ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Hacking group claims to offer cyber-weapons in online auction | #Cybercrime #Cyberespionage 

Hacking group claims to offer cyber-weapons in online auction | #Cybercrime #Cyberespionage  | ICT Security-Sécurité PC et Internet | Scoop.it
Hackers going by the name Shadow Brokers said on Monday they will auction stolen surveillance tools they say were used by a cyber group linked to the U.S. National Security Agency.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

Gust MEES's insight:
Hackers going by the name Shadow Brokers said on Monday they will auction stolen surveillance tools they say were used by a cyber group linked to the U.S. National Security Agency.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Staatstrojaner Regin von NSA entwickelt

Staatstrojaner Regin von NSA entwickelt | ICT Security-Sécurité PC et Internet | Scoop.it
Laut Kaspersky stammen der Staatstrojaner Regin sowie der Keylogger QWERTY von ein und demselben Entwickler - dem US-amerikanischen Geheimdienst NSA.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Laut Kaspersky stammen der Staatstrojaner Regin sowie der Keylogger QWERTY von ein und demselben Entwickler - dem US-amerikanischen Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Link between NSA and Regin cyberespionage malware becomes clearer | CyberWeapon

Link between NSA and Regin cyberespionage malware becomes clearer | CyberWeapon | ICT Security-Sécurité PC et Internet | Scoop.it
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance






Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance






Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon | ICT Security-Sécurité PC et Internet | Scoop.it

Nations must be ready for a remote attack on critical infrastructure, including power and transport systems, says security expert. 




- Risk one: DDoS attack


Risk two: attacking critical data


Risk three: damaging infrastructure



In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.


Gust MEES's curator insight, May 1, 2014 9:45 AM

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.

Scooped by Gust MEES
Scoop.it!

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive

Pentagon receives ‘overwhelming response’ to Plan X cyber offensive | ICT Security-Sécurité PC et Internet | Scoop.it
DARPA postpones release of official solicitation.

 

Officials at the Defense Advanced Research Projects Agency have decided to postpone briefings and the release of solicitation documents for Plan X, a widely-anticipated funding initiative that will lay the foundation for the government’s push into offensive computer warfare operations.

 

“Due to an unanticipated and overwhelming response from industry and academia, DARPA has rescheduled the Plan X Proposers’ Day Workshop,” agency officials announced Sept. 5.

 

Two sessions with researchers and defense contractors—one classified and one non-classified—originally were slated for Sept. 27, but have now been moved to Oct. 15 and 16. “The second day will be a repeat of the first day to accommodate the remaining attendees,” the notice said. The request for proposals, originally scheduled for release at the end of this month, is expected to be published in October instead.

 

The surge of interest highlights a community emerging around offensive security technology. Plan X is a Pentagon initiative to develop computer architecture that monitors damage in “dynamic, contested, and hostile network environments,” adaptively defends against attacks, and performs “weapon deployment,” contracting documents indicate. The program is not funding malware or tools that hunt down vulnerabilities, but the resulting computer architecture will likely serve as the framework for their deployment.

 

Read more:

http://www.nextgov.com/defense/2012/09/pentagon-receives-overwhelming-response-plan-x-cyber-offensive/57961/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

L’Inde prête à se doter de cyber-armes

L’Inde prête à se doter de cyber-armes | ICT Security-Sécurité PC et Internet | Scoop.it
Après la cyberdéfense, plusieurs Etats, dont l’Inde, s’apprêteraient à présent à développer un arsenal de cyber-armes. La faute à Stuxnet et Flame, des programmes présentés comme étant des armes mises au point par des pays.

 

Lire plus :

http://www.zdnet.fr/actualites/l-inde-prete-a-se-doter-de-cyber-armes-39772725.htm#xtor=EPR-105

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

‘Flame’ Malware Prompts Microsoft Patch

‘Flame’ Malware Prompts Microsoft Patch | ICT Security-Sécurité PC et Internet | Scoop.it

Microsoft has issued an emergency security update to block an avenue of attack first seen in “Flame,” a newly-discovered, sophisticated malware strain that experts believe was designed to steal data specifically from computers in Iran and the Middle East.

 

According to Microsoft, Flame tries to blend in with legitimate Microsoft applications by cloaking itself with an older cryptography algorithm that Microsoft used to digitally sign programs.

 

Read more:

http://krebsonsecurity.com/2012/06/flame-malware-prompts-microsoft-patch/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BitDefender Removal Tool Trojan.Flamer.A/B

BitDefender Removal Tool Trojan.Flamer.A/B | ICT Security-Sécurité PC et Internet | Scoop.it
Sicherheitsexperten sind auf eine neue Schadsoftware gestoßen und bezeichnen den Trojaner Flame als eines der kompliziertesten Spy-Tools das je entwickelt wurde.

 

BitDefender bietet ein Removal-Tool, das Flame im Falle einer Infektion des Rechners erkennt und entfernt.

