ICT Security-Sécurité PC et Internet
112.7K views | +0 today
 
Scooped by Gust MEES
onto ICT Security-Sécurité PC et Internet
August 8, 2018 6:42 AM
Scoop.it!

How to Safely Use Public Wi-Fi | #CyberHygiene #CyberSecurity #Awareness

How to Safely Use Public Wi-Fi | #CyberHygiene #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

Public Wi-Fi is a great convenience that most of us – if not all of us – utilize regularly. There is little doubt, however, that using public Wi-Fi creates serious cybersecurity risks. At the same time, cybersecurity practitioners who preach that people should refrain from using public Wi-Fi are about as likely to succeed in their effort as someone telling people to abandon insecure computers and instead use un-hackable typewriters. As such, here are 9 suggestions as to how to use public Wi-Fi safely:

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

Gust MEES's insight:

Public Wi-Fi is a great convenience that most of us – if not all of us – utilize regularly. There is little doubt, however, that using public Wi-Fi creates serious cybersecurity risks. At the same time, cybersecurity practitioners who preach that people should refrain from using public Wi-Fi are about as likely to succeed in their effort as someone telling people to abandon insecure computers and instead use un-hackable typewriters. As such, here are 9 suggestions as to how to use public Wi-Fi safely:

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

 

No comment yet.
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
April 29, 2013 5:39 PM
Scoop.it!

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security | ICT Security-Sécurité PC et Internet | Scoop.it

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security . What should get be taught and learned more in the 21st Century while using ICT?

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

  

Gust MEES's insight:

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Zhao KQiang's curator insight, March 27, 2014 7:23 AM

give some opinions of that why teachers and education should learn network secutity

Dean J. Fusto's curator insight, July 31, 2015 10:12 AM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Jean-Pierre Blanger's curator insight, August 1, 2015 4:19 PM

 

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

 

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

 

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===

 

===============================================

 

There has been a lot of talk both in the U.S. and internationally about a shortage in skilled IT professionals - with a predicted 864,000 IT vacancies in Europe alone by 2015.

 

What are these skills that organizations are looking for? This infographic by via resource highlights the top skills that make a successful information security professional and skills the future workforce will need to tackle emerging threats.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

  

Scooped by Gust MEES
May 18, 5:38 AM
Scoop.it!

Le malware TrickMo est de retour sur Android, et il se cache sur la blockchain

Le malware TrickMo est de retour sur Android, et il se cache sur la blockchain | ICT Security-Sécurité PC et Internet | Scoop.it

TrickMo, l’un des virus bancaires les plus redoutables sur Android, fait son grand retour. Pour échapper aux chercheurs et aux autorités, il se cache sur la blockchain. C’est une tactique de plus en plus répandue dans le milieu criminel.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet

 

Gust MEES's insight:

TrickMo, l’un des virus bancaires les plus redoutables sur Android, fait son grand retour. Pour échapper aux chercheurs et aux autorités, il se cache sur la blockchain. C’est une tactique de plus en plus répandue dans le milieu criminel.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
May 16, 7:15 PM
Scoop.it!

The third major Linux kernel flaw in two weeks has been found - thanks to AI

The third major Linux kernel flaw in two weeks has been found - thanks to AI | ICT Security-Sécurité PC et Internet | Scoop.it

AI is exposing Linux security holes faster than developers can patch them. Fragnesia is the latest. Here's what we know about it.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

AI is exposing Linux security holes faster than developers can patch them. Fragnesia is the latest. Here's what we know about it.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
May 16, 6:32 PM
Scoop.it!

« Dirty Frag » : une nouvelle faille dangereuse sous Linux 

« Dirty Frag » : une nouvelle faille dangereuse sous Linux  | ICT Security-Sécurité PC et Internet | Scoop.it

Cette faille du noyau Linux met les responsables de la sécurité en émoi. Voici les systèmes concernés et les mesures à prendre sans tarder.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

Cette faille du noyau Linux met les responsables de la sécurité en émoi. Voici les systèmes concernés et les mesures à prendre sans tarder.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
May 16, 8:57 AM
Scoop.it!

Cyberattaques IA : Google révèle que des hackers ont trouvé le moyen de contourner la double authentification, c'est une première

Cyberattaques IA : Google révèle que des hackers ont trouvé le moyen de contourner la double authentification, c'est une première | ICT Security-Sécurité PC et Internet | Scoop.it

Pour la première fois, des hackers ont utilisé une intelligence artificielle pour découvrir et exploiter une faille zero day dans un logiciel. Comme l’a découvert Google, cette vulnérabilité permet de contourner la double authentification, même si celle-ci a été configurée sur le compte.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=2FA

 

Gust MEES's insight:

Pour la première fois, des hackers ont utilisé une intelligence artificielle pour découvrir et exploiter une faille zero day dans un logiciel. Comme l’a découvert Google, cette vulnérabilité permet de contourner la double authentification, même si celle-ci a été configurée sur le compte.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=2FA

 

No comment yet.
Scooped by Gust MEES
May 15, 8:36 AM
Scoop.it!

