online criminals. This cartoon busts some of the myths that still prevail when it com...
No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Vendors of the most vulnerable OS/software from January to March 2012

Vendors of the most vulnerable OS/software from January to March 2012 | ICT Security-Sécurité PC et Internet | Scoop.it

Vendors of the most vulnerable OS/software from January to March 2012

 

Read more: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_security_in_the_age_of_mobility.pdf

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Rapport trimestriel Trend Micro sur les menaces informatiques

Rapport trimestriel Trend Micro sur les menaces informatiques | ICT Security-Sécurité PC et Internet | Scoop.it
Trend Micro annonce les résultats de son premier « intelligence report » de l’année sur les tendances et menaces informatiques.

 

===> Apple a dépassé Oracle, Google et Microsoft en nombre de vulnérabilités de sécurité identifiées avec un total de 91. <===

 

Oracle arrive en seconde position avec 78, Google en troisième avec 73 et enfin Microsoft en quatrième avec 43 vulnérabilités identifiées. Indépendamment d’une plus grande fragilité par rapport aux virus, Apple a fournit un nombre record de patchs durant le mois de mars dernier.

 

Lire plus...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Compromised WordPress sites Drive Users to Blackhole Exploit Kit | Malware Blog

Compromised WordPress sites Drive Users to Blackhole Exploit Kit | Malware Blog | ICT Security-Sécurité PC et Internet | Scoop.it

We were alerted to reports of a mass compromise of WordPress sites that lead to CRIDEX infection. To lure users to these compromised sites, the cybercriminals behind this employed spammed messages purporting to come from known legitimate sources such Better Business Bureau and LinkedIn, just to name a few.

 

===> These spam use social engineering tactics to entice unsuspecting users to click the link found in the email. <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Trend Micro warns of McDonald's gift card spam on Twitter

Trend Micro warns of McDonald's gift card spam on Twitter | ICT Security-Sécurité PC et Internet | Scoop.it
Scammers take to micro-blogging site...

 

Security experts at Trend Micro are warning users to be on their guard after they discovered yet another Twitter spam campaign, this time using fast food giant McDonalds as a lure.


Designed to cash-in on the trend for giving ‘gift cards' to friends and family during the festive season, this scam uses the hashtag #mcdonalds gift card and shortened URLs to trick users into clicking through to a dodgy link, according to Trend Micro fraud analyst Cris Lumague.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Trend Micro enhances mobile security for Android

Trend Micro enhances mobile security for Android | ICT Security-Sécurité PC et Internet | Scoop.it

Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets.

 

In this version, a consumer's mobile devices will be better protected based on the new data that has been discovered over the last six months.

 

One of the new features is the app scanner, which is designed to block infected apps from installing and stealing your personal information.

No comment yet.