 

Weiter lesen:

http://www.pcwelt.de/downloads/Sicherheit-BitDefender-Removal-Tool-Trojan-Flamer-A-B-5883519.html?r=161527821705661&lid=178176

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The road to cyberwar? F-Secure’s Mikko Hypponen on the growth of government-sponsored malware

The road to cyberwar? F-Secure’s Mikko Hypponen on the growth of government-sponsored malware | ICT Security-Sécurité PC et Internet | Scoop.it
This week saw Flame hit the headlines. The most complex piece of malware ever discovered, it appears to have been designed as an espionage tool deployed against Iran and other countries ...

 

 

 

 

Read more:

http://thenextweb.com/insider/2012/05/31/the-road-to-cyberwar-f-secures-mikko-hypponen-on-the-growth-of-government-sponsored-malware/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Flame : l’outil de cyberespionnage le plus puissant jamais identifié

Flame : l’outil de cyberespionnage le plus puissant jamais identifié | ICT Security-Sécurité PC et Internet | Scoop.it

L’éditeur de sécurité Kaspersky vient de publier ses premières conclusions concernant un malware d’un nouveau genre, décrit comme le plus puissant et le plus complexe jamais identifié.

 

Nous savons Kaspersky peu avare de superlatifs lorsqu’il s’agit de décrire un malware. Mais la découverte de Flame dépasse tous les commentaires que l’on a pu entendre, y compris pour des virus comme Stuxnet ou Duqu. A l’instar de ses deux prédécesseurs, Flame n’est pas un malware comme les autres et ce pour différentes raisons.

 

Premièrement, il s’agit d’un virus « géopolitique », à savoir qu’il a infiltré massivement des ordinateurs situés dans une zone géographique précise : le moyen-orient avec l’Iran comme destination privilégiée. Ensuite, sa complexité semble défier tout ce qui a été vu jusqu’à présent. D’après l’éditeur russe, il est en service depuis au moins de deux ans, certains indices montrent qu’il pourrait exister depuis cinq ans et sa complexité fait qu’il va falloir des années pour le déchiffrer intégralement.

 

Image credit:
http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

 

 

Lire plus :

http://www.linformaticien.com/actualites/id/24986/flame-l-outil-de-cyberespionnage-le-plus-puissant-jamais-identifie.aspx?utm_source=twitterfeed&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Flame: Questions and Answers

The Flame: Questions and Answers | ICT Security-Sécurité PC et Internet | Scoop.it
Flame is a sophisticated attack toolkit, which is a lot more complex than Duqu. It is a backdoor, a Trojan, and it has worm-like features, allowing it to replicate in a local network and on removable media if it is commanded so by its master.

 

Read more, very interesting:

http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA hacked? Top cyber weapons allegedly go up for auction | #Cybercrime #Cyberespionage #CyberWeapons

NSA hacked? Top cyber weapons allegedly go up for auction | #Cybercrime #Cyberespionage #CyberWeapons | ICT Security-Sécurité PC et Internet | Scoop.it
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

Gust MEES's insight:
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwaffe Regin: Beweise für Verantwortlichkeit von NSA und GCHQ

Cyberwaffe Regin: Beweise für Verantwortlichkeit von NSA und GCHQ | ICT Security-Sécurité PC et Internet | Scoop.it
Untersuchungen von Kaspersky und des Spiegels zeigen, dass der berüchtigte Spionage-Trojaner Regin von Geheimdiensten der Five-Eyes-Allianz entwickelt wurde. Die Vermutung liegt nahe, dass der Trojaner Teil der Cyberwaffen-Plattform "Warriorpride" ist.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Untersuchungen von Kaspersky und des Spiegels zeigen, dass der berüchtigte Spionage-Trojaner Regin von Geheimdiensten der Five-Eyes-Allianz entwickelt wurde. Die Vermutung liegt nahe, dass der Trojaner Teil der Cyberwaffen-Plattform "Warriorpride" ist.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

SPIEGEL-Veröffentlichung: Experten enttarnen Trojaner "Regin" als NSA-Werkzeug | Cyberwar

SPIEGEL-Veröffentlichung: Experten enttarnen Trojaner "Regin" als NSA-Werkzeug | Cyberwar | ICT Security-Sécurité PC et Internet | Scoop.it
Telekom-Unternehmen, die EU-Kommission und eine Mitarbeiterin des Kanzleramts - alle wurden zum Opfer der Schadsoftware "Regin". Die Analyse eines vom SPIEGEL veröffentlichten Codes zeigt nun: "Regin" ist ein NSA-Werkzeug.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Telekom-Unternehmen, die EU-Kommission und eine Mitarbeiterin des Kanzleramts - alle wurden zum Opfer der Schadsoftware "Regin". Die Analyse eines vom SPIEGEL veröffentlichten Codes zeigt nun: "Regin" ist ein NSA-Werkzeug.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky Security Bulletin 2012. Cyber Weapons

Kaspersky Security Bulletin 2012. Cyber Weapons | ICT Security-Sécurité PC et Internet | Scoop.it
Before 2012, there were only two instances of cyber weapons being used – Stuxnet and Duqu.

