ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
February 21, 2015 10:30 AM
Scoop.it!

Teen hacks car with $15 worth of parts | Internet of Things | Internet of Everything | CyberSecurity

Teen hacks car with $15 worth of parts | Internet of Things | Internet of Everything | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
February 20, 2015 7:29 PM
Scoop.it!

Geheimdienste unterwandern SIM- und Kreditkarten | Cyberespionage | Privacy | CyberSecurity

Geheimdienste unterwandern SIM- und Kreditkarten | Cyberespionage | Privacy | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Seit Jahren kopieren NSA und GCHQ bei den Herstellern von SIM-Karten und Smart Cards die zugehörigen Schlüssel ab. Damit können sie die übertragenen Informationen mitlesen und manipulieren. Auch die Rechnungssysteme vieler Mobilfunker sind unterwandert.

Der britische Geheimdienst GCHQ und die US-amerikanische NSA haben schon vor Jahren die Sicherheitsvorkehrungen der Chiphersteller ausgehebelt. Also sind SIM-Karten, elektronische Reisepässe, Kredit- und Debitkarten, elektronische Türöffner, TAN-Generatoren und so weiter unsicher. Den darin verbauten Chips und den mit ihnen fix verbundenen Schlüsseln kann nicht mehr vertraut werden. Die Dienste können beispielsweise mobile Übertragungen einfach mitlesen oder rückwirkend entschlüsseln. Und es ist schlimmer.


SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


Gust MEES's insight:

Seit Jahren kopieren NSA und GCHQ bei den Herstellern von SIM-Karten und Smart Cards die zugehörigen Schlüssel ab. Damit können sie die übertragenen Informationen mitlesen und manipulieren. Auch die Rechnungssysteme vieler Mobilfunker sind unterwandert.

Der britische Geheimdienst GCHQ und die US-amerikanische NSA haben schon vor Jahren die Sicherheitsvorkehrungen der Chiphersteller ausgehebelt. Also sind SIM-Karten, elektronische Reisepässe, Kredit- und Debitkarten, elektronische Türöffner, TAN-Generatoren und so weiter unsicher. Den darin verbauten Chips und den mit ihnen fix verbundenen Schlüsseln kann nicht mehr vertraut werden. Die Dienste können beispielsweise mobile Übertragungen einfach mitlesen oder rückwirkend entschlüsseln. Und es ist schlimmer.


SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards




No comment yet.
Scooped by Gust MEES
February 19, 2015 10:29 AM
Scoop.it!

What You Need to Know About Superfish | LENOVO | Adware | CyberSecurity | Ethics

What You Need to Know About Superfish | LENOVO | Adware | CyberSecurity | Ethics | ICT Security-Sécurité PC et Internet | Scoop.it
FAQ about the man-in-the-middle adware installed on Lenovo PCs.



Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
FAQ about the man-in-the-middle adware installed on Lenovo PCs.



Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
February 19, 2015 10:19 AM
Scoop.it!

Lenovo's Bundled Adware Comes With A Big Security Problem | Adware | CyberSecurity #Ethics

Lenovo's Bundled Adware Comes With A Big Security Problem | Adware | CyberSecurity #Ethics | ICT Security-Sécurité PC et Internet | Scoop.it

We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought. 


The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO



Gust MEES's insight:

We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought. 


The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
February 17, 2015 3:19 PM
Scoop.it!

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Moskau/lngolstadt, 17. Februar 2015 Kaspersky Lab enttarnt die Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].

Gust MEES's insight:

Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].


No comment yet.
Scooped by Gust MEES
February 17, 2015 5:10 AM
Scoop.it!

Equation-Group: "Höchstentwickelte Hacker der Welt" infizieren u.a. Festplatten-Firmware | Cyberespionage

Equation-Group: "Höchstentwickelte Hacker der Welt" infizieren u.a. Festplatten-Firmware | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
Seit Jahren, wenn nicht sogar Jahrzehnten treibt eine Gruppe von Cyberangreifern weltweit ihr Unwesen und setzt auf äußerst hochentwickelte Technik, behauptet Kaspersky. Details bereits bekannter Malware impliziert Verbindungen zum US-Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Seit Jahren, wenn nicht sogar Jahrzehnten treibt eine Gruppe von Cyberangreifern weltweit ihr Unwesen und setzt auf äußerst hochentwickelte Technik, behauptet Kaspersky. Details bereits bekannter Malware impliziert Verbindungen zum US-Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
February 17, 2015 4:46 AM
Scoop.it!

