ICT Security-Sécurité PC et Internet
87.2K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
February 3, 2015 3:52 AM
Scoop.it!

From practitioners to politicians, we lack the infosec clue needed | CyberSecurity

From practitioners to politicians, we lack the infosec clue needed | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
The Internet of Things may mean a bigger workload for infosec practitioners, but 2015's real challenges will be the rapidly changing political landscape and the shortage of skilled professionals.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
The Internet of Things may mean a bigger workload for infosec practitioners, but 2015's real challenges will be the rapidly changing political landscape and the shortage of skilled professionals.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables




http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things




http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things




http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/




http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum




http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar




http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
February 2, 2015 3:49 PM
Scoop.it!

Overcoming the daily challenges of a security team | CyberSecurity

Overcoming the daily challenges of a security team | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
In the past, companies looked at the importance of hiring talented and experienced CISOs to lead the establishment of security and incident-response teams.


Now, emerging threats posed by advanced cybercriminals and the possible damage of a sophisticated rogue insider are changing that trend as companies move beyond traditional security methods and adopt new strategies such as profiling user behavior and leveraging big data analytics. As a result, more companies are shifting towards understanding

Gust MEES's insight:
In the past, companies looked at the importance of hiring talented and experienced CISOs to lead the establishment of security and incident-response teams.


Now, emerging threats posed by advanced cybercriminals and the possible damage of a sophisticated rogue insider are changing that trend as companies move beyond traditional security methods and adopt new strategies such as profiling user behavior and leveraging big data analytics. As a result, more companies are shifting towards understanding.


No comment yet.
Scooped by Gust MEES
January 28, 2015 12:34 PM
Scoop.it!

Readiness, Recovery, Response: Social Media Cyber-Vandalism Toolkit | DigitalGov | CyberSecurity

Readiness, Recovery, Response: Social Media Cyber-Vandalism Toolkit | DigitalGov | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Cyber-vandalism presents a serious challenge to online-based communication tools. Users need available resources to counter intrusions of social media accounts. This document provides guidance and security practices to federal, state, and local government employees. Suggestions and resources prepare users to respond to cyber-hijacking. and will empower digital users to make informed choices and enact future policy. This resource is a “living document” designed for continued contribution and expansion...


Gust MEES's insight:

Cyber-vandalism presents a serious challenge to online-based communication tools. Users need available resources to counter intrusions of social media accounts. This document provides guidance and security practices to federal, state, and local government employees. Suggestions and resources prepare users to respond to cyber-hijacking. and will empower digital users to make informed choices and enact future policy. This resource is a “living document” designed for continued contribution and expansion...


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
January 28, 2015 7:24 AM
Scoop.it!

The "Dirty Dozen" SPAMPIONSHIP: Who's the biggest? Who's the worst? | CyberSecurity

The "Dirty Dozen" SPAMPIONSHIP: Who's the biggest? Who's the worst? | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Spam by volume

For years, the USA has come out at the top of our spam by volume chart.

That has been a simple side-effect of cheap and fast internet access available to a large population that owns lots of computers.

But China has been flirting with top spot for the previous year, and finally cracked that dubious honour in the last quarter of 2014:


Remember, the per-person figures don't tell us which countries have the most spamlords or cybercrooks. If anything, they tell us which countries have the most slapdash attitude to computer security, because the majority of spam is sent by malware-infected computers that send unsolicited emails without their users realising.


Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Spam


Gust MEES's insight:
Spam by volume

For years, the USA has come out at the top of our spam by volume chart.

That has been a simple side-effect of cheap and fast internet access available to a large population that owns lots of computers.

But China has been flirting with top spot for the previous year, and finally cracked that dubious honour in the last quarter of 2014:


Remember, the per-person figures don't tell us which countries have the most spamlords or cybercrooks. If anything, they tell us which countries have the most slapdash attitude to computer security, because the majority of spam is sent by malware-infected computers that send unsolicited emails without their users realising.


Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Spam

Gust MEES's curator insight, January 28, 2015 7:20 AM
Spam by volume

For years, the USA has come out at the top of our spam by volume chart.

That has been a simple side-effect of cheap and fast internet access available to a large population that owns lots of computers.

But China has been flirting with top spot for the previous year, and finally cracked that dubious honour in the last quarter of 2014:


Remember, the per-person figures don't tell us which countries have the most spamlords or cybercrooks. If anything, they tell us which countries have the most slapdash attitude to computer security, because the majority of spam is sent by malware-infected computers that send unsolicited emails without their users realising.


