digitalcuration
15.6K views | +1 today
Follow
 
Scooped by Stéphane Koch
onto digitalcuration
Scoop.it!

Ten Steps to Smartphone Security for Android

Ten Steps to Smartphone Security for Android | digitalcuration | Scoop.it

Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer as mobile cybersecurity threats are growing. Mobile security tips can help you reduce the risk of exposure to mobile security threats.

 

more...
No comment yet.
digitalcuration
société de l'information, identité & comportements numériques, sécurité de l'information, réseaux & médias sociaux
Curated by Stéphane Koch
Your new post is loading...
Your new post is loading...
Scooped by Stéphane Koch
Scoop.it!

E-reputation: how one's online life can interfere with one's offline life

E-reputation: how one's online life can interfere with one's offline life | digitalcuration | Scoop.it
GBNews attended a conference on e-reputation, or how one’s “online life” can interfere and cause damage to his or her “offline life”. 

For some years now, we have witnessed important digital and societal transformations. The separation between private and public has become a blurred line. As Stéphane Koch underlines, a social network is a human creation. Unlike many, Koch sees the internet as part of real life and not something purely virtual. 

For him, the internet is just a tool used to connect people. But like all tools, we need to know how to properly use it, so that we do not get hurt. At the same time, because of the technological progress and the era of globalization we live in, more and more people seem to be losing control over their personal data. According to Koch, we are facing a true dematerialization of data. “Bye Bye files and archives department, Hello Clouds!” we could say. These changes can have an important impact on our lives, both on and offline
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Strong and stable: The iOS security guide

Strong and stable: The iOS security guide | digitalcuration | Scoop.it
Apple’s smartphones are highly secure, but if your private or enterprise data matters to you, it’s essential to ensure your iPhone (or iPad) is as secure as possible.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

The Story of a Scammer on Facebook Who Conned Me (and Many Others)

The Story of a Scammer on Facebook Who Conned Me (and Many Others) | digitalcuration | Scoop.it

Scams involving cameras are rampant these days. After almost losing a Nikon D850 to a scam on eBay, I recently also discovered a massive camera scam that involved 10 people. Here’s the story.

more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Cyber Security & Hacking News – How to keep children safe on the internet

Cyber Security & Hacking News – How to keep children safe on the internet | digitalcuration | Scoop.it
Kids these days are digital natives. They’ve grown up with the internet and have no concept of what life was like without it. They’re completely at home with technology: using a mouse or touchscreen to navigate is as much a life skill as learning to read and write. 

In fact, children tend to learn to use a touchscreen way before they can read or write, using colours, images and symbols instead of words to navigate around apps and websites in order to get to a video or game they like. 

Whatever the age of your kids, it’s important to keep them safe when browsing websites, using social networking services such as Facebook, and chatting with friends using instant messaging programs. 

Although your children may know more about using a laptop, tablet and the internet than you do, it’s your responsibility to ensure they’re protected from the parts of the web that present a danger to them.

The dangers (see below) may sound bad, but the good news is that you can prevent most of them happening without too much time, effort or money. 

Common sense plays a bigger part than you might think. For a start, we’d recommend not allowing children to use a device – laptop, tablet or phone – in their own room. Asking them to use it in a communal area should discourage most inappropriate activities as it will be obvious what they’re up to even if you only glance in their direction. 

The most important thing to do is to talk to each child and explain (in a way appropriate to their age) the dangers that the internet could pose to them, and why they can’t use their devices in their room.

Also, encourage them to tell you whenever they see anything that makes them uncomfortable or upsets them, or simply isn’t what they expected. 

You can delete inappropriate websites from your browser’s history, and add the site’s address to a parental control filter list (we’ll come to this in a minute).

Also encourage them to tell you if they receive any threatening or frightening messages or emails – you can add the sender’s address to most email programs’ blocked list.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Connectés non-stop

Connectés non-stop | digitalcuration | Scoop.it
Nous nous pensons libres et indépendants ? Peut-être... Mais il est temps de prendre conscience que nous sommes assistés dans tous les moments de notre vie, ou presque, par les nouvelles technologies, ce que s'emploie à faire ce film réalisé dans le cadre du Magister Science, technique et société au Conservatoire national des arts et métiers (CNAM).
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

No boundaries: Exfiltration of personal data by session-replay scripts

No boundaries: Exfiltration of personal data by session-replay scripts | digitalcuration | Scoop.it
You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use “session replay” scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers. Unlike typical analytics services that provide aggregate statistics, these scripts are intended for the recording and playback of individual browsing sessions, as if someone is looking over your shoulder.

