ICT Security-Sécurité PC et Internet
87.2K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
May 18, 2012 11:29 AM
Scoop.it!

MacScan 2.9.3 with Google Chrome and SeaMonkey support released

MacScan 2.9.3 with Google Chrome and SeaMonkey support released | ICT Security-Sécurité PC et Internet | Scoop.it
SecureMac released MacScan 2.9.3, which features tracking cookie detection and cleaning for Google’s Chrome browser.

 

MacScan is the premier Macintosh security program, protecting you against the latest malware and privacy threats for Apple Mac OS X, offering protection against keystroke loggers, trojan horses, and other spyware.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
May 15, 2012 4:00 PM
Scoop.it!

Avira Antivirus update wreaks havoc on millions of PCs

Avira Antivirus update wreaks havoc on millions of PCs | ICT Security-Sécurité PC et Internet | Scoop.it

If you are a user of any of the paid versions of Avira's various antivirus and security software and you have tried to update it/them in the last 24 hours, chances are that you're now sitting before a crippled PC, wondering what happened.

So what did happen?

 

Well, it seems that the new update makes the AntiVirProActiv component - not present only in the company's free offering - erroneously detect critical Windows processes as malware and automatically terminate them...

 

 

 

No comment yet.
Scooped by Gust MEES
April 20, 2012 7:27 PM
Scoop.it!

The importance of ethical hacking

The importance of ethical hacking | ICT Security-Sécurité PC et Internet | Scoop.it
The need for more effective information security practices is increasingly evident with each security breach reported in the media.

 

When adopting new technologies like cloud computing, virtualization, or IT outsourcing, enterprises are facing imminent security threats and must adjust their security processes, policies, and architectures accordingly.

 

Read more...

No comment yet.
Scooped by Gust MEES
May 17, 2012 11:10 AM
Scoop.it!

Most CCTV systems are easily accessible to attackers

Most CCTV systems are easily accessible to attackers | ICT Security-Sécurité PC et Internet | Scoop.it
The use of CCTV cameras for physical surveillance of all kinds of environments has become so pervasive that most of us don't give the devices a second thought anymore.

 

But, those individuals and organizations who actually use and control them should be aware that most of them come with default settings that make them vulnerable to outside attacks.

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
April 24, 2012 8:42 AM
Scoop.it!

BYOD is both an opportunity and a threat

BYOD is both an opportunity and a threat | ICT Security-Sécurité PC et Internet | Scoop.it
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices.

 

===> The key to keeping your network secure is to manage those devices." <===

 

Read more...

 

No comment yet.
Scooped by Gust MEES
April 19, 2012 7:12 AM
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | ICT Security-Sécurité PC et Internet | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.