ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Hundreds of Pages of New Security Intelligence Now Available

Hundreds of Pages of New Security Intelligence Now Available | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

 

Today we released the latest volume of the Microsoft Security Intelligence Report (SIR) containing a large body of new data and analysis on the threat landscape. This volume of the SIR includes:

 

- Latest industry vulnerability disclosure trends and analysis


- Latest data and analysis of global vulnerability exploit activity


- Latest trends and analysis on global malware and potentially unwanted software


- Latest analysis of threat trends in more than 100 countries/regions around the world


- Latest data and insights on how attackers are using spam and other email threats


- Latest global and regional data on malicious websites including phishing sites, malware hosting sites and drive-by download sites

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

U.S. ISPs Commit to Help Protect Consumers from Botnets

U.S. ISPs Commit to Help Protect Consumers from Botnets | ICT Security-Sécurité PC et Internet | Scoop.it

Today the U.S. Federal Communication Commission’s (FCC) Communications Security Reliability and Interoperability Council (CSRIC) voted to approve the Anti-Bot Code of Conduct for Internet Service Providers.

 

The code represents an important commitment by the nation’s leading ISPs to help consumers prevent, detect and remediate bot infections. To participate in this Code, an ISP will engage in at least one activity in each of the following general areas:

 

- Education - an activity intended to help increase end-user education and awareness of botnet issues and how to help prevent bot infections;


- Detection - an activity intended to identify botnet activity in the ISP’s network, obtain information on botnet activity in the ISP’s network, or enable end-users to self-determine potential bot infections on their end-user devices;


- Notification - an activity intended to notify customers of suspected bot infections or enable customers to determine if they may be infected by a bot;


- Remediation - an activity intended to provide information to end-users about how they can remediate bot infections, or to assist end-users in remediating bot infections.


- Collaboration - an activity to share with other ISPs feedback and experience learned from the participating ISP’s Code activities.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Trustworthy Computing: Learning About Threats for Over 10 Years–Part 4

Trustworthy Computing: Learning About Threats for Over 10 Years–Part 4 | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
No comment yet.
Scooped by Gust MEES
Scoop.it!

What You Should Know About Drive-By Download Attacks – Part 2 - Microsoft Security Blog - Site Home - TechNet Blogs

What You Should Know About Drive-By Download Attacks – Part 2 - Microsoft Security Blog - Site Home - TechNet Blogs | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
No comment yet.
Scooped by Gust MEES
Scoop.it!

The Threat Landscape in India – More Active Than First Thought - Microsoft Security Blog - Site Home - TechNet Blogs

The Threat Landscape in India – More Active Than First Thought - Microsoft Security Blog - Site Home - TechNet Blogs | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Phishing Financial Institutions & Social Networks

Phishing Financial Institutions & Social Networks | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity: Building Safer Computing Experiences in a Connected Society

Cybersecurity: Building Safer Computing Experiences in a Connected Society | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

 

Cybersecurity will remain a top priority for governments, policymakers and citizens around the world, especially as they continue to increase their reliance on information and communications technologies.

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Trustworthy Computing

Trustworthy Computing | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

 

Attackers’ motivations have changed since 2004 and now ===> financial gain is a primary motivation for the activity we see in the threat landscape. <===

 

Attackers have had to broaden the repertoire of tactics they use to attempt to compromise systems; most of the attacks we see today rely on social engineering - trying to get users to bring badness from the Internet through their host based firewalls via web browsers, peer to peer networks, document parsers, email, social networks, etc.

 

Gust MEES: #Internetsafety, #Onlinesafety and #itsecurity are part of 21st Century Learning!

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber-Threats in the European Union - Microsoft Security Blog - Site Home - TechNet Blogs

Cyber-Threats in the European Union - Microsoft Security Blog - Site Home - TechNet Blogs | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
No comment yet.