The FBI has reportedly found evidence that foreign hackers breached two state election databases in recent weeks.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Elections
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
The FBI has reportedly found evidence that foreign hackers breached two state election databases in recent weeks.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Elections
No comment yet.
Sign up to comment
Praktisch, wenn man unterwegs ein USB-Kabel zum Aufladen des Smartphones findet. Allerdings sollte man sein Telefon nicht an jedes beliebige Kabel hängen. Über präparierte Ladestationen können Unbefugte in den Besitz persönlicher Daten gelangen.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Video+Jacking
Gust MEES's insight:
Praktisch, wenn man unterwegs ein USB-Kabel zum Aufladen des Smartphones findet. Allerdings sollte man sein Telefon nicht an jedes beliebige Kabel hängen. Über präparierte Ladestationen können Unbefugte in den Besitz persönlicher Daten gelangen.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Video+Jacking
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
Gust MEES's insight:
Der Nachrichtendienst NSA ist offenbar Opfer eines Hackerangriffs geworden. Bereits 2013 erbeutete Überwachungsprogramme wurden jetzt im Internet veröffentlicht. Edward Snowden vermutet russische Hintermänner. Für die NSA könnte der Hack unangenehme Folgen haben.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
Gust MEES's insight:
This is surely no frivolous hacker feud, but an incredibly sophisticated attack on the US cyber-security infrastructure — even though it was meant to look like it was carried out by Guy-Fawkes-mask-wearing ideological warriors, at least a bit. It even features a quasi-illiterate intro/rant railing against “the elites.” It’s a familiar refrain in an American political season dominated by anti-establishment politicians, and it fits well with the stereotype of the libertarian hacker — but it also seems to want to convince these elites not to support the sort of offensive hacking on display in their leak. Emphasis added:
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
US-Sicherheitsexperten und frühere NSA-Mitarbeiter befinden die Software, die Unbekannte am Wochenende veröffentlichten, als echt.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
Gust MEES's insight:
US-Sicherheitsexperten und frühere NSA-Mitarbeiter befinden die Software, die Unbekannte am Wochenende veröffentlichten, als echt.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — like a TV. However, new research shows that this feature may quietly expose users to a simple and cheap new form of digital eavesdropping.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=USB
Gust MEES's insight:
A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — like a TV. However, new research shows that this feature may quietly expose users to a simple and cheap new form of digital eavesdropping.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=USB
Ein Supertrojaner blieb fünf Jahre lang unentdeckt | #CyberSecurity #Cyberespionage #Strider #RemsecSicherheitsexperten haben eine Malware entdeckt, die sich offenbar schon seit mindestens fünf Jahren auf bestimmten Computersystemen befindet. Die perfekte Tarnung der Schadsoftware spricht für eine staatlich sanktionierte Entwicklung auf höchstem Niveau. Auch nach der Entdeckung bleiben Virenscanner dabei praktisch machtlos.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Remsec
Gust MEES's insight:
Sicherheitsexperten haben eine Malware entdeckt, die sich offenbar schon seit mindestens fünf Jahren auf bestimmten Computersystemen befindet. Die perfekte Tarnung der Schadsoftware spricht für eine staatlich sanktionierte Entwicklung auf höchstem Niveau. Auch nach der Entdeckung bleiben Virenscanner dabei praktisch machtlos.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Remsec
In response to the disclosure of vulnerabilities in Tor's design, researchers at MIT have created Riffle, a system that allegedly provides better security and uses bandwidth more efficiently.
Gust MEES's insight:
In response to the disclosure of vulnerabilities in Tor's design, researchers at MIT have created Riffle, a system that allegedly provides better security and uses bandwidth more efficiently.
"We've switched from cyber-espionage to offensive cyber action," Hyppönen told El Reg. "The cyber arms race is just beginning and it's going to get much worse."
Learn more / En savoir plus / Mehr erfahren:
Gust MEES's insight:
"We've switched from cyber-espionage to offensive cyber action," Hyppönen told El Reg. "The cyber arms race is just beginning and it's going to get much worse."
