Libertés Numériques
97.1K views | +0 today
Follow
Libertés Numériques
Veille sur la sécurité et les libertés individuelles à l'heure d'Internet.
Your new post is loading...
Your new post is loading...

Principales Thématiques :

Current selected tags: 'Lisa Vaas', 'Sécurité'. Clear
Scooped by Aurélien BADET
Scoop.it!

Pentagon OKs Androids, BlackBerrys for soldiers

Pentagon OKs Androids, BlackBerrys for soldiers | Libertés Numériques | Scoop.it

The US Department of Defense (DoD) announced on Thursday that it has approved the use of Samsung phones running a hardened version of Android.

According to the BBC, the approval for other types of smartphones and mobile devices for use by US soldiers is coming soon.

Specifically, approval for other Android devices and for Apple phones and tablets is expected later this month.

According to Federal News Radio, the move is part of a broader DoD plan to more than double the number of secure mobile devices used by armed forces by 2014.

The approved Samsung smartphones will run a hardened version of Android called Knox.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Powerful new personal data disclosure bill proposed by California lawmaker

Powerful new personal data disclosure bill proposed by California lawmaker | Libertés Numériques | Scoop.it

Stop me if you've heard this one:

A consumer goes into a bar and walks up to a data broker.

"So tell me, where do you get data on me and 500 million other consumers?" she asks.

"Drop dead," the data broker says.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Samsung Galaxy security vulnerability unlocks homescreen

Samsung Galaxy security vulnerability unlocks homescreen | Libertés Numériques | Scoop.it

If you're nimble enough, you can get past the Galaxy Note 2's lock screen. And PIN. And password. And face unlock. Terence Eden recently discovered the minor security vulnerability in Samsung's Note 2 smartphone-tablet hybrid.

Much like the iPhone passcode hack from last week, this Galaxy glitch involves lightning-fast reflexes and a cancelled call to emergency services.

Given that the attack is of limited value, Eden provides full instructions on how to exploit it.

If you follow his instructions, which we hope you don't, given that this attack once again relies on placing bogus emergency calls, you can run apps and dial numbers on phones - even if they're locked with a pattern lock, PIN, password, or face unlock.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Ticketmaster says goodbye to CAPTCHA

Ticketmaster says goodbye to CAPTCHA | Libertés Numériques | Scoop.it

Human? Not a robot? Says you! Take this test to prove it:

What's at times essentially illegible, fuses characters together into melted blobs of unrecognizable goo, and occasionally tells you to go f**k yourself?

If you answered "CAPTCHA", congratulations - you're made out of carbon!

Because of this, it's unlikely you will robotically buy up reams of tickets and sell them at vicious markups, and therefore, Ticketmaster, the world's largest online ticket retailer, will be happy to sell to you.

Now, though, Ticketmaster is going to sell tickets without torturing your eyeballs with the use of CAPTCHA.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

What computer security threats can we expect to see in 2013?

What computer security threats can we expect to see in 2013? | Libertés Numériques | Scoop.it

Earlier this week, Sophos released the latest edition of its Security Threat Report, summing up the biggest threats seen during 2012, along with five trends that are likely to factor into IT security in the coming year.

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Why facial recognition couldn't identify Boston bombing suspects

Why facial recognition couldn't identify Boston bombing suspects | Libertés Numériques | Scoop.it

We had scores of still images, pored over by both official investigators and self-appointed ones on Reddit.

We had hours of video footage.

The suspects' images were on file. The FBI had even previously targeted Tamerlan Tsarnaev as a person of interest.

Why, then, didn't facial recognition technology help to winnow down the thousands of images and help to identify Tamerlan and his brother, Dzhokhar Tsarnaev, the two suspects behind the Boston Marathon bombings?

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report

Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report | Libertés Numériques | Scoop.it

Approximately one in six Amazon S3 storage buckets are full of holes, leaking sensitive data and company secrets, claims a new report.

Amazon Simple Storage Service (S3) is a web services interface for storing and retrieving static data from Amazon's cloud that gives developers a way to store and access, for example, server backups, company documents, web logs, and publicly visible content, including images and PDFs.

Such content is organized into "buckets", accessible at predictable URLs.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Twitter looking to hire two-factor authentication brains

Twitter looking to hire two-factor authentication brains | Libertés Numériques | Scoop.it

Just a few days after Twitter reset passwords and revoked session tokens for 250,000 possibly hacked user accounts,the king of social media succinctness has apparently moved to implement two-factor authentication. The Guardian picked up on the move after spotting this help-wanted ad for a software engineer in product security.

Twitter says, if you like to code and if you like security, do they have the perfect position for you! The position is asking for someone who will "design and develop user-facing security features, such as multifactor authentication and fraudulent login detection". Two-factor authentication requires users to enter a per-transaction or per-session code. In essence, a disposable, single-use password.

It's one small extra step for users, but it's one big headache for cyber trespassers.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Cyber attackers seize, encrypt and ransom medical centre's patient database

Cyber attackers seize, encrypt and ransom medical centre's patient database | Libertés Numériques | Scoop.it
Cyber attackers have breached an Australian medical centre's patient database, encrypted it, and are demanding $4,000 AUD to release thousands of patient records - a sum the medical centre is trying hard not to pay.

The records were collected over seven years and stored on a server at the Miami Family Medical Centre in Queensland.

Law enforcement say that the attack originated in Russia or somewhere in Eastern Europe, but origins of such attacks are notoriously difficult to pinpoint.
No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Nuclear power plant cybersecurity warnings silenced by legal threats

Nuclear power plant cybersecurity warnings silenced by legal threats | Libertés Numériques | Scoop.it

Legal threats have silenced security warnings at a recent systems-control conference.Two talks at a recent US conference on cyber security in critical infrastructure were pulled from the agenda after a supplier of nuclear power plant equipment threatened to sue, worried that open discussion of vulnerabilities would reveal too much - even though the presentations had been approved by the power plant in question.

No comment yet.