ICT Security-Sécurité PC et Internet
87.6K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
November 25, 2014 8:33 AM
Scoop.it!

GCHQ und NSA stecken angeblich hinter ausgefeilter Spyware Regin

GCHQ und NSA stecken angeblich hinter ausgefeilter Spyware Regin | ICT Security-Sécurité PC et Internet | Scoop.it
Britische und US-amerikanische Geheimdienste sollen mit der Spionagesoftware Regin den massiven Cyberangriff auf Belgacom und EU-Behörden ausgeführt haben. Die Malware kann auch Mobilfunk-Stationen überwachen.

Die seit dem Wochenende öffentlich bekannte Cyberwaffe Regin ist unter anderem für die ausgefeilten Cyber-Attacke auf das belgische Telekommunikationsunternehmen Belgacom eingesetzt worden, die der Konzern im Juli vorigen Jahres entdeckte. Dies berichten die Blogger von "The Intercept", zu denen auch der NSA-Enthüllungsreporter Glenn Greenwald gehört. Sie berufen sich dabei auf IT-Sicherheitsexperten und eigene technische Analysen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:
Britische und US-amerikanische Geheimdienste sollen mit der Spionagesoftware Regin den massiven Cyberangriff auf Belgacom und EU-Behörden ausgeführt haben. Die Malware kann auch Mobilfunk-Stationen überwachen.

Die seit dem Wochenende öffentlich bekannte Cyberwaffe Regin ist unter anderem für die ausgefeilten Cyber-Attacke auf das belgische Telekommunikationsunternehmen Belgacom eingesetzt worden, die der Konzern im Juli vorigen Jahres entdeckte. Dies berichten die Blogger von "The Intercept", zu denen auch der NSA-Enthüllungsreporter Glenn Greenwald gehört. Sie berufen sich dabei auf IT-Sicherheitsexperten und eigene technische Analysen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
November 24, 2014 9:41 AM
Scoop.it!

Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer | REGIN

Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer | REGIN | ICT Security-Sécurité PC et Internet | Scoop.it
It was the spring of 2011 when the European Commission discovered it had been hacked. The intrusion into the EU’s legislative body was sophisticated and widespread and used a zero-day exploit to get in. Once the attackers established a stronghold on the network, they were in for the long haul. They scouted the network architecture for additional victims and covered their tracks well. Eventually, they infected numerous systems belonging to the European Commission and the European Council before being discovered.

Two years later another big target was hacked. This time it was Belgacom, the partly state-owned Belgian telecom. In this case, too, the attack was sophisticated and complex. According to published news reports and documents leaked by Edward Snowden, the attackers targeted system administrators working for Belgacom and used their credentials to gain access to routers controlling the telecom’s cellular network. Belgacom publicly acknowledged the hack, but has never provided details about the breach.

Then five months after that announcement, news of another high-profile breach emerged—this one another sophisticated hack targeting prominent Belgian cryptographer Jean-Jacques Quisquater.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
November 23, 2014 12:52 PM
Scoop.it!

Regin: Top-tier espionage tool enables stealthy surveillance

Regin: Top-tier espionage tool enables stealthy surveillance | ICT Security-Sécurité PC et Internet | Scoop.it
An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from Symantec, Backdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

It is likely that its development took months, if not years, to complete and its authors have gone to great lengths to cover its tracks. Its capabilities and the level of resources behind Regin indicate that it is one of the main cyberespionage tools used by a nation state.

As outlined in a new technical whitepaper from SymantecBackdoor.Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage.  Executing the first stage starts a domino chain of decryption and loading of each subsequent stage for a total of five stages.  Each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
August 19, 2014 12:36 AM
Scoop.it!

Gyroskope von Smartphones spionieren aus

Gyroskope von Smartphones spionieren aus | ICT Security-Sécurité PC et Internet | Scoop.it
Über den eingebauten Bewegungssensor von Smartphones – das Gyroskop – können Hacker Gespräche mithören. Da er sich nicht abschalten lässt, ist prinzipiell jedes Smartphone gefährdet.
Gust MEES's insight:

Über den eingebauten Bewegungssensor von Smartphones – das Gyroskop – können Hacker Gespräche mithören. Da er sich nicht abschalten lässt, ist prinzipiell jedes Smartphone gefährdet.


No comment yet.
Scooped by Gust MEES
August 1, 2014 10:21 AM
Scoop.it!

'Canvas fingerprinting' online tracking is sneaky but easy to halt

'Canvas fingerprinting' online tracking is sneaky but easy to halt | ICT Security-Sécurité PC et Internet | Scoop.it
At least two browser extensions can stop the tracking method, which was in wide use earlier this year


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Canvas+Fingerprinting


Gust MEES's insight:
At least two browser extensions can stop the tracking method, which was in wide use earlier this year


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Canvas+Fingerprinting


No comment yet.
Scooped by Gust MEES
July 30, 2014 5:59 PM
Scoop.it!