However, analysis of these two forced the IT community to dramatically expand the whole concept of what cyber warfare entails.

Apart from an increase in the number of security incidents involving cyber weapons, the events of 2012 have also brought to light the fact that many sovereign states are heavily involved in the development of cyber weapons – something that was picked up on and widely discussed by the mass media. Moreover, cyber warfare was on the agenda of public discussions between governments and state representatives over the course of 2012.

It is safe to say, therefore, that 2012 has brought key revelations in this sphere – both in terms of the increase in security incidents and a greater understanding of how cyber weapons are being developed
No comment yet.
Scooped by Gust MEES
Scoop.it!

Air Force Openly Seeking Cyber-Weapons

Air Force Openly Seeking Cyber-Weapons | ICT Security-Sécurité PC et Internet | Scoop.it
The Air Force Life Cycle Management Center (AFLCMC) posted a broad agency announcement [PDF] last week calling on contractors to submit concept papers detailing technological demonstrations of ‘cyberspace warfare operations’ (CWO) capabilities.

 

The Air Force is looking to obtain CWO capabilities falling into a number of categories including: ‘cyberspace warfare attack’ and ‘cyberspace warfare support.’

 

The broad agency announcement defines ‘cyberspace warfare attack’ capabilities as those which would give them the ability to “destroy, deny, degrade, disrupt, deceive, corrupt, or usurp the adversaries [sic] ability to use the cyberspace domain for his advantage.”

 

Read more:

http://threatpost.com.mx/en_us/blogs/air-force-opnely-seeking-cyber-weapons-082812

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware-Analyse zeigt langfristige Planung von Flame

Malware-Analyse zeigt langfristige Planung von Flame | ICT Security-Sécurité PC et Internet | Scoop.it
Experten von Kaspersky Lab haben eine detaillierte Analyse zur C&C-Infrastruktur von Flame
veröffentlicht. Sie zeigt, wie langfristig Flame geplant wurde.

 

Weiter lesen:

http://www.pcwelt.de/news/Spionage-Programm-Malware-Analyse-zeigt-langfristige-Planung-von-Flame-5903316.html?r=761527823905633&lid=178393

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Massive Web of Fake Identities and Websites Controlled Flame Malware

A Massive Web of Fake Identities and Websites Controlled Flame Malware | ICT Security-Sécurité PC et Internet | Scoop.it
The attackers behind the complex Flame cyberespionage toolkit, believed to be a state-sponsored operation, used an extensive list of fake id...

 

Read more, interesting to know...

http://www.wired.com/threatlevel/2012/06/flame-command-and-control/?utm_source=twitterfeed&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Stuxnet has put us all on the front line of warfare 2.0

Stuxnet has put us all on the front line of warfare 2.0 | ICT Security-Sécurité PC et Internet | Scoop.it
With the revelation that the US and Israel co-operated at the highest level on Stuxnet, the rules of international aggression are changing.

 

Read more:

http://www.zdnet.co.uk/news/security-threats/2012/06/01/stuxnet-has-put-us-all-on-the-front-line-of-warfare-20-40155333/?s_cid=458

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Flamer: A Recipe for Bluetoothache

Flamer: A Recipe for Bluetoothache | ICT Security-Sécurité PC et Internet | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

W32.Flamer is possibly the only Windows based threat we have encountered which uses Bluetooth. It is yet another indicator that W32.Flamer is not only exceptional, but that it is a comprehensive information gathering and espionage tool. The CrySyS laboratory has previously documented the technical details of Bluetooth in W32.Flamer.

 

But, what does this actually mean for potential victims targeted by Flamer? What can an attacker accomplish using Bluetooth?

 

Read more to find out:

http://www.symantec.com/connect/blogs/flamer-recipe-bluetoothache

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Neuer Spionage-Schädling: Flame

Neuer Spionage-Schädling: Flame | ICT Security-Sécurité PC et Internet | Scoop.it
Sicherheitsexperten haben einen neuen Spionage-Schädling entdeckt, der zum Cyberangriff auf Länder verwendet wird. Der Name des Schädlings: Flame.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Flame surveillance worm described as one of the most complex threats ever discovered

Flame surveillance worm described as one of the most complex threats ever discovered | ICT Security-Sécurité PC et Internet | Scoop.it
A worm described as the the most sophisticated cyber weapon yet unleashed has been detected attacking nations in the Middle East.

 

 

 

 

Read more:

http://www.scmagazineuk.com/flame-surveillance-worm-described-as-one-of-the-most-complex-threats-ever-discovered/article/243086/

No comment yet.