Learn more / En savoir plus / Mehr erfahren:
From
www
Media Markt macht es in Ingolstadt, Ikea probiert sie in Graz aus, MyMuesli auf dem Münchner Viktualienmarkt und bei McDonald's stecken sie in knapp drei Dutzend deutschen Filialen: die Beacons. Das sind keine Speckstreifen, sondern Minisender, die Kunden, die über ein Smartphone verfügen, individuelle Nachrichten aufs Handy zaubern.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/
http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Beacon
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Beacons
Gust MEES's insight:
Media Markt macht es in Ingolstadt, Ikea probiert sie in Graz aus, MyMuesli auf dem Münchner Viktualienmarkt und bei McDonald's stecken sie in knapp drei Dutzend deutschen Filialen: die Beacons. Das sind keine Speckstreifen, sondern Minisender, die Kunden, die über ein Smartphone verfügen, individuelle Nachrichten aufs Handy zaubern.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/
http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Beacon
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Beacons
An update to Rule 41 of the Federal Rules of Criminal Procedure will grant new powers for law enforcement to target users of privacy tools like Tor and VPN.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
http://www.scoop.it/t/securite-pc-et-internet/?tag=VPN
Gust MEES's insight:
An update to Rule 41 of the Federal Rules of Criminal Procedure will grant new powers for law enforcement to target users of privacy tools like Tor and VPN.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN
http://www.scoop.it/t/securite-pc-et-internet/?tag=VPN
Asked whether the Justice Dept. would demand source code in the future, the spokesperson declined to comment.
The government has demanded source code in civil cases filed under seal but also by seeking clandestine rulings authorized under the secretive Foreign Intelligence Surveillance Act (FISA), a person with direct knowledge of these demands told ZDNet. We're not naming the person as they relayed information that is likely classified.
Learn more:
https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/
http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...
Gust MEES's insight:
Asked whether the Justice Dept. would demand source code in the future, the spokesperson declined to comment.
The government has demanded source code in civil cases filed under seal but also by seeking clandestine rulings authorized under the secretive Foreign Intelligence Surveillance Act (FISA), a person with direct knowledge of these demands told ZDNet. We're not naming the person as they relayed information that is likely classified.
Learn more:
https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/
http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage...
Now let’s imagine the potential effect of a similar device used for espionage, you can object me that it is possible to do it with many other solutions and it is true, but have a Raspberry Pi in a target network as explained before could give to the attackers a various range of opportunity. Learn more: http://www.scoop.it/t/securite-pc-et-internet
Gust MEES's insight:
Now let’s imagine the potential effect of a similar device used for espionage, you can object me that it is possible to do it with many other solutions and it is true, but have a Raspberry Pi in a target network as explained before could give to the attackers a various range of opportunity. Learn more: http://www.scoop.it/t/securite-pc-et-internet |
Dans deux états américains, des pirates se sont introduits dans les bases de données où sont stockées des informations relatives aux électeurs. Voilà ce qu'a annoncé Yahoo News hier lundi sur base d'une mise en garde confidentielle du FBI.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?
Gust MEES's insight:
Dans deux états américains, des pirates se sont introduits dans les bases de données où sont stockées des informations relatives aux électeurs. Voilà ce qu'a annoncé Yahoo News hier lundi sur base d'une mise en garde confidentielle du FBI.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?
More evidence surfaced this week that computer surveillance tools belonging to the mysterious Equation hacking group are linked to the US National Security Agency.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
Gust MEES's insight:
More evidence surfaced this week that computer surveillance tools belonging to the mysterious Equation hacking group are linked to the US National Security Agency.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.
Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.
The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
Gust MEES's insight:
Notorious NSA contractor-turned-privacy advocate Edward Snowden warns the recent NSA hacks could have some really "messy" consequences.
Notorious NSA contractor-turned-privacy advocate Edward Snowden today took toTwitter to discuss the details of yesterday’s ‘Equation Group’ hack. The Equation Group — allegedly an offshoot of the NSA — saw its defenses penetrated by a group calling itself ‘The Shadow Brokers.’ Eventually this data began to make its way online.
The collected data is reported to be a cache of hack tools, known as binaries. According to Snowden, these tools are uploaded onto an NSA staging server as part of on-going operations to target and trace rival malware servers. The practice is known as Counter Computer Network Exploitation, or CCNE — a process that allows NSA hackers to steal tools used by foreign (or domestic rival) hackers in order to fingerprint them.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
Gust MEES's insight:
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Shadow+Brokers
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/
Gust MEES's insight:
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/
Cybersecurity researchers at Symantec have discovered a previously-unknown hacker group they have dubbed 'Strider', which has been infecting organisations and individuals that would be of potential interest to a nation state's intelligence services.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Remsec
Gust MEES's insight:
Cybersecurity researchers at Symantec have discovered a previously-unknown hacker group they have dubbed 'Strider', which has been infecting organisations and individuals that would be of potential interest to a nation state's intelligence services.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Remsec
Millionen kabellose Tastaturen senden Daten im Klartext.