Learn more:


https://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Spam


Scooped by Gust MEES
January 28, 2015 5:53 AM
Scoop.it!

Maldrone: Malware which hijacks your personal drone | CyberSecurity

Maldrone: Malware which hijacks your personal drone | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
A backdoor has been discovered in popular consumer drones which can hijack your favorite new flying toy.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone


Gust MEES's insight:

A backdoor has been discovered in popular consumer drones which can hijack your favorite new flying toy.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone




No comment yet.
Scooped by Gust MEES
January 27, 2015 6:38 PM
Scoop.it!

GHOST, a critical Linux security hole, is revealed | CyberSecurity | Nobody Is Perfect

GHOST, a critical Linux security hole, is revealed | CyberSecurity | Nobody Is Perfect | ICT Security-Sécurité PC et Internet | Scoop.it

This security hole, which impacts many older versions of Linux and some current ones, should be patched as soon as possible!!!





Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


http://www.scoop.it/t/securite-pc-et-internet/?tag=GHOST


Gust MEES's insight:

This security hole, which impacts many older versions of Linux and some current ones, should be patched as soon as possible!!!


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


http://www.scoop.it/t/securite-pc-et-internet/?tag=GHOST



No comment yet.
Scooped by Gust MEES
January 27, 2015 9:43 AM
Scoop.it!

Internet of Things: A security threat to business by the backdoor? | CyberSecurity

Internet of Things: A security threat to business by the backdoor? | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Tech chiefs are worried by the threat posed by IoT devices, which could provide a new way of attacking corporate networks.


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO

Gust MEES's insight:
Tech chiefs are worried by the threat posed by IoT devices, which could provide a new way of attacking corporate networks.


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
January 27, 2015 8:36 AM
Scoop.it!

SPIEGEL-Veröffentlichung: Experten enttarnen Trojaner "Regin" als NSA-Werkzeug | Cyberwar

SPIEGEL-Veröffentlichung: Experten enttarnen Trojaner "Regin" als NSA-Werkzeug | Cyberwar | ICT Security-Sécurité PC et Internet | Scoop.it
Telekom-Unternehmen, die EU-Kommission und eine Mitarbeiterin des Kanzleramts - alle wurden zum Opfer der Schadsoftware "Regin". Die Analyse eines vom SPIEGEL veröffentlichten Codes zeigt nun: "Regin" ist ein NSA-Werkzeug.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Telekom-Unternehmen, die EU-Kommission und eine Mitarbeiterin des Kanzleramts - alle wurden zum Opfer der Schadsoftware "Regin". Die Analyse eines vom SPIEGEL veröffentlichten Codes zeigt nun: "Regin" ist ein NSA-Werkzeug.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
January 26, 2015 10:33 AM
Scoop.it!

Sécurité: Cybercriminalité et réseaux sociaux : liaisons dangereuses via @FIC_Obs

Sécurité: Cybercriminalité et réseaux sociaux : liaisons dangereuses: 2015


Via Frederic GOUTH
Gust MEES's insight:

Sécurité: Cybercriminalité et réseaux sociaux : liaisons dangereuses: 2015

No comment yet.
Scooped by Gust MEES
January 25, 2015 9:55 AM
Scoop.it!

Adobe issued the update to fix CVE-2015-0311 zero day | Update asap!!!

Adobe issued the update to fix CVE-2015-0311 zero day | Update asap!!! | ICT Security-Sécurité PC et Internet | Scoop.it
Adobe released a security update that fixes also the zero-day vulnerability CVE-2015-0311 discovered by Kafeine in the last release of Angler exploit kit.
Gust MEES's insight:

Adobe released a security update that fixes also the zero-day vulnerability CVE-2015-0311 discovered by Kafeine in the last release of Angler exploit kit.


No comment yet.
Scooped by Gust MEES
January 23, 2015 11:32 AM
Scoop.it!

Sicherheitslücke: Experten raten zum sofortigen Abschalten des Flash-Players | CyberSecurity

Sicherheitslücke: Experten raten zum sofortigen Abschalten des Flash-Players | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Adobes Flash-Player ist von einer kritischen Sicherheitslücke betroffen. Auch ein aktuelles Update löst das Problem nicht. Sicherheitsexperten empfehlen, vorerst auf die Nutzung des Players zu verzichten.
Gust MEES's insight:

Adobes Flash-Player ist von einer kritischen Sicherheitslücke betroffen. Auch ein aktuelles Update löst das Problem nicht. Sicherheitsexperten empfehlen, vorerst auf die Nutzung des Players zu verzichten.


