business analyst
46.1K views | +0 today
Follow
business analyst
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

It’s official: Seizure of hacker forum Darkode proves FBI can get anyone | Nobody Is Perfect

It’s official: Seizure of hacker forum Darkode proves FBI can get anyone | Nobody Is Perfect | business analyst | Scoop.it
A joint operation by the FBI and the law enforcement agencies of 19 other countries has led to the takedown of the notorious discussion forum for criminal hackers, Darkode.me. It was the most central English-speaking hub for the sale of credit card numbers, criminal hacking hardware, and malware written for commercial sale. Originally called Darkode.com, the forum had shifted several times in response to pressure from authorities and the “white hat” hacking community, adding layers upon layers of security.


It was a highly encrypted, invite-only forum hosted by true paranoiacs, and featuring a tiered access system designed to keep any unavoidable infiltrators away from the most sensitive discussions. With an air of true satisfaction, the FBI announcement makes the implication clear as day: if we can get Darkode, we can get anybody.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Darkode




Via Gust MEES
Gust MEES's curator insight, July 17, 2015 7:12 PM

A joint operation by the FBI and the law enforcement agencies of 19 other countries has led to the takedown of the notorious discussion forum for criminal hackers, Darkode.me. It was the most central English-speaking hub for the sale of credit card numbers, criminal hacking hardware, and malware written for commercial sale. Originally called Darkode.com, the forum had shifted several times in response to pressure from authorities and the “white hat” hacking community, adding layers upon layers of security.


It was a highly encrypted, invite-only forum hosted by true paranoiacs, and featuring a tiered access system designed to keep any unavoidable infiltrators away from the most sensitive discussions. With an air of true satisfaction, the FBI announcement makes the implication clear as day: if we can get Darkode, we can get anybody.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Darkode




Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

The Internet of Things: Your worst nightmare | ICT | eSkills

The Internet of Things: Your worst nightmare | ICT | eSkills | business analyst | Scoop.it
Is life really going to be easier when you can’t use your toothbrush because it’s lost its Internet connection?


My problems started with an all-too-common occurrence: My Wi-Fi router burned out and I had to replace it. This happens regularly enough that I keep another router as backup. I turned it on, then connected it to my cable modem and Sonos bridge for wireless music streaming. I was feeling smug — I used the same SSID and password as the previous one, figuring that all the devices would automatically connect to it.


Ah, if life in the IoT age were only so simple.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, July 8, 2015 4:39 PM
Is life really going to be easier when you can’t use your toothbrush because it’s lost its Internet connection?


My problems started with an all-too-common occurrence: My Wi-Fi router burned out and I had to replace it. This happens regularly enough that I keep another router as backup. I turned it on, then connected it to my cable modem and Sonos bridge for wireless music streaming. I was feeling smug — I used the same SSID and password as the previous one, figuring that all the devices would automatically connect to it.


Ah, if life in the IoT age were only so simple.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Halina Ostańkowicz-Bazan's curator insight, July 11, 2015 2:30 PM

Living with the Internet.

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Cyber Attacks Likely to Increase | CyberSecurity

Cyber Attacks Likely to Increase | CyberSecurity | business analyst | Scoop.it
Experts believe nations, rogue groups, and malicious individuals will step up their assaults on communications networks, targeting institutions, financial services agencies, utilities, and consumers over the next decade. Many also predict effective counter moves will generally contain the damage.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/



Via Gust MEES
Gust MEES's curator insight, February 17, 2015 1:08 AM
Experts believe nations, rogue groups, and malicious individuals will step up their assaults on communications networks, targeting institutions, financial services agencies, utilities, and consumers over the next decade. Many also predict effective counter moves will generally contain the damage.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

U.S. Gov't: The Internet of Things Is A Security Disaster Waiting To Happen | CyberSecurity | Privacy

U.S. Gov't: The Internet of Things Is A Security Disaster Waiting To Happen | CyberSecurity | Privacy | business analyst | Scoop.it
The Federal Trade Commission (FTC) is aware we live in a connected world. Americans wear Fitbits, have Nest thermostats, use automated light systems from companies like Belkin and Philips, even have televisions that predict what they want to watch. But in a new report, the FTC has a warning: Existing privacy regulations don’t really cover the Internet of Things, and the Commission doesn’t really trust device manufacturers to do the right thing—or even be aware of the risks of collecting all that data.