New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption

New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption | ICT Security-Sécurité PC et Internet | Scoop.it

Details have emerged about a new variant of the recent Dirty Frag Linux local privilege escalation (LPE) vulnerability that allows local attackers to gain root access, making it the third such bug to be identified in the kernel within a span of two weeks.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
May 11, 3:41 PM
Scoop.it!

Google Warns of Hackers Using AI to Create Working Zero-Day Exploit

Google Warns of Hackers Using AI to Create Working Zero-Day Exploit | ICT Security-Sécurité PC et Internet | Scoop.it

Google Threat Intelligence Group recently published an alarming report detailing the rapid industrialization of generative artificial intelligence in adversarial workflows.

The most significant finding reveals that a cybercriminal syndicate successfully developed a working zero-day exploit entirely through artificial intelligence assistance. The Python-based exploit was designed to bypass two-factor authentication in a popular open-source web administration tool

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=2FA

 

Gust MEES's insight:

Google Threat Intelligence Group recently published an alarming report detailing the rapid industrialization of generative artificial intelligence in adversarial workflows.

The most significant finding reveals that a cybercriminal syndicate successfully developed a working zero-day exploit entirely through artificial intelligence assistance. The Python-based exploit was designed to bypass two-factor authentication in a popular open-source web administration tool

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=2FA

 

No comment yet.
Scooped by Gust MEES
April 30, 9:34 AM
Scoop.it!

Linux Kernel 0-Day "Copy Fail" Roots Every Major Distribution Since 2017

A critical zero-day vulnerability in the Linux kernel has been publicly disclosed, enabling any unprivileged local user to obtain root access on virtually every major Linux distribution shipped since 2017.

Dubbed “Copy Fail” and tracked as CVE-2026-31431, the flaw was discovered by Theori researcher Taeyang Lee and scaled into a full exploit chain by the Xint Code Research Team using AI-assisted analysis.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

A critical zero-day vulnerability in the Linux kernel has been publicly disclosed, enabling any unprivileged local user to obtain root access on virtually every major Linux distribution shipped since 2017.

Dubbed “Copy Fail” and tracked as CVE-2026-31431, the flaw was discovered by Theori researcher Taeyang Lee and scaled into a full exploit chain by the Xint Code Research Team using AI-assisted analysis.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
April 26, 1:21 PM
Scoop.it!

Cyber : Google investit 32 milliards de dollars dans une cyberarmée

Cyber : Google investit 32 milliards de dollars dans une cyberarmée | ICT Security-Sécurité PC et Internet | Scoop.it

Avec Wiz et ses nouveaux agents IA, Google se prépare à une cyberguerre où les machines s'affrontent à une vitesse que les humains ne peuvent égaler.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

Gust MEES's insight:

Avec Wiz et ses nouveaux agents IA, Google se prépare à une cyberguerre où les machines s'affrontent à une vitesse que les humains ne peuvent égaler.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

No comment yet.
Scooped by Gust MEES
April 3, 7:02 PM
Scoop.it!

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms | #AI #CyberSecurity

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms | #AI #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

These include a tools system to facilitate various capabilities like file read or bash execution, a query engine to handle LLM API calls and orchestration, multi-agent orchestration to spawn "sub-agents" or swarms to carry out complex tasks, and a bidirectional communication layer that connects IDE extensions to Claude Code CLI.

The leak has also shed light on a feature called KAIROS that allows Claude Code to operate as a persistent, background agent that can periodically fix errors or run tasks on its own without waiting for human input, and even send push notifications to users. Complementing this proactive mode is a new "dream" mode that will allow Claude to constantly think in the background to develop ideas and iterate existing ones.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

Gust MEES's insight:

These include a tools system to facilitate various capabilities like file read or bash execution, a query engine to handle LLM API calls and orchestration, multi-agent orchestration to spawn "sub-agents" or swarms to carry out complex tasks, and a bidirectional communication layer that connects IDE extensions to Claude Code CLI.

The leak has also shed light on a feature called KAIROS that allows Claude Code to operate as a persistent, background agent that can periodically fix errors or run tasks on its own without waiting for human input, and even send push notifications to users. Complementing this proactive mode is a new "dream" mode that will allow Claude to constantly think in the background to develop ideas and iterate existing ones.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

No comment yet.
Scooped by Gust MEES
November 2, 2025 6:41 AM
Scoop.it!

