ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings [Video]

Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings [Video] | ICT Security-Sécurité PC et Internet | Scoop.it
Flaws in Samsung Phones Allow Hackers to Make Calls, Install Apps and Change Settings

 

Two of the vulnerabilities can be leveraged to silently install highly privileged apps without requiring any user interaction. A different issue can be exploited by an attacker to send SMS messages without requiring the android.permission.SEND_SMS permission. 

Another vulnerability can be used to silently make phone calls, send emails and SMSs, and perform “almost any action.”


Gust MEES's insight:

 

Two of the vulnerabilities can be leveraged to silently install highly privileged apps without requiring any user interaction. A different issue can be exploited by an attacker to send SMS messages without requiring the android.permission.SEND_SMS permission. 

Another vulnerability can be used to silently make phone calls, send emails and SMSs, and perform “almost any action.”


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

The second most important BYOD security defense: user awareness

The second most important BYOD security defense: user awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.
Gust MEES's insight:

 

                ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

Gust MEES's curator insight, March 4, 2013 4:07 PM

 

                 ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Security is changing, organizations are unprepared - BYOD

Security is changing, organizations are unprepared - BYOD | ICT Security-Sécurité PC et Internet | Scoop.it

F5 Networks announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security. Respondents were RSA attendees with IT responsibilities over planning, management, oversight, or implementation of security.


BYOD is seen as critical in an organization’s ability to achieve the level of security it desires, yet a sizeable number of organizations are not taking the appropriate steps to address it.

Most (75%) see BYOD as being prevalent in their organization.Furthermore, two-thirds (66%) see BYOD as having a somewhat to extremely high impact on security.Despite this, one-third (35%) say they are not prepared to provide adequate security to protect against threats associated with BYOD.




Gust MEES's insight:

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is increasing IT frustration and loss of control

BYOD is increasing IT frustration and loss of control | ICT Security-Sécurité PC et Internet | Scoop.it

BYOD is creating new challenges for IT. The top two sources of frustration were onboarding and then supporting the increasing number and variety of personal devices, far outranking even security concerns.


The survey also found that IT is increasingly losing control of mobility budgets as departments assume greater responsibility for mobile initiatives. The number of enterprises in which IT manages the mobility spend has dropped to 48 percent, down from 53 percent in 2011. Forty (40) percent of companies' mobility budgets are now managed by non-IT departments.


Gust MEES's insight:

A MUST read!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Spoofing, banking attacks, authentication flaws, and more top the list of 2012's biggest mobile security headaches
Scooped by Gust MEES
Scoop.it!

FCC Small Biz Cyber Planner 2.0 | FCC.gov

FCC Small Biz Cyber Planner 2.0 | FCC.gov | ICT Security-Sécurité PC et Internet | Scoop.it


Information technology and high-speed Internet are great enablers of small business success, but with the benefits comes the need to guard against growing cyber threats. As larger companies take steps to secure their systems, less secure small businesses are easier targets for cyber criminals. In October 2012, the FCC re-launched Small Biz Cyber Planner 2.0, an online resource to help small businesses create customized cybersecurity plans. Use this tool to create and save a custom cyber security plan for your company, choosing from a menu of expert advice to address your specific business needs and concerns.

 

 

==================================================

 

Gust MEES

 

A MUST for Education and Business! Especially for "Bring Your Own Device" (BYOD)

 

==================================================

Gust MEES's insight:

A MUST also for Education, very easy to generate and which gives YOU the necessary knowledge to have a good Cyber-Security, please read it and test it!

No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Smart Phone Malware Risk Rises - BankInfoSecurity

Smart Phone Malware Risk Rises - BankInfoSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
New malware attacks are targeting smart phones, and experts say banking institutions aren't doing enough to detect and prevent those attacks.

 

 

 

Read more, a MUST:

http://www.bankinfosecurity.com/smart-phone-malware-risk-rises-a-5286?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symbian malware scene far from dead

Symbian malware scene far from dead | ICT Security-Sécurité PC et Internet | Scoop.it
Despite Android’s dominance in the mobile threat landscape, the Symbian malware scene is far from dead. 21 new families and variants were discovered in the third quarter of 2012, a 17% increase compared to the second quarter.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2314

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | ICT Security-Sécurité PC et Internet | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The 10 most common mobile security problems and how you can fight them

The 10 most common mobile security problems and how you can fight them | ICT Security-Sécurité PC et Internet | Scoop.it
GAO report to Congress takes a close look at mobile security issues...

