ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Three Years Later, Hundreds of Sites Still Use Backdoored WordPress Plugins | #CyberSecurity #Awareness 

Three Years Later, Hundreds of Sites Still Use Backdoored WordPress Plugins | #CyberSecurity #Awareness  | ICT Security-Sécurité PC et Internet | Scoop.it
Hundreds of WP sites continued to use backdoored plugins
These past attacks came into the spotlight again when recently, the WordPress Plugin Directory was changed so that the pages for old plugins that have been closed remain visible, albeit with the download option disabled. Previously, these pages were not accessible to the public.

Pages for all the former plugins that featured the intentional malicious code show that even after almost three years after the WordPress team removed the plugins from public download, there are hundreds of sites that still use them.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=WordPress

 

Gust MEES's insight:
Hundreds of WP sites continued to use backdoored plugins
These past attacks came into the spotlight again when recently, the WordPress Plugin Directory was changed so that the pages for old plugins that have been closed remain visible, albeit with the download option disabled. Previously, these pages were not accessible to the public.

Pages for all the former plugins that featured the intentional malicious code show that even after almost three years after the WordPress team removed the plugins from public download, there are hundreds of sites that still use them.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=WordPress

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Yahoo confirms: hackers stole 500 million account details in 2014 data breach | #CyberSecurity #DataBreaches

Yahoo confirms: hackers stole 500 million account details in 2014 data breach | #CyberSecurity #DataBreaches | ICT Security-Sécurité PC et Internet | Scoop.it

Yahoo has confirmed that at least 500 million Yahoo accounts were put at risk by a data breach in 2014. Here is what you need to know, and what you need to do.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Yahoo...

 

Gust MEES's insight:

Yahoo has confirmed that at least 500 million Yahoo accounts were put at risk by a data breach in 2014. Here is what you need to know, and what you need to do.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Yahoo...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Plus d'un milliard de données volées en 2014 | CyberSecurity | Data Breaches

Plus d'un milliard de données volées en 2014 | CyberSecurity | Data Breaches | ICT Security-Sécurité PC et Internet | Scoop.it
Les vols de données ont explosé en 2014, selon le Breaches Level Index. La faute à un modèle de protection dépassé face aux nouveaux modes d’attaque, selon Gemalto.

L’année 2014 s’illustrera comme une année record en matière d’infractions informatiques. Plus d’un milliard (1,023 précisément) de données ont été perdues ou volées au cours de l’année passée. Sont considérées comme données les informations propres à l’identité personnelle ou bancaire ainsi que les identifiants d’accès.


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Gust MEES's insight:
Les vols de données ont explosé en 2014, selon le Breaches Level Index. La faute à un modèle de protection dépassé face aux nouveaux modes d’attaque, selon Gemalto.

L’année 2014 s’illustrera comme une année record en matière d’infractions informatiques. Plus d’un milliard (1,023 précisément) de données ont été perdues ou volées au cours de l’année passée. Sont considérées comme données les informations propres à l’identité personnelle ou bancaire ainsi que les identifiants d’accès.


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


No comment yet.
Scooped by Gust MEES
Scoop.it!

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks | ICT Security-Sécurité PC et Internet | Scoop.it
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

BSI: Die Lage der IT-Sicherheit in Deutschland 2014

BSI: Die Lage der IT-Sicherheit in Deutschland 2014 | ICT Security-Sécurité PC et Internet | Scoop.it
BSI-Lagebericht IT-Sicherheit 2011. Die Lage der IT-Sicherheit in Deutschland.
Gust MEES's insight:

BSI-Lagebericht IT-Sicherheit 2011. Die Lage der IT-Sicherheit in Deutschland.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Regin: Nation-state ownage of GSM networks

Regin: Nation-state ownage of GSM networks | ICT Security-Sécurité PC et Internet | Scoop.it
A sophisticated group known as Regin has targeted high-profile entities around the world. Regin is one of the most sophisticated attack platforms we have ever analysed. The ability to penetrate and...


For more than a decade, a sophisticated group known as Regin has targeted high-profile entities around the world with an advanced malware platform. As far as we can tell, the operation is still active, although the malware may have been upgraded to more sophisticated versions. The most recent sample we've seen was from a 64-bit infection. This infection was still active in the spring of 2014.


The name Regin is apparently a reversed "In Reg", short for "In Registry", as the malware can store its modules in the registry. This name and detections first appeared in anti-malware products around March 2011.