In a staff report issued this week, the FTC warned that makers of connected health, home, and transportation devices could potentially leave their users vulnerable to data hacks. Most of all, the FTC is concerned that private information will be used to jack up users' insurance rates or deny them access to loans.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, February 9, 2015 2:23 AM
The Federal Trade Commission (FTC) is aware we live in a connected world. Americans wear Fitbits, have Nest thermostats, use automated light systems from companies like Belkin and Philips, even have televisions that predict what they want to watch. But in a new report, the FTC has a warning: Existing privacy regulations don’t really cover the Internet of Things, and the Commission doesn’t really trust device manufacturers to do the right thing—or even be aware of the risks of collecting all that data.

In a staff report issued this week, the FTC warned that makers of connected health, home, and transportation devices could potentially leave their users vulnerable to data hacks. Most of all, the FTC is concerned that private information will be used to jack up users' insurance rates or deny them access to loans.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


deepak's curator insight, February 9, 2015 3:08 AM

उत्तर प्रदेश और किसान :

उत्तर प्रदे‌श राज्य के लिए राजनितिक सर्वे मे हमने पाया है कि अब तक उत्तर

प्रदेश में ज्यादा विकास नही हो पाया है| जैसे: कृषि,शिक्षा,उधोग आदि क्षैत्र में|

यह राज्य कृषि उत्पादन मे भारत मे सर्व श्रेठ है| यहाँ की भूमि बहुँत उपजाऊ है

जिससे हमे बहुँत फसल प्राप्त होती है जैसे गैहू, धान ,सरसो ,दाले आदि| जिनहे

हम विदेश में निर्यात करे तो अच्छा धन कमा सकते हैं पर इस राज्य में शासन

करने वाले इसे कम कीमत पर खरीद कर अच्छी कीमत पर बेच देते है | लाभ

राशि यहाँ के लोग नही बल्कि यहाँ की भ्रष्ट सरकार की साहयता से पूंजीपति उठा

लेते है

जिस्से किसान अच्छी कीमत नही कमा पाते है और किसान आर्थिक रूप से ग्रस्त

होते जा रहे है

उत्तर प्रदेश की इन सभी कमियो को मध्यनजर रखते हुए भारतीय जनता पार्टी

विकास के लिए कुछ जरूरी कदम उठाएगी |

1. सभी किसानो के लिए कृषि धन योजना खाते खोले जाएँगे | जिससे वह

गन्ना अदि फसल का भुगतान अपने खाते में पा सकते है |

2. किसानो के लिए लोन की सुविधा कम दर पर रखी जाएंगी | जिस्से वह

ज्यादा समय में आसानी से चुका सके |

3. फसल के बारे मे शिक्षा प्रदान करने के लिए कृषि विशेषज्ञयो को भेजा जाय

जाएंगा |

4. शिक्षा का स्तर बाल व बालिकाओ का निगमन साक्षरता की ओर होगा

जिस्मे नए प्राइमरी व इंटर तक के स्कूल खोले जायंगे |

5. सभी व्यावसायिक को व्यवसाय प्रदान किये जायंगे वो भी एक अच्छी प्रति

दिन कीमत पर |

6. उत्तर प्रदेश वासियों को कम यूनिट दर पर बिजली परदान की जाएगी |

संजय सिंह जी को भारतीय जनता पार्टी दुआर जेवर छेत्र के लिए चुने गये है

जो इस छेत्र मे काफी सुधार करने के इच्छुक है |

1. किसानो का गन्ना तथा आदि कृषि सम्बन्धी मुद्दा सुलझेंगे |

2. किसानो को आर्थिक सहायताए देंगे |

3. जेवर में सड़क सम्बन्धि तथा आदि कार्य कराएंगे |

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Gartner's Internet of Things predictions | CyberSecurity | Awareness | ProactiveThinking