Aardvark : Le nouvel agent d'OpenAI basé sur GPT-5 pour l'automat ...

Aardvark : Le nouvel agent d'OpenAI basé sur GPT-5 pour l'automat ... | ICT Security-Sécurité PC et Internet | Scoop.it

Ce nouvel agent de cybersécurité est capable d'identifier, d'expliquer et de contribuer à corriger les vulnérabilités.

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=AI

 

Gust MEES's insight:

Ce nouvel agent de cybersécurité est capable d'identifier, d'expliquer et de contribuer à corriger les vulnérabilités.

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=AI

 

No comment yet.
Scooped by Gust MEES
March 17, 2025 6:03 PM
Scoop.it!

Amazon is Going to Listen to All Your Voice Recordings on Alexa+_

Amazon is Going to Listen to All Your Voice Recordings on Alexa+_ | ICT Security-Sécurité PC et Internet | Scoop.it

Amazon’s AI-enhanced Alexa assistant is going to need all your voice recordings, and there’s nothing you can do about it. An email sent to Alexa users notes the online retail giant is ending one of its few privacy provisions about recorded voice data in the lead up to Alexa+. The only way to make sure Amazon doesn’t get ahold of any of your vocals may be to quit using Alexa entirely.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Privacy

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Alexa

 

Gust MEES's insight:

Amazon’s AI-enhanced Alexa assistant is going to need all your voice recordings, and there’s nothing you can do about it. An email sent to Alexa users notes the online retail giant is ending one of its few privacy provisions about recorded voice data in the lead up to Alexa+. The only way to make sure Amazon doesn’t get ahold of any of your vocals may be to quit using Alexa entirely.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Privacy

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Alexa

 

No comment yet.
Scooped by Gust MEES
March 9, 2025 8:53 AM
Scoop.it!

Undocumented commands found in Bluetooth chip used by a billion devices | ESP32

Undocumented commands found in Bluetooth chip used by a billion devices | ESP32 | ICT Security-Sécurité PC et Internet | Scoop.it

Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

The researchers warned that ESP32 is one of the world's most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=maker

 

Gust MEES's insight:

xploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

The researchers warned that ESP32 is one of the world's most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=maker

 

No comment yet.
Scooped by Gust MEES
May 18, 5:46 AM
Scoop.it!

Claude Code RCE Flaw Lets Attackers Execute Commands via Malicious Deeplinks

A critical remote code execution (RCE) vulnerability has been discovered in Anthropic’s Claude Code CLI tool, allowing attackers to execute arbitrary commands on a victim’s machine by tricking them into clicking a specially crafted deeplink.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=Claude

 

 

 

Gust MEES's insight:

A critical remote code execution (RCE) vulnerability has been discovered in Anthropic’s Claude Code CLI tool, allowing attackers to execute arbitrary commands on a victim’s machine by tricking them into clicking a specially crafted deeplink.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=Claude

 

 

No comment yet.
Scooped by Gust MEES
May 18, 4:15 AM
Scoop.it!

Exploit available for new DirtyDecrypt Linux root escalation flaw

Exploit available for new DirtyDecrypt Linux root escalation flaw | ICT Security-Sécurité PC et Internet | Scoop.it

A recently patched local privilege escalation vulnerability in the Linux kernel's rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems.

Named DirtyDecrypt and also known as DirtyCBC, this security flaw was also autonomously found and reported by the V12 security team earlier this month, when the maintainers informed them that it was a duplicate that had already been patched in the mainline.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

 
Gust MEES's insight:

A recently patched local privilege escalation vulnerability in the Linux kernel's rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems.

Named DirtyDecrypt and also known as DirtyCBC, this security flaw was also autonomously found and reported by the V12 security team earlier this month, when the maintainers informed them that it was a duplicate that had already been patched in the mainline.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

 
No comment yet.
Scooped by Gust MEES
May 16, 6:58 PM
Scoop.it!

The 4th Linux kernel flaw this month can lead to stolen SSH host keys

The 4th Linux kernel flaw this month can lead to stolen SSH host keys | ICT Security-Sécurité PC et Internet | Scoop.it

The good news is there's already a patch. The bad news is that the fix isn't available for all Linux distributions yet. Here's what you can do in the meantime.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

The good news is there's already a patch. The bad news is that the fix isn't available for all Linux distributions yet. Here's what you can do in the meantime.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
May 16, 9:07 AM
Scoop.it!