HARES Tool Hampers the Reverse-Engineering of Code | CyberSecurity

HARES Tool Hampers the Reverse-Engineering of Code | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
In what could prove to be a revolutionary development in information security, researcher Jacob Torrey will be unveiling the Hardened Anti-Reverse Engineering System (HARES) at several upcoming security conferences, a crypto breakthrough will make reverse engineering code an almost impossible feat.

HARES is a tool that focuses on encrypting code to protect it from being reverse engineered, as the code remains obscured until it is decrypted by the system’s processor at the moment of execution.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES


Gust MEES's insight:

In what could prove to be a revolutionary development in information security, researcher Jacob Torrey will be unveiling the Hardened Anti-Reverse Engineering System (HARES) at several upcoming security conferences, a crypto breakthrough will make reverse engineering code an almost impossible feat.

HARES is a tool that focuses on encrypting code to protect it from being reverse engineered, as the code remains obscured until it is decrypted by the system’s processor at the moment of execution.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES




No comment yet.
Scooped by Gust MEES
February 17, 2015 3:57 AM
Scoop.it!

Un nouveau logiciel espion de la NSA mis au jour | Video | Cyberespionage | Privacy

Un nouveau logiciel espion de la NSA mis au jour | Video | Cyberespionage | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
L'Agence nationale de sécurité américaine (NSA) aurait, selon d'anciens agents du renseignement américain, trouvé le moyen de dissimuler un logiciel espion dans les disques durs fabriqués par les sociétés Western Digital, Seagate, Toshiba et d'autres fabriquants.


Ce procédé signifie que la NSA dispose des moyens de contrôler la majeure partie des ordinateurs dans le monde, affirment-ils à l'agence de presse Reuters.


À regarder absolument la vidéo dans l'article !!!


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
L'Agence nationale de sécurité américaine (NSA) aurait, selon d'anciens agents du renseignement américain, trouvé le moyen de dissimuler un logiciel espion dans les disques durs fabriqués par les sociétés Western Digital, Seagate, Toshiba et d'autres fabriquants.


Ce procédé signifie que la NSA dispose des moyens de contrôler la majeure partie des ordinateurs dans le monde, affirment-ils à l'agence de presse Reuters.


À regarder absolument la vidéo dans l'article !!!


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
February 17, 2015 2:41 AM
Scoop.it!

A critical flaw in NetGear routers exposes them to cyber attacks | CyberSecurity

A critical flaw in NetGear routers exposes them to cyber attacks | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
The security Expert Peter Adkins discovered a serious Information disclosure vulnerability that affects several Netgear wireless routers.
The researcher Peter Adkins discovered that several wireless routers produced by Netgear are affected by serious vulnerability that could allow an unauthenticated attacker to access sensitive data from the network device.

By exploiting the vulnerability a hacker could also extract administrator passwords, the name and access keys for the wireless networks configured on the device, and details about the device including its model, firmware version and serial number, as explained in a post published on the Full Disclosure mailing list last week.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


Gust MEES's insight:
The security Expert Peter Adkins discovered a serious Information disclosure vulnerability that affects several Netgear wireless routers.
The researcher Peter Adkins discovered that several wireless routers produced by Netgear are affected by serious vulnerability that could allow an unauthenticated attacker to access sensitive data from the network device.


By exploiting the vulnerability a hacker could also extract administrator passwords, the name and access keys for the wireless networks configured on the device, and details about the device including its model, firmware version and serial number, as explained in a post published on the Full Disclosure mailing list last week.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


No comment yet.
Scooped by Gust MEES
February 14, 2015 3:51 AM
Scoop.it!

Neuer Handy-Virus: Simplocker schleust Malware aufs Smartphone | Mobile Security

Neuer Handy-Virus: Simplocker schleust Malware aufs Smartphone | Mobile Security | ICT Security-Sécurité PC et Internet | Scoop.it
Simplocker ist eine sogenannte Ransomware, die Handydaten verschlüsselt und den Zugriff auf Handydaten sperrt. Der Virus tarnt sich als gefälschte Flashplayer-App.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Simplocker


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


Gust MEES's insight:
Simplocker ist eine sogenannte Ransomware, die Handydaten verschlüsselt und den Zugriff auf Handydaten sperrt. Der Virus tarnt sich als gefälschte Flashplayer-App.


Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Simplocker


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free


No comment yet.
Scooped by Gust MEES
February 12, 2015 6:48 AM
Scoop.it!

Securing the Internet of Things | CyberSecurity | Privacy | pdf

Securing the Internet of Things | CyberSecurity | Privacy | pdf


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

Gust MEES's insight:

Securing the Internet of Things | CyberSecurity | Privacy | pdf


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
February 11, 2015 3:52 PM
Scoop.it!

​Facebook launches ThreatExchange: Can information sharing thwart cyberattacks? | CyberSecurity | Social Media

​Facebook launches ThreatExchange: Can information sharing thwart cyberattacks? | CyberSecurity | Social Media | ICT Security-Sécurité PC et Internet | Scoop.it
Facebook's ThreatExchange, a social platform designed to enable cyberattack data sharing, is the latest example of how companies and government agencies are trying to aggregate intelligence.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=ThreatExchange


Gust MEES's insight:

Facebook's ThreatExchange, a social platform designed to enable cyberattack data sharing, is the latest example of how companies and government agencies are trying to aggregate intelligence.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=ThreatExchange




No comment yet.
Scooped by Gust MEES
February 9, 2015 3:57 AM
Scoop.it!

'Fullz', 'Dumps', and more: Here's what hackers are selling on the black market | Cybercrime | CyberSecurity

'Fullz', 'Dumps', and more: Here's what hackers are selling on the black market | Cybercrime | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
While many cybercriminals are out to simply steal our information, satisfied with creating havoc for individuals or businesses, the majority do it for the money.


The underground economy in which hackers operate is laden with forums, chat rooms, websites and other communities designed to facilitate, streamline, and industrialize cybercrime. Taking a look at what gets sold and traded in these communities can give us a pretty good understanding of what’s most valuable to hackers — and what we need to focus on protecting.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Black+Market



Gust MEES's insight:
While many cybercriminals are out to simply steal our information, satisfied with creating havoc for individuals or businesses, the majority do it for the money.


The underground economy in which hackers operate is laden with forums, chat rooms, websites and other communities designed to facilitate, streamline, and industrialize cybercrime. Taking a look at what gets sold and traded in these communities can give us a pretty good understanding of what’s most valuable to hackers — and what we need to focus on protecting.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Black+Market



No comment yet.
Scooped by Gust MEES
February 21, 2015 8:09 AM
Scoop.it!

Lenovo admits security issues with Superfish, releases removal tool | CyberSecurity | Adware

Lenovo admits security issues with Superfish, releases removal tool | CyberSecurity | Adware | ICT Security-Sécurité PC et Internet | Scoop.it
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO

No comment yet.
Scooped by Gust MEES
February 20, 2015 7:01 PM
Scoop.it!

Snowden-Papier: Geheimdienste entschlüsseln SIM-Karten | Cyberespionage | CyberSecurity | Privacy

Snowden-Papier: Geheimdienste entschlüsseln SIM-Karten | Cyberespionage | CyberSecurity | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Die Geheimdienste der USA und Großbritanniens können offenbar die SIM-Karten in Mobiltelefonen entschlüsseln. Das berichtet die Internetseite "The Intercept". Handys seien somit unauffällig anzapfbar. Der Bericht bezieht sich auf ein Snowden-Papier.


===> Der gläserne Surfer!!! <===


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards



Gust MEES's insight:
Die Geheimdienste der USA und Großbritanniens können offenbar die SIM-Karten in Mobiltelefonen entschlüsseln. Das berichtet die Internetseite "The Intercept". Handys seien somit unauffällig anzapfbar. Der Bericht bezieht sich auf ein Snowden-Papier.


===> Der gläserne Surfer!!! <===


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards



No comment yet.
Scooped by Gust MEES
February 19, 2015 10:24 AM
Scoop.it!

Scandale "Superfish" : quand Lenovo installe des malwares dans ses PC | Adware | CyberSecurity #Ethics

Scandale "Superfish" : quand Lenovo installe des malwares dans ses PC | Adware | CyberSecurity #Ethics | ICT Security-Sécurité PC et Internet | Scoop.it


Un logiciel préinstallé dans des PC Lenovo compromet gravement la sécurité des échanges chiffrés via SSL.




Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO

Gust MEES's insight:
Un logiciel préinstallé dans des PC Lenovo compromet gravement la sécurité des échanges chiffrés via SSL.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
February 19, 2015 10:12 AM
Scoop.it!

PC-Adware von Lenovo korrumpiert SSL/TLS | Adware | CyberSecurity | Ethics

PC-Adware von Lenovo korrumpiert SSL/TLS | Adware | CyberSecurity | Ethics | ICT Security-Sécurité PC et Internet | Scoop.it
Der PC-Hersteller Lenovo installiert auf seine neuen PCs anscheinend Adware ab Werk, die im Browser Zusatz-Werbung anzeigt und sichere SSL/TLS-Verbindungen korrumpiert.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Der PC-Hersteller Lenovo installiert auf seine neuen PCs anscheinend Adware ab Werk, die im Browser Zusatz-Werbung anzeigt und sichere SSL/TLS-Verbindungen korrumpiert.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
February 17, 2015 11:17 AM
Scoop.it!

Experten: NSA kann Viren in jeder Festplatte verstecken | Cyberespionage | CyberSecurity

Experten: NSA kann Viren in jeder Festplatte verstecken | Cyberespionage | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Auf Firmware der Festplatten namhafter Hersteller könnte Spionagesoftware installiert sein. Steckt die NSA dahinter?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Auf Firmware der Festplatten namhafter Hersteller könnte Spionagesoftware installiert sein. Steckt die NSA dahinter?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
February 17, 2015 4:52 AM
Scoop.it!

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer | CyberSecurity

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES


Gust MEES's insight:

Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES



No comment yet.
Scooped by Gust MEES
February 17, 2015 4:39 AM
Scoop.it!

HUGE SPY PROGRAM EXPOSED: NSA has hidden software in hard drives around the world | Cyberespionage | Privacy

HUGE SPY PROGRAM EXPOSED: NSA has hidden software in hard drives around the world | Cyberespionage | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Security research firm Kaspersky uncovered the trick.

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba, and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

Read more: http://uk.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2#ixzz3RzfELBrL


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Security research firm Kaspersky uncovered the trick.

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba, and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

Read more: http://uk.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2#ixzz3RzfELBrL


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
February 17, 2015 2:50 AM
Scoop.it!

Plus d'un milliard de données volées en 2014 | CyberSecurity | Data Breaches

Plus d'un milliard de données volées en 2014 | CyberSecurity | Data Breaches | ICT Security-Sécurité PC et Internet | Scoop.it
Les vols de données ont explosé en 2014, selon le Breaches Level Index. La faute à un modèle de protection dépassé face aux nouveaux modes d’attaque, selon Gemalto.

L’année 2014 s’illustrera comme une année record en matière d’infractions informatiques. Plus d’un milliard (1,023 précisément) de données ont été perdues ou volées au cours de l’année passée. Sont considérées comme données les informations propres à l’identité personnelle ou bancaire ainsi que les identifiants d’accès.


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Gust MEES's insight:
Les vols de données ont explosé en 2014, selon le Breaches Level Index. La faute à un modèle de protection dépassé face aux nouveaux modes d’attaque, selon Gemalto.

L’année 2014 s’illustrera comme une année record en matière d’infractions informatiques. Plus d’un milliard (1,023 précisément) de données ont été perdues ou volées au cours de l’année passée. Sont considérées comme données les informations propres à l’identité personnelle ou bancaire ainsi que les identifiants d’accès.


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


No comment yet.
Scooped by Gust MEES
February 16, 2015 8:07 AM
Scoop.it!

Spam und Malvertising werden gefährlicher

Spam und Malvertising werden gefährlicher | ICT Security-Sécurité PC et Internet | Scoop.it

Die Ergebnisse des Cisco Annual Security Report 2015 zeigen allerdings auch einen Wandel bei den Angriffsmethoden der Cyberkriminellen.


Ihr Primärziel sind nicht mehr Server und Betriebssysteme, ===> sondern einzelne Nutzer. <===

.

Im Vergleich zum Vorjahr nahmen dabei betrügerische Mails und Malvertising-Attacken um satte 250 Prozent zu. Und: Vor allem Anwender in hochgefährdeten Branchen fallen laut Cisco doppelt so häufig auf betrügerische Links und Adware herein.

.

Learn more:

.

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

.

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

.

