ICT Security-Sécurité PC et Internet
112.3K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
December 19, 2012 8:21 PM
Scoop.it!

FCC Smartphone Security Checker | FCC.gov

FCC Smartphone Security Checker | FCC.gov | ICT Security-Sécurité PC et Internet | Scoop.it
No comment yet.
Scooped by Gust MEES
December 19, 2012 6:00 PM
Scoop.it!

How spyware on rental PCs captured users' most intimate moments

How spyware on rental PCs captured users' most intimate moments | ICT Security-Sécurité PC et Internet | Scoop.it
PC Rental Agent was supposed to stem theft. Instead, it sparked a firestorm.
No comment yet.
Scooped by Gust MEES
December 19, 2012 8:15 AM
Scoop.it!

Kaspersky Security Bulletin 2012. Cyber Weapons

Kaspersky Security Bulletin 2012. Cyber Weapons | ICT Security-Sécurité PC et Internet | Scoop.it
Before 2012, there were only two instances of cyber weapons being used – Stuxnet and Duqu.

However, analysis of these two forced the IT community to dramatically expand the whole concept of what cyber warfare entails.

Apart from an increase in the number of security incidents involving cyber weapons, the events of 2012 have also brought to light the fact that many sovereign states are heavily involved in the development of cyber weapons – something that was picked up on and widely discussed by the mass media. Moreover, cyber warfare was on the agenda of public discussions between governments and state representatives over the course of 2012.

It is safe to say, therefore, that 2012 has brought key revelations in this sphere – both in terms of the increase in security incidents and a greater understanding of how cyber weapons are being developed
No comment yet.
Scooped by Gust MEES
December 18, 2012 10:29 AM
Scoop.it!

Malware never dies

Malware never dies | ICT Security-Sécurité PC et Internet | Scoop.it
2012 saw some of the biggest malware discoveries in the history of information security. AlienVault has crafted this unique slideshow that proves modern malware never dies, it just morphs and reappears.
No comment yet.
Scooped by Gust MEES
December 18, 2012 9:47 AM
Scoop.it!

WordPress Pingback Vulnerability Can Be Abused for DDOS Attacks

WordPress Pingback Vulnerability Can Be Abused for DDOS Attacks | ICT Security-Sécurité PC et Internet | Scoop.it
WordPress Pingback Vulnerability Can Be Abused for DDOS Attacks
No comment yet.
Scooped by Gust MEES
December 18, 2012 8:47 AM
Scoop.it!

56 alleged members of card fraud ring arrested in Europe

56 alleged members of card fraud ring arrested in Europe | ICT Security-Sécurité PC et Internet | Scoop.it
56 suspected members of a major network of payment card fraudsters (38 in Bulgaria, 17 in Italy and 1 in the Netherlands) have been arrested in a coordinated raid across Europe. This major police operation was led by Italy and Bulgaria and was coordinated from the Operational Centre at Europol headquarters in The Hague.

No comment yet.
Scooped by Gust MEES
December 15, 2012 7:36 AM
Scoop.it!

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives | ICT Security-Sécurité PC et Internet | Scoop.it
October 23, 2009

"Evil Maid" Attacks on Encrypted Hard Drives
Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this:

Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down.

Step 2: You boot your computer using the attacker's hacked bootloader, entering your encryption key. Once the disk is unlocked, the hacked bootloader does its mischief. It might install malware to capture the key and send it over the Internet somewhere, or store it in some location on the disk to be retrieved later, or whatever.
No comment yet.
Scooped by Gust MEES
December 12, 2012 1:22 PM
Scoop.it!

Necurs rootkit – not new but spreading fast warns Microsoft

Necurs rootkit – not new but spreading fast warns Microsoft | ICT Security-Sécurité PC et Internet | Scoop.it
“Necurs is a prevalent threat in the wild at the moment,” warns Microsoft, with more than 80,000 unique infections detected during November. Necurs is a rootkit delivered by drive-by downloading.
No comment yet.
Scooped by Gust MEES
December 12, 2012 10:44 AM
Scoop.it!

Researchers uncover Tor-powered Skynet botnet

Researchers uncover Tor-powered Skynet botnet | ICT Security-Sécurité PC et Internet | Scoop.it
The Trojan in question has DDoS and Bitcoin-mining capabilities, but it's main function is to steal banking credentials.

The botnet operator spreads the malware via the Usenet discussion forum, which is also a popular platform for distributing pirated content. In order to hide its malicious nature, the file "weighs" 15MB, a great part of which is junk data.