No comment yet.
Scooped by Gust MEES
January 23, 2015 8:44 AM
Scoop.it!

ALERT!!! Neues Flash-Update schließt nicht alle Lücken

ALERT!!! Neues Flash-Update schließt nicht alle Lücken | ICT Security-Sécurité PC et Internet | Scoop.it
Adobe hat außer der Reihe ein Sicherheits-Update für den Flash Player bereit gestellt. Es beseitigt jedoch nur eine von zwei bereits ausgenutzten Schwachstellen.


Bis dahin lautet die Empfehlung vieler Sicherheitsexperten: Windows-Nutzer sollten den Flash Player deinstallieren oder zumindest im Browser deaktivieren. Video-Portale wie Youtube liefern Inhalte inzwischen auch per HTML 5 aus, der Flash Player wird dafür nicht mehr benötigt. Wie Kafeine in einem kurzen Test unter Windows 8.1 (32 Bit) festgestellt hat, scheint Microsofts Anti-Exploit-Tool EMET 5.1 die Ausnutzung der Flash-Lücken durch Angler im Internet Explorer zu verhindern. 


Gust MEES's insight:
Adobe hat außer der Reihe ein Sicherheits-Update für den Flash Player bereit gestellt. Es beseitigt jedoch nur eine von zwei bereits ausgenutzten Schwachstellen.


Bis dahin lautet die Empfehlung vieler Sicherheitsexperten: Windows-Nutzer sollten den Flash Player deinstallieren oder zumindest im Browser deaktivieren. Video-Portale wie Youtube liefern Inhalte inzwischen auch per HTML 5 aus, der Flash Player wird dafür nicht mehr benötigt. Wie Kafeine in einem kurzen Test unter Windows 8.1 (32 Bit) festgestellt hat, scheint Microsofts Anti-Exploit-Tool EMET 5.1 die Ausnutzung der Flash-Lücken durch Angler im Internet Explorer zu verhindern. 

No comment yet.
Scooped by Gust MEES
January 21, 2015 9:45 AM
Scoop.it!

IMHO: Sichert Firmware endlich nachprüfbar ab! | CyberSecurity | Cyberespionage

IMHO: Sichert Firmware endlich nachprüfbar ab! | CyberSecurity | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
Trauen Sie noch ihrer Hardware? Weil Sie brav Updates installieren, nur Originalsoftware sowie Virenscanner verwenden und auch sonst vorsichtig sind? Das hilft alles nicht mehr, denn in Firmware 

vergrabene Malware ist nach neuen NSA-Dokumenten kein Gerücht mehr. Die Hardwarehersteller haben das jahrzehntelang verschlafen.


Mindestens seit dem Jahr 2007 arbeitet die NSA an Malware, die in die Firmware von Geräten wie PC-Mainboards und Festplatten eingeschleust werden kann. Für die Bemühungen um einen sicheren Rechner ist das eine doppelte Katastrophe. Zum einen kann Anti-Malware solche Infektionen nicht entdecken, wenn der Schädling seine Installationsdateien löscht. Zum anderen hat die Firmware die volle Kontrolle über die Hardware und alle damit genutzten Informationen.


Gust MEES's insight:
Trauen Sie noch ihrer Hardware? Weil Sie brav Updates installieren, nur Originalsoftware sowie Virenscanner verwenden und auch sonst vorsichtig sind? Das hilft alles nicht mehr, denn in Firmware 

vergrabene Malware ist nach neuen NSA-Dokumenten kein Gerücht mehr. Die Hardwarehersteller haben das jahrzehntelang verschlafen.


Mindestens seit dem Jahr 2007 arbeitet die NSA an Malware, die in die Firmware von Geräten wie PC-Mainboards und Festplatten eingeschleust werden kann. Für die Bemühungen um einen sicheren Rechner ist das eine doppelte Katastrophe. Zum einen kann Anti-Malware solche Infektionen nicht entdecken, wenn der Schädling seine Installationsdateien löscht. Zum anderen hat die Firmware die volle Kontrolle über die Hardware und alle damit genutzten Informationen.