Gartner's Internet of Things predictions | CyberSecurity | Awareness | ProactiveThinking | business analyst | Scoop.it



Gartner predicts 250 million connected vehicles with automated driving capabilities by 2020




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Via Gust MEES
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Internet Of Things | Analytics Trends | A below-the-surface look at 2015 analytics trends | Deloitte Analytics

Internet Of Things | Analytics Trends | A below-the-surface look at 2015 analytics trends | Deloitte Analytics | business analyst | Scoop.it
Take a below-the-surface look at Deloitte's 2015 Analytics Trends report.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Seven Things to Watch for in 2015 | CyberSecurity | Awareness | CyberCrime

Seven Things to Watch for in 2015 | CyberSecurity | Awareness | CyberCrime | business analyst | Scoop.it
A new year begins at midnight and Threatpost highlights seven things you're bound to contend with in 2015.


===> Forewarned is Forearmed!!! <===



Via Gust MEES
Gust MEES's curator insight, January 2, 2015 1:25 PM
A new year begins at midnight and Threatpost highlights seven things you're bound to contend with in 2015.


===> Forewarned is Forearmed!!! <===


Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

DoubleDirect MitM Attack Targets Android, iOS and OS X Users | CyberSecurity

DoubleDirect MitM Attack Targets Android, iOS and OS X Users | CyberSecurity | business analyst | Scoop.it
Security researchers have discovered a new type of "Man-in-the-Middle" (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world.
The MitM attack, dubbed DoubleDirect, enables an attacker to redirect a victim’s traffic of major websites such as Google, Facebook and Twitter to a device controlled by the attacker. Once done, cyber crooks can steal victims’ valuable personal data, such as email IDs, login credentials and banking information as well as can deliver malware to the targeted mobile device.
San Francisco-based mobile security firm Zimperium detailed the threat in a Thursday blog post, revealing that the DoubleDirect technique is being used by attackers in the wild in attacks against the users of web giants including Google, Facebook, Hotmail, Live.com and Twitter, across 31 countries, including the U.S., the U.K. and Canada.

Via Gust MEES
Gust MEES's curator insight, November 24, 2014 2:39 PM
Security researchers have discovered a new type of "Man-in-the-Middle" (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world.
The MitM attack, dubbed DoubleDirect, enables an attacker to redirect a victim’s traffic of major websites such as Google, Facebook and Twitter to a device controlled by the attacker. Once done, cyber crooks can steal victims’ valuable personal data, such as email IDs, login credentials and banking information as well as can deliver malware to the targeted mobile device.
San Francisco-based mobile security firm Zimperium detailed the threat in a Thursday blog post, revealing that the DoubleDirect technique is being used by attackers in the wild in attacks against the users of web giants including Google, Facebook, Hotmail, Live.com and Twitter, across 31 countries, including the U.S., the U.K. and Canada.
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us | business analyst | Scoop.it

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us WE can't say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility...


Via Gust MEES
Gust MEES's curator insight, November 19, 2014 4:11 PM

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us WE can't say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility...


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Internet of Things Creates New Security Risks

Internet of Things Creates New Security Risks | business analyst | Scoop.it
The Internet of Things just made us immensely vulnerable to cyber attacks in a way you can never imagine. Any item you now purchase could be compromised.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Rescooped by michel verstrepen from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Les apps infectées se multiplient dans Google Play

Les apps infectées se multiplient dans Google Play | business analyst | Scoop.it


En 2013, plus de 42 000 apps mobiles étaient infectées par des malwares sur la boutique Play et Google en a supprimé moins du quart.



Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Gefährliche Bilder: Trojaner versteckt sich in PNG

Gefährliche Bilder: Trojaner versteckt sich in PNG | business analyst | Scoop.it
Das Security-Blog Sucuri warnt vor einem neuen Trojaner, der sich komprimiert in PNG-Bilddateien versteckt. Anti-Viren-Software erkennt den Schädling nicht.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from Free Tutorials in EN, FR, DE
Scoop.it!