The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data collected by these services far exceeds user expectations [1]; text typed into forms is collected before the user submits the form, and precise mouse movements are saved, all without any visual indication to the user. This data can’t reasonably be expected to be kept anonymous. In fact, some companies allow publishers to explicitly link recordings to a user’s real identity
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Pizzagate: Anatomy of a Fake News Scandal

Pizzagate: Anatomy of a Fake News Scandal | digitalcuration | Scoop.it
Inside the web of conspiracy theorists, Russian operatives, Trump campaigners and Twitter bots who manufactured the 'news' that Hillary Clinton ran a pizza-restaurant child-sex ring
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Facebook fait le ménage et supprime plusieurs grosses pages de "buzz" - Blog du Modérateur

Facebook fait le ménage et supprime plusieurs grosses pages de "buzz" - Blog du Modérateur | digitalcuration | Scoop.it
Quand Facebook fait le ménage, il ne fait pas les choses à moitié. Plusieurs gros acteurs français l'ont appris à leurs dépens en constatant la suppression
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

New Vulnerability Exploits Antivirus Programs to Install Malware

New Vulnerability Exploits Antivirus Programs to Install Malware | digitalcuration | Scoop.it
It is common notion that antivirus software keeps our computers safe from all types of bugs and malware. However, it seems that cybercriminals are hell-bent on changing this belief by using these programs for fulfilling their malicious objectives. As per the findings of Kapsch’s security researcher Florian Bogner, hackers have learned to exploit the Restore from Quarantine feature, and a number of AV solutions have been affected. The flaw has been named AVGater. 

Bogner an Austrian security editor, states that once it is on a system, this vulnerability relocates malware from an AV quarantine folder and stores it to another sensitive location. It is rather surprising that all antivirus programs available nowadays are plagued with this flaw including Kaspersky, ZoneAlarm, Malwarebytes, Emsisoft, Trend Micro and Ikarus to name a few.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Snapchat is as fragile as a Yellow Duck from the 1980s

Snapchat is as fragile as a Yellow Duck from the 1980s | digitalcuration | Scoop.it
Diving results for Snap Inc’s Q3 means Snapchat will likely have to be dumbed down to compete with Instagram globally. Snapchat needs to pivot, and pivot fast. There is this urgency when your company…
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

7 Applications of the Blockchain that hook you to the future

7 Applications of the Blockchain that hook you to the future | digitalcuration | Scoop.it
Earlier we have discussed Blockchain and it's explanation - now open your lids to peep into the applications of the Blockchain.The most
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Adieu Darknet, bonjour Librenet

Adieu Darknet, bonjour Librenet | digitalcuration | Scoop.it
Qu'est-ce que le Darknet, ou plutôt les darknets ? A quoi et pour qui servent-ils ? Sur quoi reposent-ils ? L’anonymat conféré est-il garanti ? Que peut-on y trouver ?
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Android security audit: An 11-step checklist

Android security audit: An 11-step checklist | digitalcuration | Scoop.it
Android security doesn't have to be a source of stress. These easy-to-follow steps are all you need to keep the boogeyman at bay.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Protéger son nom de domaine, un geste élémentaire pour une entreprise

Protéger son nom de domaine, un geste élémentaire pour une entreprise | digitalcuration | Scoop.it
La gestion de son nom de domaine révèle, pour une entreprise, d’enjeux sous-jacents : cybersquatting, contrefaçon et protection des marques, réputation, surveillance de la concurrence, etc. Emilie Dessens, Présidente de la société Domainoo, spécialisée dans l’enregistrement et la protection des noms de domaine, est venue le rappeler lors d’une conférence organisée par le Club Webtechno de l’AEGE.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

8 reasons why you should strengthen your iOS passcode today

8 reasons why you should strengthen your iOS passcode today | digitalcuration | Scoop.it
Don't be a digital victim, take control of your digital life: why and how to use tough iOS passcode
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

YouTube aurait pu être une page blanche, elle est le reflet des pires stéréotypes sur le genre

YouTube aurait pu être une page blanche, elle est le reflet des pires stéréotypes sur le genre | digitalcuration | Scoop.it
Les filles les plus suivies parlent mode et beauté tandis que les garçons sont surreprésentés dans le domaine des jeux vidéo ou de la science. Décryptage de la division techno-genrée de la plateforme vidéo de Google.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Banking Trojan Gains Ability to Steal Facebook, Twitter and Gmail Accounts

Banking Trojan Gains Ability to Steal Facebook, Twitter and Gmail Accounts | digitalcuration | Scoop.it


This Trojan Can Steal Your Facebook, Twitter and Gmail accounts


Security researchers have discovered a new variant of Terdot banking Trojan that steals social media and email accounts as well, along with bank account details.


However, according to the latest analysis, Terdot can target social media networks including Facebook, Twitter, Google Plus, and YouTube, and email service providers including Google's Gmail, Microsoft's live.com, and Yahoo Mail. 


Interestingly, the malware avoids gathering data related to Russian largest social media platform VKontakte (vk.com), Bitdefender noted. This suggests Eastern European actors may be behind the new variant. 