Piratage de TOR confirmé par… TOR

Piratage de TOR confirmé par… TOR | ICT Security-Sécurité PC et Internet | Scoop.it

C’est dans un message diffusé sur le blog du système d’anonymisation TOR que l’on apprend, du moins que nous avons la confirmation, du piratage du système TOR.

Comme nous vous l’indiquions sur zataz, voilà une dizaine de jours, nous nous étonnions de la disparition d’une conférence dédiée à la surveillance de TOR lors du Black Hat 2014 de Las Vegas. La conférence de d’Alexander Volynkin et Michael McCord devait revenir sur les moyens de rendre beaucoup moins anonymes les utilisateurs du système.

TOR, donc, via son blog explique que ce “4 juillet, nous avons trouvé un groupe de relais dont le but supposé était de contourner l’anonymat des utilisateurs. Il semble qu’ils ciblaient les internautes qui utilisent Tor pour accéder ou exploiter des services cachés. Les attaques entraînaient la modification des en-tête de Tor pour s’effectuer.” Bref, nous revoilà avec le coup de 2007 et la lecture des données passant par les ordinateurs permettant à TOR de fournir l’anonymat tant recherché. Une technique d’espionnage démontrée par Dan Egerstad qui avait permis de révéler des centaines de données sensibles d’ambassades ou encore du Dalaïlama.




Article original appartenant à zataz.com : ZATAZ Magazine » Piratage de TOR confirmé par… TOR http://www.zataz.com/piratage-de-tor-confirme-par-tor/#ixzz38zXP7urA 
Follow us: @zataz on Twitter

Gust MEES's insight:

A MUST READ!!!


No comment yet.
Scooped by Gust MEES
July 3, 2014 3:14 PM
Scoop.it!

Do you take your coffee with "Free" Wi-Fi? | Starbucks | USA | Privacy

Do you take your coffee with "Free" Wi-Fi? | Starbucks | USA | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/



Gust MEES's insight:

Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/


No comment yet.
Scooped by Gust MEES
June 6, 2014 7:34 PM
Scoop.it!

Vodafone reveals existence of secret wires that allow state surveillance

Vodafone reveals existence of secret wires that allow state surveillance | ICT Security-Sécurité PC et Internet | Scoop.it
Wires allow agencies to listen to or record live conversations, in what privacy campaigners are calling a 'nightmare scenario'


Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.


Gust MEES's insight:

Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.


No comment yet.
Scooped by Gust MEES
June 2, 2014 7:14 PM
Scoop.it!

NSA facial recognition program scours web for images to identify suspects

NSA facial recognition program scours web for images to identify suspects | ICT Security-Sécurité PC et Internet | Scoop.it
The US National Security Agency (NSA) has been collecting millions of images from the web and storing them in a database that can be mined by facial recognition software for identifying surveillanc...


According to the Times, the NSA's image-gathering program is now more sophisticated and far-reaching since the program began in 2010, and the NSA's software can identify faces even when the targets were wearing different hair styles and facial hair.


Gust MEES's insight:

According to the Times, the NSA's image-gathering program is now more sophisticated and far-reaching since the program began in 2010, and the NSA's software can identify faces even when the targets were wearing different hair styles and facial hair.

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
May 22, 2014 8:08 AM
Scoop.it!

Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android

Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android | ICT Security-Sécurité PC et Internet | Scoop.it
Et si je vous disais qu'il y a dans votre ordinateur un mouchard que vous ne pouvez pas enlever, qui a été mis en place par le constructeur, qui est sur les listes blanches de la plupart des antivirus et dont vous n'avez jamais entendu parler ? La société Kaspersky, spécialisée dans la détection et …

Via Frederic GOUTH, Gust MEES
Gust MEES's insight:
C'est très fort cela !!! :(((


Gust MEES's curator insight, May 22, 2014 8:04 AM


C'est très fort cela!!! :(((


Scooped by Gust MEES
May 13, 2014 4:05 AM
Scoop.it!

NSA manipuliert US-Netzwerktechnik

NSA manipuliert US-Netzwerktechnik | ICT Security-Sécurité PC et Internet | Scoop.it
Bereits Anfang des Jahres hatte Jacob Appelbaum behauptet, die NSA fange per Post versandte Geräte ab, um darauf Spyware zu installieren. Nun untermauert Glenn Greenwald diese Anschuldigung: Betroffen seien unter anderem Router und Server von Cisco.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Scooped by Gust MEES
May 1, 2014 9:42 AM
Scoop.it!

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon

Eugene Kaspersky: major cyberterrorist attack is only matter of time | Cyberweapon | ICT Security-Sécurité PC et Internet | Scoop.it

Nations must be ready for a remote attack on critical infrastructure, including power and transport systems, says security expert. 