How to rescue your PC from ransomware | Cyber-Security

How to rescue your PC from ransomware | Cyber-Security | business analyst | Scoop.it
Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Hacking Team, Surveillance and You | Digital Privacy

Hacking Team, Surveillance and You | Digital Privacy | business analyst | Scoop.it
The fact that a company called Hacking Team was hacked, combined with the disclosure of their shady clientele, has several diminished the credibility of previous denials the company has made about their engaging in this kind of profiteering. It also validates criticisms that groups like the EFF and Reporters Without Borders have thrown at Hacking Team – basically, that they provide agents around the globe with cyberweapons used for the suppression of democracy and the violation of human rights.

Hacking Team offers their clients a “Remote Control System” (RCS) that combines a variety of spyware technologies into one comprehensive surveillance suite. According to The Citizen Lab, this RCS product essentially allows users to do things like turn the microphones and cameras of their targets’ mobile phones on/off, monitor and record communications, and copy files and passwords.

While Hacking Team sells exclusively to governments, companies are designing products and services to give them similar capabilities.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Hacking+Team+breach


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Via Gust MEES
Gust MEES's curator insight, July 17, 2015 6:39 PM
The fact that a company called Hacking Team was hacked, combined with the disclosure of their shady clientele, has several diminished the credibility of previous denials the company has made about their engaging in this kind of profiteering. It also validates criticisms that groups like the EFF and Reporters Without Borders have thrown at Hacking Team – basically, that they provide agents around the globe with cyberweapons used for the suppression of democracy and the violation of human rights.

Hacking Team offers their clients a “Remote Control System” (RCS) that combines a variety of spyware technologies into one comprehensive surveillance suite. According to The Citizen Lab, this RCS product essentially allows users to do things like turn the microphones and cameras of their targets’ mobile phones on/off, monitor and record communications, and copy files and passwords.

While Hacking Team sells exclusively to governments, companies are designing products and services to give them similar capabilities.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Hacking+Team+breach


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip | business analyst | Scoop.it

That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand.

.

Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Or even worse a combination of all the above; plus a malware or trojan laden url embedded in it.

.

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.

.

Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Via Gust MEES
Gust MEES's curator insight, March 8, 2015 3:21 PM

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.


Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Your Samsung SmartTV Is Spying on You, Basically | Internet of Things | Privacy | CyberSecurity

Your Samsung SmartTV Is Spying on You, Basically | Internet of Things | Privacy | CyberSecurity | business analyst | Scoop.it
You may be loving your new Internet-connected television and its convenient voice-command feature—but did you know it’s recording everything you say and sending it to a third party?


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from Robótica Educativa!
Scoop.it!

Ransomware Now Targeting Website Databases and Backups

Ransomware Now Targeting Website Databases and Backups | business analyst | Scoop.it

Via Gust MEES, juandoming
Gust MEES's curator insight, February 7, 2015 6:11 AM
Ransomware developers have continued to evolve the sophistication of their malware by utilizing several levels of encryption, using the online anonymizer Tor for command and control (C&C) communications, employing droppers that use multiple exploits to infect targeted systems, and including anti-vm and anti-emulation functionalities which obfuscate the malware when sandboxed.

Now it appears they are also shifting their tactics and targets, as security researchers have detected several instances where ransomware operators are specifically targeting businesses as opposed to individuals by infiltrating websites and encrypting databases and auxiliary data backups, dubbing the attacks “RansomWeb.”


“We are probably facing a new emerging threat for websites that may outshine defacements and DDoS attacks. RansomWeb attacks may cause unrepairable (sic) damage, they are very easy to cause and pretty difficult to prevent,” said Ilia Kolochenko.


“Days when hackers were attacking websites for glory or fun are over, now financial profit drives them. The era of web blackmailing, racket and chantage is about to start.”


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Antivirus and Compromised Device Report: January 2015

Antivirus and Compromised Device Report: January 2015 | business analyst | Scoop.it
OPSWAT’s latest market share report ranks Avast as the top vendor and finds that 90% of devices haven’t updated their antivirus definitions in the last seven days.