OpenAI Confirms Security Breach Via TanStack npm Supply Chain Attack

Two employee devices at OpenAI were compromised in a sweeping software supply chain attack targeting TanStack npm, but the AI company confirmed no user data, production systems, or intellectual property were affected.

 

 
 
 
Gust MEES's insight:

Two employee devices at OpenAI were compromised in a sweeping software supply chain attack targeting TanStack npm, but the AI company confirmed no user data, production systems, or intellectual property were affected.

 

 
 
 
No comment yet.
Scooped by Gust MEES
May 16, 7:38 AM
Scoop.it!

Critical Linux Kernel Flaw 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords

A newly disclosed Linux kernel vulnerability is raising serious concerns across the security community, as it allows attackers to access highly sensitive data, including SSH private keys and password hashes, on affected systems.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

A newly disclosed Linux kernel vulnerability is raising serious concerns across the security community, as it allows attackers to access highly sensitive data, including SSH private keys and password hashes, on affected systems.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
May 15, 8:04 AM
Scoop.it!

Fragnesia - New Linux Kernel Vulnerability Enables Root Access

A newly disclosed Linux kernel vulnerability dubbed Fragnesia allows any local unprivileged user to escalate privileges to root without requiring a race condition, making it one of the more reliable local privilege escalation exploits seen in recent years.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

A newly disclosed Linux kernel vulnerability dubbed Fragnesia allows any local unprivileged user to escalate privileges to root without requiring a race condition, making it one of the more reliable local privilege escalation exploits seen in recent years.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
May 11, 3:31 PM
Scoop.it!

Hackers abuse Google ads, Claude.ai chats to push Mac malware

Hackers abuse Google ads, Claude.ai chats to push Mac malware | ICT Security-Sécurité PC et Internet | Scoop.it

Attackers are abusing Google Ads and legitimate Claude.ai shared chats in an active malvertising campaign. Users searching for "Claude mac download" may come across sponsored search results that list claude.ai as the target website, but lead to instructions that install malware on their Mac.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

Gust MEES's insight:

Attackers are abusing Google Ads and legitimate Claude.ai shared chats in an active malvertising campaign. Users searching for "Claude mac download" may come across sponsored search results that list claude.ai as the target website, but lead to instructions that install malware on their Mac.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

No comment yet.
Scooped by Gust MEES
April 27, 5:01 AM
Scoop.it!

„Pack2TheRoot“: Sicherheitslücke betrifft mehrere Linux-Distributionen

„Pack2TheRoot“: Sicherheitslücke betrifft mehrere Linux-Distributionen | ICT Security-Sécurité PC et Internet | Scoop.it

Das Telekom-Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die Rechteausweitung in mehreren Distributionen ermöglicht.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

Gust MEES's insight:

Das Telekom-Sicherheitsteam hat die Sicherheitslücke „Pack2TheRoot“ entdeckt, die Rechteausweitung in mehreren Distributionen ermöglicht.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Linux

 

No comment yet.
Scooped by Gust MEES
April 17, 4:41 PM
Scoop.it!

Claude Mythos: Ist diese neue KI zu gefährlich für das Internet? 

Claude Mythos: Ist diese neue KI zu gefährlich für das Internet?  | ICT Security-Sécurité PC et Internet | Scoop.it

Das automatisierte Hacking-Werkzeug Claude Mythos ist angeblich so mächtig, dass es nicht veröffentlicht wird. Wird die KI-Entwicklung nun zur Bedrohung der Sicherheit aller Online-User?

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

Gust MEES's insight:

Das automatisierte Hacking-Werkzeug Claude Mythos ist angeblich so mächtig, dass es nicht veröffentlicht wird. Wird die KI-Entwicklung nun zur Bedrohung der Sicherheit aller Online-User?

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

No comment yet.
Scooped by Gust MEES
April 3, 6:35 PM
Scoop.it!

Hackers Are Using Claude Code Leak As Bait to Spread Malware | #AI #CyberSecurity

Hackers Are Using Claude Code Leak As Bait to Spread Malware | #AI #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

A hacker was quick to pounce on the accidental leak of Anthropic’s AI tool, Claude Code, by spreading malware on a GitHub page that claimed to host the source code. 

Cybersecurity vendor Zscaler spotted a hacker exploiting interest in the Claude Code leak to push two malware strains, Vidar and Ghostsocks. Zscaler traced the threat to a GitHub page from the account “idbzoomh,” which purports to offer the leaked source code for Claude Code and claims: “I spent significant effort rebuilding the entire build system from scratch, fixing every compilation error, and making this source snapshot actually work.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

Gust MEES's insight:

A hacker was quick to pounce on the accidental leak of Anthropic’s AI tool, Claude Code, by spreading malware on a GitHub page that claimed to host the source code. 