- Risk one: DDoS attack


Risk two: attacking critical data


Risk three: damaging infrastructure



In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.


Gust MEES's curator insight, May 1, 2014 9:45 AM

In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.


Read more:


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

.

Scooped by Gust MEES
April 13, 2014 11:40 AM
Scoop.it!

Obama lets NSA use zero-day flaws given “clear national security” need

Obama lets NSA use zero-day flaws given “clear national security” need | ICT Security-Sécurité PC et Internet | Scoop.it
White House officials: policy dates back to January 2014, during review process.


President Barack Obama has explicitly decided that when any federal agency discovers a vulnerability in online security, the agency should come forward, rather than exploit it for intelligence purposes, according to The New York Times, citing unnamed “senior administration officials.”


Learn more:



Gust MEES's insight:


President Barack Obama has explicitly decided that when any federal agency discovers a vulnerability in online security, the agency should come forward, rather than exploit it for intelligence purposes, according to The New York Times, citing unnamed “senior administration officials.”

Learn more:



No comment yet.
Scooped by Gust MEES
November 24, 2014 2:20 PM
Scoop.it!

Latest Snowden leak shows UK, US behind Regin malware, attacked European Union | Cyberespionage

Latest Snowden leak shows UK, US behind Regin malware, attacked European Union | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Two governments working together are said to have developed the state-sponsored malware that attacked the European Union. Guess what? One of the makers was an EU country.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

Two governments working together are said to have developed the state-sponsored malware that attacked the European Union. Guess what? One of the makers was an EU country.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
November 24, 2014 9:28 AM
Scoop.it!

Regin: Nation-state ownage of GSM networks

Regin: Nation-state ownage of GSM networks | ICT Security-Sécurité PC et Internet | Scoop.it
A sophisticated group known as Regin has targeted high-profile entities around the world. Regin is one of the most sophisticated attack platforms we have ever analysed. The ability to penetrate and...


For more than a decade, a sophisticated group known as Regin has targeted high-profile entities around the world with an advanced malware platform. As far as we can tell, the operation is still active, although the malware may have been upgraded to more sophisticated versions. The most recent sample we've seen was from a 64-bit infection. This infection was still active in the spring of 2014.


The name Regin is apparently a reversed "In Reg", short for "In Registry", as the malware can store its modules in the registry. This name and detections first appeared in anti-malware products around March 2011.


From some points of view, the platform reminds us of another sophisticated malware: Turla. Some similarities include the use of virtual file systems and the deployment of communication drones to bridge networks together. Yet through their implementation, coding methods, plugins, hiding techniques and flexibility, Regin surpasses Turla as one of the most sophisticated attack platforms we have ever analysed.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
November 9, 2014 8:53 AM
Scoop.it!

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data | Cyberespionage

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
Dubbed “AirHopper” by the researchers at Cyber Security Labs at Ben Gurion University, the proof-of-concept technique allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer using radio signals generated and transmitted by the computer and received by a mobile phone. The research was conducted by Mordechai Guri, Gabi Kedma, Assaf Kachlon, and overseen by their advisor Yuval Elovici.

The attack borrows in part from previous research showing how radio signals (.pdf) can be generated by a computer’s video card (.pdf). The researchers in Israel have developed malware that exploits this vulnerability by generating radio signals that can transmit modulated data that is then received and decoded by the FM radio receiver built into mobile phones. FM receivers come installed in many mobile phones as an emergency backup, in part, for receiving radio transmissions when the internet and cell networks are down. Using this function, however, attackers can turn a ubiquitous and seemingly innocuous device into an ingenious spy tool. Though a company or agency may think it has protected its air-gapped network by detaching it from the outside world, the mobile phones on employee desktops and in their pockets still provide attackers with a vector to reach classified and other sensitive data.
Gust MEES's insight:

Dubbed “AirHopper” by the researchers at Cyber Security Labs at Ben Gurion University, the proof-of-concept technique allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer using radio signals generated and transmitted by the computer and received by a mobile phone. The research was conducted by Mordechai Guri, Gabi Kedma, Assaf Kachlon, and overseen by their advisor Yuval Elovici.

The attack borrows in part from previous research showing how radio signals(.pdf) can be generated by a computer’s video card (.pdf). The researchers in Israel have developed malware that exploits this vulnerability by generating radio signals that can transmit modulated data that is then received and decoded by the FM radio receiver built into mobile phones. FM receivers come installed in many mobile phones as an emergency backup, in part, for receiving radio transmissions when the internet and cell networks are down. Using this function, however, attackers can turn a ubiquitous and seemingly innocuous device into an ingenious spy tool. Though a company or agency may think it has protected its air-gapped network by detaching it from the outside world, the mobile phones on employee desktops and in their pockets still provide attackers with a vector to reach classified and other sensitive data.