 

Combine the lack of security with the fact that mobile devices are being targeted by cybercriminals and you have a bad situation. For example, the number of variants of malicious software aimed at mobile devices has reportedly risen from about 14,000 to 40,000 or about 185% in less than a year, the GAO stated.

 

Gust MEES: a MUST READ for anybody using m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD)

 

Read more:

http://www.networkworld.com/news/2012/091912-mobile-security-262581.html?hpg1=bn

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Zero-Day Exploit Found on Samsung Galaxy S3

Zero-Day Exploit Found on Samsung Galaxy S3 | ICT Security-Sécurité PC et Internet | Scoop.it
A team of Android security experts successfully hacked a Samsung Galaxy S3 by revealing two Android exploits at the Mobile Pwn2Own competition at EUSecWest in Amsterdam.

 

 

 

Read more:

http://www.hotforsecurity.com/blog/zero-day-exploit-found-on-samsung-galaxy-s3-3591.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Half of companies have lost a device with important data

Half of companies have lost a device with important data | ICT Security-Sécurité PC et Internet | Scoop.it

Half of companies have lost a device with important company data on it, causing security implications for over a fifth of organizations, according to Varonis.

57% of employees believe that BYOD puts their personal data at risk as well. Despite these concerns, 86% of the workforce are obsessed with their devices.


Gust MEES's insight:

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

10 security best practice guidelines for businesses

10 security best practice guidelines for businesses | ICT Security-Sécurité PC et Internet | Scoop.it
Businesses need extreme security measures to combat extreme threats. Here are ten best practices that provide defense against the majority of all security threats.
Gust MEES's insight:

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 3:59 PM

 

                      ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | ICT Security-Sécurité PC et Internet | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's curator insight, February 15, 2013 12:42 PM

                    ===> BEWARE of the MALWARE!!! <===

 

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Managing Mobile Privacy | Security Intelligence Blog [Infographic]

Managing Mobile Privacy | Security Intelligence Blog [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
Trend Micro infographic on how users can manage their privacy while using their mobile devices.
Gust MEES's insight:

A MUST have Infographic to understand the risks!!!
SHOULD be pinned in any schools!


Gust MEES's curator insight, February 4, 2013 8:13 AM

A MUST have Infographic to understand the risks!!!

SHOULD be pinned in any schools!

 

Nqobile Martha's curator insight, May 29, 2014 9:05 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Nqobile Martha's curator insight, May 29, 2014 9:08 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Scooped by Gust MEES
Scoop.it!

Prediction BYOD may go away in 2013

Prediction BYOD may go away in 2013 | ICT Security-Sécurité PC et Internet | Scoop.it
With a new year come new challenges. But while many see bringyourowndevice gaining momentum, more organizations may be ready to issue their own handhelds to employees.
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

McAfee : comment sécuriser les Smartphones, tablettes et autres Xbox - Global Security Mag Online

McAfee : comment sécuriser les Smartphones, tablettes et autres Xbox - Global Security Mag Online | ICT Security-Sécurité PC et Internet | Scoop.it
Au même titre que les années passées, les appareils connectés et en particulier les tablettes et les smartphones, seront sûrement dans de nombreuses (...)
No comment yet.
Scooped by Gust MEES
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The global expansion of cybercrime

The global expansion of cybercrime | ICT Security-Sécurité PC et Internet | Scoop.it

McAfee released a new report which explores techniques in cybercrime as well as the global evolution of cyber exploits. It uncovers new details of “Operation High Roller,” tracks that ===> mobile malware almost doubled the previous quarter’s total, <=== and reveals an all-time high in database breaches.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2318

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | ICT Security-Sécurité PC et Internet | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 

Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Scooped by Gust MEES
Scoop.it!

The BYOD security commandments

The BYOD security commandments | ICT Security-Sécurité PC et Internet | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Sophos rolls out mobile apps for anti-malware and encryption

Sophos rolls out mobile apps for anti-malware and encryption | ICT Security-Sécurité PC et Internet | Scoop.it
Antivirus app for Android expected to be integrated into Sophos mobile-device management...
No comment yet.