Cybersecurity vendor Zscaler spotted a hacker exploiting interest in the Claude Code leak to push two malware strains, Vidar and Ghostsocks. Zscaler traced the threat to a GitHub page from the account “idbzoomh,” which purports to offer the leaked source code for Claude Code and claims: “I spent significant effort rebuilding the entire build system from scratch, fixing every compilation error, and making this source snapshot actually work.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?&tag=AI

 

imitolavalentina951@gmail.com's curator insight, April 3, 9:17 PM
Este articulo muestra los riesgos del uso de la inteligencia artificial en la comunicación digital, ya que puede ser utilizada de manera negativa como en caso de los hackers. Esto se relaciona con la importancia de educar a las personas en el uso responsables de la tecnología, fortaleciendo la seguridad y el manejo adecuado de la información en entornos digitales 
Scooped by Gust MEES
March 18, 2025 7:28 PM
Scoop.it!

Bedrohung für 1 Milliarde Geräte: Forscher warnen vor Bluetooth-Sicherheitslücke 

Bedrohung für 1 Milliarde Geräte: Forscher warnen vor Bluetooth-Sicherheitslücke  | ICT Security-Sécurité PC et Internet | Scoop.it

Nicht nur Android-Nutzer sind aktuell durch Sicherheitslücken gefährdet. Forscher haben eine gefährliche Backdoor im weit verbreiteten Bluetooth-Chip ESP32 entdeckt. Laut "Tarlogic Security" könnten Angreifer ohne Wissen des Nutzers auf sensible Daten zugreifen oder Geräte fernsteuern. Smartphones, Laptops und Smart-Home-Geräte sind betroffen.

Die spanische Sicherheitsforscher fanden eine undokumentierte Backdoor im ESP32-Chip. Dieser Mikrocontroller des Herstellers Espressif Systems ist in über einer Milliarde Geräte weltweit eingebaut und ermöglicht Wi-Fi- und Bluetooth-Verbindungen.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=maker

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=Bluetooth

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=ESP32

 

Gust MEES's insight:

Nicht nur Android-Nutzer sind aktuell durch Sicherheitslücken gefährdet. Forscher haben eine gefährliche Backdoor im weit verbreiteten Bluetooth-Chip ESP32 entdeckt. Laut "Tarlogic Security" könnten Angreifer ohne Wissen des Nutzers auf sensible Daten zugreifen oder Geräte fernsteuern. Smartphones, Laptops und Smart-Home-Geräte sind betroffen.

Die spanische Sicherheitsforscher fanden eine undokumentierte Backdoor im ESP32-Chip. Dieser Mikrocontroller des Herstellers Espressif Systems ist in über einer Milliarde Geräte weltweit eingebaut und ermöglicht Wi-Fi- und Bluetooth-Verbindungen.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=maker

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=Bluetooth

 

https://www.scoop.it/topic/securite-pc-et-internet?tag=ESP32

 

No comment yet.
Scooped by Gust MEES
March 13, 2025 10:23 AM
Scoop.it!

WordPress Backup Plugin Vulnerability Affects 5+ Million Websites

WordPress Backup Plugin Vulnerability Affects 5+ Million Websites | ICT Security-Sécurité PC et Internet | Scoop.it

A high-severity vulnerability was discovered and patched in the All-in-One WP Migration and Backup plugin, which has over five million installations. The vulnerability requires no user authentication, making it easier for an attacker to compromise a website, but this is mitigated by a restricted attack method.

The vulnerability was assigned a severity rating of 7.5 (High), which is below the highest severity level, labeled Critical.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=WordPress

 

Gust MEES's insight:

A high-severity vulnerability was discovered and patched in the All-in-One WP Migration and Backup plugin, which has over five million installations. The vulnerability requires no user authentication, making it easier for an attacker to compromise a website, but this is mitigated by a restricted attack method.

The vulnerability was assigned a severity rating of 7.5 (High), which is below the highest severity level, labeled Critical.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=WordPress

 

No comment yet.
Scooped by Gust MEES
February 19, 2025 4:06 AM
Scoop.it!

Passkeys: What They Are and Why You Need Them ASAP

Passkeys: What They Are and Why You Need Them ASAP | ICT Security-Sécurité PC et Internet | Scoop.it

Passkeys might be what finally puts an end to passwords for good. Here's how they work, where you can use them, and why they keep your accounts safe.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=PassKey

 

Gust MEES's insight:

Passkeys might be what finally puts an end to passwords for good. Here's how they work, where you can use them, and why they keep your accounts safe.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=PassKey

 

No comment yet.