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Gust MEES's insight:

Die Ergebnisse des Cisco Annual Security Report 2015 zeigen allerdings auch einen Wandel bei den Angriffsmethoden der Cyberkriminellen.


Ihr Primärziel sind nicht mehr Server und Betriebssysteme, ===> sondern einzelne Nutzer. <===

.

Im Vergleich zum Vorjahr nahmen dabei betrügerische Mails und Malvertising-Attacken um satte 250 Prozent zu. Und: Vor allem Anwender in hochgefährdeten Branchen fallen laut Cisco doppelt so häufig auf betrügerische Links und Adware herein.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

No comment yet.
Scooped by Gust MEES
February 12, 2015 7:17 AM
Scoop.it!

Verizon’s Mobile ‘Supercookies’ Seen as Threat to Privacy

Verizon’s Mobile ‘Supercookies’ Seen as Threat to Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Advertisers, and possibly other third parties, are finding ways to exploit a hidden tracking mechanism that Verizon Wireless users cannot delete.


For the last several months, cybersecurity experts have been warning Verizon Wireless that it was putting the privacy of its customers at risk. The computer codes the company uses to tag and follow its mobile subscribers around the web, they said, could make those consumers vulnerable to covert tracking and profiling.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=supercookies


-  https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's insight:
Advertisers, and possibly other third parties, are finding ways to exploit a hidden tracking mechanism that Verizon Wireless users cannot delete.


For the last several months, cybersecurity experts have been warning Verizon Wireless that it was putting the privacy of its customers at risk. The computer codes the company uses to tag and follow its mobile subscribers around the web, they said, could make those consumers vulnerable to covert tracking and profiling.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=supercookies


-  https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's curator insight, February 12, 2015 7:20 AM
Advertisers, and possibly other third parties, are finding ways to exploit a hidden tracking mechanism that Verizon Wireless users cannot delete.


For the last several months, cybersecurity experts have been warning Verizon Wireless that it was putting the privacy of its customers at risk. The computer codes the company uses to tag and follow its mobile subscribers around the web, they said, could make those consumers vulnerable to covert tracking and profiling.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=supercookies


-  https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Scooped by Gust MEES
February 12, 2015 6:04 AM
Scoop.it!

Facebook startet Plattform für Viren-Reports | CyberSecurity | ThreatExchange | Social Media

Facebook startet Plattform für Viren-Reports | CyberSecurity | ThreatExchange | Social Media | ICT Security-Sécurité PC et Internet | Scoop.it
Facebook hat mit ThreatExchange eine Plattform zum Austausch von Software-Fehlern geschaffen. Entwickler sollen dort gefundene Bugs und Viren simpel untereinander kommunizieren können.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=ThreatExchange


Gust MEES's insight:
Facebook hat mit ThreatExchange eine Plattform zum Austausch von Software-Fehlern geschaffen. Entwickler sollen dort gefundene Bugs und Viren simpel untereinander kommunizieren können.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=ThreatExchange


No comment yet.
Scooped by Gust MEES
February 11, 2015 11:22 AM
Scoop.it!

ALERT!!! Sicherheitslücke in AVG Internet Security | CyberSecurity | Awareness

ALERT!!! Sicherheitslücke in AVG Internet Security | CyberSecurity | Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Unsicheres Sicherheits-Tool: Das BürgerCERT des Bundesamtes für Sicherheit in der Informationstechnik (BSI) warnt aktuell vor einer Sicherheitslücke in dem Virenscanner von AVG. Der Fehler soll den Systemzugriff auf Windows ohne Anmeldung aus lokalen Netzen erlauben.

Betroffen sind die Software-Versionen AVG Internet Security 2013 bis einschließlich 2013.3495 sowie AVG Internet Security 2015 bis einschließlich 2015.5315 unter Windows.


Gust MEES's insight:

Unsicheres Sicherheits-Tool: Das BürgerCERT des Bundesamtes für Sicherheit in der Informationstechnik (BSI) warnt aktuell vor einer Sicherheitslücke in dem Virenscanner von AVG. Der Fehler soll den Systemzugriff auf Windows ohne Anmeldung aus lokalen Netzen erlauben. Betroffen sind die Software-Versionen AVG Internet Security 2013 bis einschließlich 2013.3495 sowie AVG Internet Security 2015 bis einschließlich 2015.5315 unter Windows.


No comment yet.