The banking Trojan is mostly being distributed through websites compromised with the SunDown Exploit Kit, but researchers also observed it arriving in a malicious email with a fake PDF icon button.
If clicked, it executes obfuscated JavaScript code that downloads and runs the malware file. In order to evade detection, the Trojan uses a complex chain of droppers, injections, and downloaders that allow the download of Terdot in pieces.

more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Désinformation, fake news, théorie du complot : D'où vient l'info ? - [DANE de Lyon]

Désinformation, fake news, théorie du complot : D'où vient l'info ? - [DANE de Lyon] | digitalcuration | Scoop.it
Support de FIL de groupes de bassin de professeurs-documentalistes Formatrice : Edwige JAMIN
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Deleted WhatsApp sent messages might not be gone forever

Deleted WhatsApp sent messages might not be gone forever | digitalcuration | Scoop.it
The first 100 characters are in the registry, and you don’t even have to bother with that if you have a backup app. How very Snapchat!
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

High-Tech Bridge announces free application discovery and inventory service

High-Tech Bridge announces free application discovery and inventory service | digitalcuration | Scoop.it

ImmuniWeb® Discovery provides continuous discovery, inventory and visibility of web and mobile applications and their APIs.


High-Tech Bridge, a global web security company, is happy to announce a public launch of ImmuniWeb® Discovery that was initially presented to a limited number of exclusive customers and partners on the 28th ISF Congress in Cannes. 


The free service is a part of ImmuniWeb® Application Security Testing (AST) Platform, designed to reduce AST costs, minimize external attack surface and help achieve compliance and regulatory requirements. ImmuniWeb Discovery enables companies and organizations to maintain a comprehensive inventory and classification of their external web and mobile applications, as well as their APIs. The free service provides a continuous and non-intrusive application discovery, leveraging a wide spectrum of reconnaissance and OSINT information gathering techniques.

more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

What do Vegas hookers, Colombian government, and 30,000 other sites have in common? Crypto-jacking miners • The Register

What do Vegas hookers, Colombian government, and 30,000 other sites have in common? Crypto-jacking miners • The Register | digitalcuration | Scoop.it
Over the past few months there has been an alarming rise in the number of websites running code that silently joyrides computers and secretly makes them mine digital currency for miscreants. 

The latest count suggests more than 30,000 sites are quietly running JavaScript miners on people's PCs and handhelds – way more than previously thought. 

An analysis, published this month by infosec guru Troy Mursch, revealed that the vast majority of currency-mining software came from Coin Hive, the freely available JavaScript code developed to mine Monero. It appears the scripts were slipped into most, but not all, webpages covertly by hackers and other miscreants. In all, Mursch found 30,611 sites on the web running Coin Hive's JavaScript to effectively crypto-jack machines into digging up digital dosh for shady netizens.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Ce que l’on sait sur les usages de Wikipedia en France

Ce que l’on sait sur les usages de Wikipedia en France | digitalcuration | Scoop.it
L’encyclopédie Wikipédia a vu le jour en 2001. La Wikipédia francophone a, elle, été fondée le 23 mars 2001. Forte d’une communauté française très active mais aussi suisse, belge, canadienne ou africaine, Wikipedia.fr compte près de 10 000 nouveaux articles par mois. Le million d’articles en français a été atteint le 23 septembre 2010. En juin 2017, l’édition française compte au total 1,8 million d’articles. C’est la 6ème plus importante édition linguistique en termes de nombre d’articles. 

 L’édition française enregistre 700 millions de vues par mois, soit 23,3 millions par jour, dont 16 millions à partir de la France (68,5 %).
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Apple’s iPhone X's Face ID beaten by mask

Apple’s iPhone X's Face ID beaten by mask | digitalcuration | Scoop.it

This time Bkav, a Vietnamese security firm, challenged Apple’s Face ID unlock technology that has been replaced by Touch ID in iPhone X to check if they could bypass the security system using a mask. The security researchers discovered that they could trick the facial recognition features of the iPhone X using a specially constructed mask.

more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Joyce Weisbecker, pionnière méconnue de la programmation de jeux vidéo

Joyce Weisbecker, pionnière méconnue de la programmation de jeux vidéo | digitalcuration | Scoop.it
Cette informaticienne est devenue en 1976 la première femme professionnelle de l’industrie, révèle une enquête historique du site américain Co.Design.
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

L’utilisation de Snapchat dans le secteur du recrutement

L’utilisation de Snapchat dans le secteur du recrutement | digitalcuration | Scoop.it
Twitter et Linkedin proposent déjà une offre de recrutement bien rodée : comment Snapchat peut-il se faire une place dans le domaine ?
more...
No comment yet.
Scooped by Stéphane Koch
Scoop.it!

Beaucoup de questions sur le bug qui fait mal à votre portefeuille Ethereum. Et aucune réponse pour le moment... - Korben

Beaucoup de questions sur le bug qui fait mal à votre portefeuille Ethereum. Et aucune réponse pour le moment... - Korben | digitalcuration | Scoop.it
La news de ces 2 derniers jours dans la communauté cryptomonnaie, c'est bien évidemment ce "bug" dans le wallet Parity qui a provoqué la blocage de 1 million d'Ethereum (environ 280 millions de dollars au moment des faits. Environ 154 millions de dollars maintenant.). Ouch. Ce problème touche les wallets multisignatures créées après le 20 > Lire la suite
more...
No comment yet.