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
February 3, 2015 8:28 AM
Scoop.it!

Embedding Code | iFrame HTML | CyberSecurity | iFrame Script Injection | eSkills | eLeaderShip

Embedding Code | iFrame HTML | CyberSecurity | iFrame Script Injection |  eSkills | eLeaderShip | ICT Security-Sécurité PC et Internet | Scoop.it
Iframe HTML made easy. Generate an iframe, download a free iframe browser, iFrame HTML made easy, more...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=iFrame-Injection


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=iFrame-Injection


Gust MEES's curator insight, February 2, 2015 4:58 PM

Iframe HTML made easy. Generate an iframe, download a free iframe browser, iFrame HTML made easy, more...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=iFrame-Injection



Scooped by Gust MEES
February 2, 2015 11:41 AM
Scoop.it!

Cybersecurity in 2015: What to expect

Cybersecurity in 2015: What to expect | ICT Security-Sécurité PC et Internet | Scoop.it
Breaches of information security and individual privacy hit the headlines regularly in 2014. But how will the arms race between cyber-attackers and defenders develop in the coming year? We analyse the experts' predictions.
Gust MEES's insight:

Breaches of information security and individual privacy hit the headlines regularly in 2014. But how will the arms race between cyber-attackers and defenders develop in the coming year? We analyse the experts' predictions.


No comment yet.
Scooped by Gust MEES
January 28, 2015 7:42 AM
Scoop.it!

The GHOST vulnerability: what you need to know

The GHOST vulnerability: what you need to know | ICT Security-Sécurité PC et Internet | Scoop.it
GHOST is a serious vulnerability that has been discovered in the glibc library.

Here is what you need to know.


What is GHOST?
GHOST is a serious vulnerability that has been discovered in the glibc library.

What is the glibc?
It’s the GNU C Library, a key part of the Linux operating system. If you don’t have glibc, your Linux system is not going to work.


read more...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


http://www.scoop.it/t/securite-pc-et-internet/?tag=GHOST


Gust MEES's insight:
GHOST is a serious vulnerability that has been discovered in the glibc library.

Here is what you need to know.


What is GHOST?
GHOST is a serious vulnerability that has been discovered in the glibc library.

What is the glibc?
It’s the GNU C Library, a key part of the Linux operating system. If you don’t have glibc, your Linux system is not going to work.


read more...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


http://www.scoop.it/t/securite-pc-et-internet/?tag=GHOST


No comment yet.
Scooped by Gust MEES
January 28, 2015 6:35 AM
Scoop.it!

Hijacking drones with malware

Hijacking drones with malware | ICT Security-Sécurité PC et Internet | Scoop.it

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem.

While in this particular case the actual danger turned out to be non-existent, the fact that these devices can be hijacked and misused for malicious purposes is something that the manufacturers will have to think about very soon.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone


Gust MEES's insight:

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. 

While in this particular case the actual danger turned out to be non-existent, the fact that these devices can be hijacked and misused for malicious purposes is something that the manufacturers will have to think about very soon.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone


No comment yet.
Scooped by Gust MEES
January 28, 2015 5:45 AM
Scoop.it!

Staatstrojaner Regin von NSA entwickelt

Staatstrojaner Regin von NSA entwickelt | ICT Security-Sécurité PC et Internet | Scoop.it
Laut Kaspersky stammen der Staatstrojaner Regin sowie der Keylogger QWERTY von ein und demselben Entwickler - dem US-amerikanischen Geheimdienst NSA.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Laut Kaspersky stammen der Staatstrojaner Regin sowie der Keylogger QWERTY von ein und demselben Entwickler - dem US-amerikanischen Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
January 27, 2015 11:29 AM
Scoop.it!

Cyberwaffe Regin: Beweise für Verantwortlichkeit von NSA und GCHQ

Cyberwaffe Regin: Beweise für Verantwortlichkeit von NSA und GCHQ | ICT Security-Sécurité PC et Internet | Scoop.it
Untersuchungen von Kaspersky und des Spiegels zeigen, dass der berüchtigte Spionage-Trojaner Regin von Geheimdiensten der Five-Eyes-Allianz entwickelt wurde. Die Vermutung liegt nahe, dass der Trojaner Teil der Cyberwaffen-Plattform "Warriorpride" ist.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Untersuchungen von Kaspersky und des Spiegels zeigen, dass der berüchtigte Spionage-Trojaner Regin von Geheimdiensten der Five-Eyes-Allianz entwickelt wurde. Die Vermutung liegt nahe, dass der Trojaner Teil der Cyberwaffen-Plattform "Warriorpride" ist.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
January 27, 2015 9:07 AM
Scoop.it!