The rest consists of a ZeuS bot, a Tor client for Windows, the CGMiner bitcoin mining tool, and a copy of a DLL file used by CGMiner for CPU and GPU hash cracking.

Read more, a MUST:
http://www.net-security.org/malware_news.php?id=2357
No comment yet.
Scooped by Gust MEES
December 11, 2012 5:54 AM
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
December 10, 2012 1:09 PM
Scoop.it!

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day

Learning basics of Cyber-Security: 200,000 new malicious programs detected every day | ICT Security-Sécurité PC et Internet | Scoop.it

Kaspersky Lab released its annual Kaspersky Security Bulletin, which provides the overall malware and cyber-threat statistics for 2012.

 

===> The report revealed significant growth of Mac-specific malware and an explosive growth in the number of threats targeting the Android platform. <===

 

Overall, Kaspersky Lab detected and blocked more than 1.5 billion web-based attacks in 2012 and more than 3 billion infected files.

 

At the present time Kaspersky Lab detects and blocks more than 200,000 new malicious programs every day, a significant increase from the first half of 2012, when 125,000 malicious programs were detected and blocked each day on average.

 

===> Servers located in the United States were the most frequently used to host and deliver malicious objects (25.5% of all incidents). Russia occupies the second place with 19.6% followed by the Netherlands, Germany and the United Kingdom. <===

 

This is a significant change compared to years past: in 2010 the majority of malware was hosted in China. Changes in domain registration policies and other regulations taken by Chinese authorities resulted in the rapid decline of malicious hosts originating from the country.

 

Read more, a MUST:

http://www.net-security.org/malware_news.php?id=2352

 

No comment yet.
Scooped by Gust MEES
December 8, 2012 12:24 AM
Scoop.it!

Zeusfamily trojan spreads by way of spam botnet

Zeusfamily trojan spreads by way of spam botnet | ICT Security-Sécurité PC et Internet | Scoop.it
Purveyors of the Gameover trojan are using the wellknown Cutwail botnet to lure victims into downloading the banking malware.

 

A new wave of spam campaigns are dispensing "Gameover,” the ===> only banking trojan in the Zeus family to use peer-to-peer (P2P) communications to hide its activities. <===

 

 

Read more, a MUST:

http://www.scmagazine.com/zeus-family-trojan-spreads-by-way-of-spam-botnet/article/271333/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
December 6, 2012 9:12 AM
Scoop.it!

Huge GPU cluster makes password hacking a breeze

Huge GPU cluster makes password hacking a breeze | ICT Security-Sécurité PC et Internet | Scoop.it
Cracking encrypted passwords is getting increasingly easier as researchers come up with new ways of harnessing CPU, GPU and cloud power to perform the task.

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=14077

 

No comment yet.
Scooped by Gust MEES
December 19, 2012 6:08 PM
Scoop.it!

A Massive Cyberattack Could Soon Be Aimed At Your Online Bank Account | MIT Technology Review

A Massive Cyberattack Could Soon Be Aimed At Your Online Bank Account | MIT Technology Review | ICT Security-Sécurité PC et Internet | Scoop.it
Banks around the world are getting ready to face a massive cyber assault. But now that it’s been discovered, it might not happen as expected.

 

Cyber security is something that many consumers view more as a theoretical concept than an issue worth worrying about. After all, the majority of consumers have never been hacked or watched their bank accounts siphoned of cash.

 

===> For many folks, security issues are read about, never experienced.

But that might soon change. <===

 

A so-called “cyber gang” of Botmasters was discovered in October to be working on a scheme that would allow them to target customer accounts at 30 banks, including Chase, Citibank, and even PayPal, and steal money from unsuspecting victims.

 
No comment yet.
Scooped by Gust MEES
December 19, 2012 5:36 PM
Scoop.it!

A short history of Christmas malware

A short history of Christmas malware | ICT Security-Sécurité PC et Internet | Scoop.it
Graham Cluley jumps in his TARDIS, and takes us on a trip through time to see Christmas-related malware from 1987 to present.
Gust MEES's insight:

 

                      ===> Be AWARE of the MALWARE! <===

 

Check also my other FREE courses here:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

No comment yet.
Scooped by Gust MEES
December 18, 2012 12:46 PM
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
December 18, 2012 10:13 AM
Scoop.it!