Via Gust MEES
No comment yet.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity | business analyst | Scoop.it
The New Security Landscape of IoT


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Via Gust MEES
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Security Concerns Surrounding Web Browsers | Learning basics of CyberSecurity | Video

This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/



Via Gust MEES
Gust MEES's curator insight, December 18, 2014 5:16 PM
This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

CrytoPHP Backdoored Thousands of Wordpress, Joomla and Drupal Websites

CrytoPHP Backdoored Thousands of Wordpress, Joomla and Drupal Websites | business analyst | Scoop.it
Security researchers have released a report examining a social engineering operation designed to trick admins into installing backdoor malware called CrytoPHP by way of of tainted CMS plugins and themes for WordPress, Joomla and Drupal.

The attackers lure targets into publishing the pirated themes and plugins by providing them for free, offerings that usually incur a fee for use.

“After being installed on a webserver the backdoor has several options of being controlled which include command and control server communication, mail communication as well as manual control,” the researchers revealed.

Via Gust MEES
Gust MEES's curator insight, November 24, 2014 2:30 PM

Security researchers have released a report examining a social engineering operation designed to trick admins into installing backdoor malware called CrytoPHP by way of of tainted CMS plugins and themes for WordPress, Joomla and Drupal.

The attackers lure targets into publishing the pirated themes and plugins by providing them for free, offerings that usually incur a fee for use.

“After being installed on a webserver the backdoor has several options of being controlled which include command and control server communication, mail communication as well as manual control,”the researchers revealed.


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | business analyst | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES
Gust MEES's curator insight, November 16, 2014 5:12 PM

How many of these hacker personas are you dueling with in your organization?


Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Heartbleed Vulnerability Also Affects OpenSSL Library in Android 4.1.1 and Certain Apps

Heartbleed Vulnerability Also Affects OpenSSL Library in Android 4.1.1 and Certain Apps | business analyst | Scoop.it
Recently, a report has emerged on the fact that certain applications available on Android are vulnerable to the Heartbleed Bug, and it seems that more...

Moreover, the team claims that the issue is present even on handsets and tablets that do not run under the affected platform iteration itself. 

They note that 273 applications in Google Play were found to be bundled with the standalone affected OpenSSL library, thus being vulnerable on any device on which they are installed.

“In this list, we see last year’s most popular games, some VPN clients, a security app, a popular video player, an instant message app, a VOIP phone app and many others,” the TrendLabs notes in the aforementioned blog post. 


Learn more:





Via Gust MEES
Gust MEES's curator insight, April 17, 2014 1:36 AM


Moreover, the team claims that the issue is present even on handsets and tablets that do not run under the affected platform iteration itself. 

They note that 273 applications in Google Play were found to be bundled with the standalone affected OpenSSL library, thus being vulnerable on any device on which they are installed.

“In this list, we see last year’s most popular games, some VPN clients, a security app, a popular video player, an instant message app, a VOIP phone app and many others,” the TrendLabs notes in the aforementioned blog post. 


Learn more:



Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

The Internet of Things – a new cybercrime target.

The Internet of Things – a new cybercrime target. | business analyst | Scoop.it
The benefits that the Internet of Things can bring are numerous, but so are the concerns that it can facilitate cyber attacks.

 

As we are entering the era of the Internet of Things (IoT), our homes are becoming increasingly populated by devices that are connected to the Internet in order to share information with each other and the external world more easily.


Ranging from smart phones and smart TVs to motor-cars with 4G and Wi-Fi, from automated household appliances to sophisticated business tools, this web – connected smart devices are collectively known as the Internet of Things.


According to a Ciscoreport, it’s predicted that 50 billion objects worldwide will be connected to the internet by 2020.



Via Gust MEES
Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

For The First Time, Hackers Have Used A Refrigerator To Attack Businesses

For The First Time, Hackers Have Used A Refrigerator To Attack Businesses | business analyst | Scoop.it
Security researchers at Proofpoint have uncovered the very first wide-scale hack attack that involved television sets and at least one refrigerator.

Via Gust MEES