No comment yet.
Scooped by Gust MEES
August 6, 2014 12:51 PM
Scoop.it!

New leaker disclosing U.S. secrets, government concludes

New leaker disclosing U.S. secrets, government concludes | ICT Security-Sécurité PC et Internet | Scoop.it
The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN.
Gust MEES's insight:

The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN.


No comment yet.
Scooped by Gust MEES
July 30, 2014 6:33 PM
Scoop.it!

The Tor Blog | Tor security advisory: "relay early" traffic confirmation attack

The Tor Blog | Tor security advisory: "relay early" traffic confirmation attack | ICT Security-Sécurité PC et Internet | Scoop.it
No comment yet.
Scooped by Gust MEES
July 3, 2014 3:34 PM
Scoop.it!

Untersuchungsausschuss: Ex-NSA-Mitarbeiter bestätigt Massenüberwachung

Untersuchungsausschuss: Ex-NSA-Mitarbeiter bestätigt Massenüberwachung | ICT Security-Sécurité PC et Internet | Scoop.it
Der ehemalige NSA-Mitarbeiter William Binney hat vor dem Bundestagsuntersuchungsausschuss ausgesagt. Er berichtete von Geheimverträgen zwischen den USA und deutschen Behörden.


Den Ansatz der NSA, alles wissen, alles sehen zu wollen, sich nicht nur für Organisationen, sondern für einzelne Menschen zu interessieren, sei totalitär, sagte er. Und dass dieses Wissen auch der Kontrolle der eigenen Bevölkerung diene.


Gust MEES's insight:

Den Ansatz der NSA, alles wissen, alles sehen zu wollen, sich nicht nur für Organisationen, sondern für einzelne Menschen zu interessieren, sei totalitär, sagte er. Und dass dieses Wissen auch der Kontrolle der eigenen Bevölkerung diene.


No comment yet.
Scooped by Gust MEES
July 3, 2014 12:25 PM
Scoop.it!

Was die NSA wirklich wissen will

Was die NSA wirklich wissen will | ICT Security-Sécurité PC et Internet | Scoop.it
Dem NDR und WDR ist es eigenen Aussagen nach gelungen, einen Teil des Quellcodes des NSA-Tools 'XKeyscore' zu analysieren. Was die Analyse ergibt, lässt einem die Haare zu Berge stehen.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Dem NDR und WDR ist es eigenen Aussagen nach gelungen, einen Teil des Quellcodes des NSA-Tools 'XKeyscore' zu analysieren. Was die Analyse ergibt, lässt einem die Haare zu Berge stehen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA



No comment yet.
Scooped by Gust MEES
June 5, 2014 8:16 PM
Scoop.it!

On 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago

On 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago | ICT Security-Sécurité PC et Internet | Scoop.it

It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop.


On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Scooped by Gust MEES
May 22, 2014 8:16 AM
Scoop.it!

Absolute Computrace Revisited

Absolute Computrace Revisited | ICT Security-Sécurité PC et Internet | Scoop.it
The curent report is a return to the problem of security mechanisms implemented in modern anti-theft technologies that reside in firmware and PC BIOS of commonly used laptops and some of desktops.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=COMPUTRACE


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=COMPUTRACE


No comment yet.
Scooped by Gust MEES
May 13, 2014 5:30 AM
Scoop.it!

NSA Allegedly Intercepts Shipments of Servers To Install Spying Backdoors

NSA Allegedly Intercepts Shipments of Servers To Install Spying Backdoors | ICT Security-Sécurité PC et Internet | Scoop.it

Today in a published excerpt of his forthcoming book, No Place to Hide,Glenn Greenwald reports, citing documents from 2010, that the NSA intercepts routers and servers being shipped from the United States overseas and compromises them.


Gust MEES's insight:

NSA intercepts routers and servers being shipped from the United States overseas and compromises them.


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
May 13, 2014 3:43 AM
Scoop.it!

Des logiciels espions de la NSA cachés dans des équipements US ?

Des logiciels espions de la NSA cachés dans des équipements US ? | ICT Security-Sécurité PC et Internet | Scoop.it
Selon des révélations de Snowden, la NSA aurait inséré des logiciels espions dans des équipements informatiques, en particulier réseau, destinés à l’exportation, mais sans a priori la collaboration des constructeurs.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA



Via Frederic GOUTH
Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
April 30, 2014 1:11 PM
Scoop.it!

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées

Heartbleed : la NSA ne dévoile pas toutes les failles trouvées | ICT Security-Sécurité PC et Internet | Scoop.it
Mets-en de côté, ça peut servir.


La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




Gust MEES's insight:

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA




Gust MEES's curator insight, April 30, 2014 1:08 PM

La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.

.