Kabellose Tastaturen sollten eigentlich so gebaut sein, dass die darauf getippten Informationen nur verschlüsselt übertragen werden. Millionen Geräte von mindestens acht großen Herstellern patzen dabei aber heftig, wie Forscher entdeckt haben. Selbst Laien werden vermutlich verständnislos mit dem Kopf schütteln, wenn Marc Newlin kommende Woche auf der Defcon-Konferenz in Las Vegas seinen neuen Angriff gegen regulär im Handel erhältliche Funktastaturen präsentiert. Der Mitarbeiter der IT-Sicherheitsfirma Bastille Networks und sein Team haben nach eigenen Angaben herausgefunden, dass preisgünstige kabellose Keyboards von mindestens acht großen Herstellern sämtliche auf ihnen getippten Informationen unverschlüsselt an ihren USB-Dongle senden.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet?q=cyberespionage
http://www.scoop.it/t/securite-pc-et-internet/?tag=Wireless+Mice+and+Keyboards+vulnerability
Gust MEES's insight:
Millionen kabellose Tastaturen senden Daten im Klartext.
Kabellose Tastaturen sollten eigentlich so gebaut sein, dass die darauf getippten Informationen nur verschlüsselt übertragen werden. Millionen Geräte von mindestens acht großen Herstellern patzen dabei aber heftig, wie Forscher entdeckt haben. Selbst Laien werden vermutlich verständnislos mit dem Kopf schütteln, wenn Marc Newlin kommende Woche auf der Defcon-Konferenz in Las Vegas seinen neuen Angriff gegen regulär im Handel erhältliche Funktastaturen präsentiert. Der Mitarbeiter der IT-Sicherheitsfirma Bastille Networks und sein Team haben nach eigenen Angaben herausgefunden, dass preisgünstige kabellose Keyboards von mindestens acht großen Herstellern sämtliche auf ihnen getippten Informationen unverschlüsselt an ihren USB-Dongle senden.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet?q=cyberespionage
http://www.scoop.it/t/securite-pc-et-internet/?tag=Wireless+Mice+and+Keyboards+vulnerability
Comment un hacker a exposé des milliers de systèmes que n'importe qui peut désormais voir à distanceImaginez qu'on vous remette les clés d'internet. Un instant vous pourriez examiner le panneau de commande de la climatisation d'un bâtiment, l'inventaire d'une pharmacie ou la console d'un programmeur Windows. L'instant d'après, ce serait la boîte de réception de messagerie d'un directeur d'établissement scolaire ou un écran tactile permettant de noter la satisfaction des clients de toilettes publiques (malheureusement, ceci n'est pas une blague).
Learn more / En savoir plus / mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine
Gust MEES's insight:
Imaginez qu'on vous remette les clés d'internet. Un instant vous pourriez examiner le panneau de commande de la climatisation d'un bâtiment, l'inventaire d'une pharmacie ou la console d'un programmeur Windows. L'instant d'après, ce serait la boîte de réception de messagerie d'un directeur d'établissement scolaire ou un écran tactile permettant de noter la satisfaction des clients de toilettes publiques (malheureusement, ceci n'est pas une blague).
Learn more / En savoir plus / mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine
The cyber attack vectors available to hackers will continue to grow as the Internet of Things (IoTs) become more commonplace, making valuable data accessible through an ever-widening selection of entry points.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage
Gust MEES's insight:
The cyber attack vectors available to hackers will continue to grow as the Internet of Things (IoTs) become more commonplace, making valuable data accessible through an ever-widening selection of entry points.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage
Anybody who walks or drives past new tracking billboards with a mobile phone in their pocket can be spied on without their knowledge or consent: a potential invasion of privacy that US Senator Charles E. Schumer wants the US Federal Trace Commission (FTC) to investigate.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/
Gust MEES's insight:
Anybody who walks or drives past new tracking billboards with a mobile phone in their pocket can be spied on without their knowledge or consent: a potential invasion of privacy that US Senator Charles E. Schumer wants the US Federal Trace Commission (FTC) to investigate.
Learn more / En savoir plus / Mehr erfahren:
https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/
The Director of National Intelligence says the U.S. government is planning to use the Internet of Things to spy on you through your appliances. You’ll never be lonely again. Cartoon by Stephanie McMillan.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things
http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV
http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things
http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars
Gust MEES's insight:
The Director of National Intelligence says the U.S. government is planning to use the Internet of Things to spy on you through your appliances. You’ll never be lonely again. Cartoon by Stephanie McMillan.
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine
http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things
http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV
http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things
http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises discussion on privacy. Learn more / En savoir plus / Mehr erfahren: https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/ https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/ https://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/ https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/ https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/
Gust MEES's insight:
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises discussion on privacy. Learn more / En savoir plus / Mehr erfahren: https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/ https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/ https://gustmees.wordpress.com/2013/10/23/smartphone-pictures-pose-privacy-risks/ https://gustmees.wordpress.com/2015/12/18/let-us-talk-about-eskills-what-is-it/ https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/ |
Your new post is loading...
Learn more / En savoir plus / Mehr erfahren:
http://www.scoop.it/t/securite-pc-et-internet/?tag=Elections