Android botnet abuses people's phones for SMS spam

Android botnet abuses people's phones for SMS spam | ICT Security-Sécurité PC et Internet | Scoop.it
Security vendor Cloudmark says it is the first time they've detected a botnet that abuses other people's phones to send spam
No comment yet.
Scooped by Gust MEES
December 18, 2012 9:01 AM
Scoop.it!

Another data-wiping malware program found in Iran

Another data-wiping malware program found in Iran | ICT Security-Sécurité PC et Internet | Scoop.it
New malware Batchwiper is unsophisticated, but can cause a lot of damage, researchers say
No comment yet.
Scooped by Gust MEES
December 18, 2012 7:37 AM
Scoop.it!

1-15 December 2012 Cyber Attacks Timeline

1-15 December 2012 Cyber Attacks Timeline | ICT Security-Sécurité PC et Internet | Scoop.it
Christmas is coming quickly, we have just passed the first half of December, and hence it’s time for the first update of the Cyber Attacks Timeline for December. The Team GhostShell has decid...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
December 14, 2012 8:35 AM
Scoop.it!

Securing a tablet for web browsing in six easy steps

Securing a tablet for web browsing in six easy steps | ICT Security-Sécurité PC et Internet | Scoop.it
Taking your tablet online can make you vulnerable to an assortment of internet dangers, including identity theft and hackers. This is especially true if you’re taking advantage of a public hotspot ...

====================================================

Gust MEES

Please read also my FREE course here:

- http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

====================================================
Rescooped by Gust MEES from 21st Century Learning and Teaching
December 12, 2012 11:01 AM
Scoop.it!

Updates: Alerte aux failles critiques pour IE, Chrome, Flash et Java | Silicon

Updates: Alerte aux failles critiques pour IE, Chrome, Flash et Java | Silicon | ICT Security-Sécurité PC et Internet | Scoop.it
Chrome 23, Internet Explorer 9 et 10, Flash 11.x, Java SE 6 et 7. Tous se voient proposer des mises à jour corrigeant des failles de sécurité critiques.

===> UPDATE asap!!! <===
No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
December 11, 2012 5:57 PM
Scoop.it!

First fake-installer Trojan for Mac OS

First fake-installer Trojan for Mac OS | ICT Security-Sécurité PC et Internet | Scoop.it
Russian anti-virus company Doctor Web informs users about a new Trojan for Mac OS X dubbed Trojan.SMSSend.3666.
No comment yet.
Scooped by Gust MEES
December 11, 2012 4:53 AM
Scoop.it!

That square QR barcode on the poster? Check it's not a sticker

That square QR barcode on the poster? Check it's not a sticker | ICT Security-Sécurité PC et Internet | Scoop.it

Cybercrooks are putting up stickers featuring URLs embedded in Quick Response codes (QR codes) as a trick designed to drive traffic to dodgy sites.

 

Sian John, UK security strategist at Symantec, said: “There has been an explosion in the number of QR codes over the last couple of years, and cybercriminals are taking full advantage. Because QR codes just look like pictures it’s extremely difficult to tell if they’re genuine or malicious, making it easy to dupe passers-by into scanning codes that may lead to an infected site, or perhaps a phishing site.

 

===========================================

 

Gust MEES

 

Please check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=QR-Reader-App

 

===========================================

 

Read more:

http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/

 

No comment yet.
Scooped by Gust MEES
December 9, 2012 6:09 AM
Scoop.it!

Nine out of 10 hospitals lost personal data in last two years

Nine out of 10 hospitals lost personal data in last two years | ICT Security-Sécurité PC et Internet | Scoop.it
A recent survey from the Ponemon Institute and ID Experts found that breaches are costing the health care industry an average of 7 billion annually.

 

Read more:

http://www.scmagazine.com/nine-out-of-10-hospitals-lost-personal-data-in-last-two-years/article/271795/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
December 8, 2012 12:05 AM
Scoop.it!

Goodbye, 123456: Blackberry bans weak passwords

Goodbye, 123456: Blackberry bans weak passwords | ICT Security-Sécurité PC et Internet | Scoop.it
Blackberry has always had a reputation for taking particular care when it comes to security.

 

 

 

 

Read more, a good practice example:

http://www.infosecurity-magazine.com/view/29740/goodbye-123456-blackberry-bans-weak-passwords/?utm_source=twitterfeed&amp;amp;amp;utm_medium=twitter

 

Shahabaz Sayyad's comment, March 24, 2013 9:07 AM
nice
Jocyl Garcia's curator insight, May 17, 2013 8:45 AM

not evrythng dat u wanted and worked hard for always meant to be yours