Link between NSA and Regin cyberespionage malware becomes clearer | CyberWeapon

Link between NSA and Regin cyberespionage malware becomes clearer | CyberWeapon | ICT Security-Sécurité PC et Internet | Scoop.it
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance






Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance






Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
January 26, 2015 3:53 PM
Scoop.it!

Hackers to Target Smart TV Sets After Phones, Kaspersky Predicts | Internet Of Things | CyberSecurity

Hackers to Target Smart TV Sets After Phones, Kaspersky Predicts | Internet Of Things | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Hackers are opening new horizons: having
learned how to break into Apple Inc.’s (AAPL) iPhones they may target
smart televisions next, according to cybersecurity firm
Kaspersky Lab.


“There are already Trojan viruses that can penetrate an iPhone when it’s connected to a computer,” founder and Chief Executive Officer Eugene Kaspersky said in an interview. “Smart TVs would be the next step.”


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
Hackers are opening new horizons: having
learned how to break into Apple Inc.’s (AAPL) iPhones they may target
smart televisions next, according to cybersecurity firm
Kaspersky Lab.


“There are already Trojan viruses that can penetrate an iPhone when it’s connected to a computer,” founder and Chief Executive Officer Eugene Kaspersky said in an interview. “Smart TVs would be the next step.”


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
January 26, 2015 10:21 AM
Scoop.it!

Sécurité: WPscan Scan de sécurité du CMS Wordpress

Sécurité: WPscan Scan de sécurité du CMS Wordpress | ICT Security-Sécurité PC et Internet | Scoop.it
Nous allons ici nous intéresser à la sécurité du CMS Wordpress au travers l'outils de scan de sécurité Wordpress WPscan.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress



Via Frederic GOUTH
Gust MEES's insight:
Nous allons ici nous intéresser à la sécurité du CMS Wordpress au travers l'outils de scan de sécurité Wordpress WPscan.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress


No comment yet.
Scooped by Gust MEES
January 25, 2015 9:47 AM
Scoop.it!

Flash Player sofort aktualisieren: Hacker nutzen kritische Lücke aus | Update asap!!!

Flash Player sofort aktualisieren: Hacker nutzen kritische Lücke aus | Update asap!!! | ICT Security-Sécurité PC et Internet | Scoop.it
Eine ungepatchte Sicherheitslücke im Adobe Flash Player wird aktuell von Cyberkriminellen ausgenutzt. Alle Betroffenen sollten den Flash Player sofort deakivieren. Wir erklären, was Sie tun müssen.
Gust MEES's insight:

Eine ungepatchte Sicherheitslücke im Adobe Flash Player wird aktuell von Cyberkriminellen ausgenutzt. Alle Betroffenen sollten den Flash Player sofort deakivieren. Wir erklären, was Sie tun müssen.


No comment yet.
Scooped by Gust MEES
January 23, 2015 8:52 AM
Scoop.it!

Running Adobe Flash? You need to read this today | CyberSecurity

Running Adobe Flash? You need to read this today | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Two critical security vulnerabilities, being actively exploited by online criminals, have been discovered in Adobe Flash.

There has been a patch released for one of them, but not the other one...
Gust MEES's insight:

Two critical security vulnerabilities, being actively exploited by online criminals, have been discovered in Adobe Flash.

There has been a patch released for one of them, but not the other one...


No comment yet.
Scooped by Gust MEES
January 23, 2015 7:53 AM
Scoop.it!

Update asap!!! ===> Adobe issues emergency fix for Flash zero-day | CyberSecurity

Update asap!!! ===> Adobe issues emergency fix for Flash zero-day | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Update asap!!! ===> Crooks are reportedly using a new Flash vulnerability called CVE-2015-0310.

Adobe has a fix already, so grab it while it's hot!








Check ===> https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/ <===


Gust MEES's insight:

Update asap!!! ===> Crooks are reportedly using a new Flash vulnerability called CVE-2015-0310. 

Adobe has a fix already, so grab it while it's hot!




Check ===> https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/ <===


No comment yet.