From some points of view, the platform reminds us of another sophisticated malware: Turla. Some similarities include the use of virtual file systems and the deployment of communication drones to bridge networks together. Yet through their implementation, coding methods, plugins, hiding techniques and flexibility, Regin surpasses Turla as one of the most sophisticated attack platforms we have ever analysed.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Law Enforcement Agencies in Tor: Impact Over the Dark Web

Law Enforcement Agencies in Tor: Impact Over the Dark Web | ICT Security-Sécurité PC et Internet | Scoop.it
The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week.


Cybercrime, just like any other illegal activity, is hard to eradicate completely. Whenever illegal services are taken down, the gap created will always be filled by other criminals willing to profit from the opportunity. The reality we have to accept is that there will always be demand for such services.



Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:
The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week.


Cybercrime, just like any other illegal activity, is hard to eradicate completely. Whenever illegal services are taken down, the gap created will always be filled by other criminals willing to profit from the opportunity. The reality we have to accept is that there will always be demand for such services.



Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Unpatched systems and apps on the rise

Unpatched systems and apps on the rise | ICT Security-Sécurité PC et Internet | Scoop.it

As the number of software vulnerabilities increases, and people connect across personal and corporate devices using a multitude of different platforms each day, time and time again, patch management has proven to be one of the most effective practice users can take in securing their PCs.


Learn more:


http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


Gust MEES's insight:

As the number of software vulnerabilities increases, and people connect across personal and corporate devices using a multitude of different platforms each day, time and time again, patch management has proven to be one of the most effective practice users can take in securing their PCs.


Learn more:


http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Home Depot Confirms 56 Million Cards Hit By Hack

Home Depot Confirms 56 Million Cards Hit By Hack | ICT Security-Sécurité PC et Internet | Scoop.it
If you just bought a new screwdriver, check your Visa card for strange charges. Several banks are reporting that Home Depot has experienced a credit card breach that may rival or exceed last fall's Target fiasco.
Gust MEES's insight:

If you just bought a new screwdriver, check your Visa card for strange charges. Several banks are reporting that Home Depot has experienced a credit card breach that may rival or exceed last fall's Target fiasco.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog | DEF CON® 22 Hacking Conference - Speakers

Here you can find all of the fantastic talks and speakers to be presented at DEF CON 22!


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cats+as+wardriver


Gust MEES's insight:

Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog...


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cats+as+wardriver



No comment yet.
Scooped by Gust MEES
Scoop.it!

Feedly, Evernote And Others Become Latest Victims Of DDoS Attacks

Feedly, Evernote And Others Become Latest Victims Of DDoS Attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Who have the DDoS attackers not hit, is the question? This morning, RSS reader and feed-syncing platform Feedly is being hit by a distributed..




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Feedly


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Feedly


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/



No comment yet.
Scooped by Gust MEES
Scoop.it!

PWN2OWN Day Two - Chrome and Safari join the losers

PWN2OWN Day Two - Chrome and Safari join the losers | ICT Security-Sécurité PC et Internet | Scoop.it
Here are the PWN2OWN results from Day Two, and an overview of the final payouts.

Chrome and Safari didn't get picked for Day One, but both of them were pwned on Day Two - twice for Chrome and on...
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Pwn20wn


No comment yet.
Scooped by Gust MEES
Scoop.it!

Vupen Cashes in Four Times at Pwn2Own 2014

Vupen Cashes in Four Times at Pwn2Own 2014 | ICT Security-Sécurité PC et Internet | Scoop.it
Exploit broker Vupen won four cash prizes for zero-day exploits of Internet Explorer 11, Firefox, Adobe Reader and Flash at the Pwn2Own contest.
Gust MEES's insight:


It’s become a familiar walk for Chaouki Bekrar. Year after year at thePwn2Own contest, the controversial Vupen founder is scurried from a small room in the basement of the Sheraton hotel to a suite several floors above. It’s a short journey from where a string of zero-day exploits are executed to where formal disclosure is made to the vendor in question. It’s also where payment is arranged, and on this day, exclusivity is promised to HP’s Zero Day Initiative.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Pwn20wn




No comment yet.
Scooped by Gust MEES
Scoop.it!

68 Prozent mehr mobile Cyberangriffe seit September 2014 | #CyberSecurity #MobileSecurity #Awareness 

68 Prozent mehr mobile Cyberangriffe seit September 2014 | #CyberSecurity #MobileSecurity #Awareness  | ICT Security-Sécurité PC et Internet | Scoop.it
68 Prozent mehr mobile Cyberangriffe seit September 2014
Kaspersky-Studie zur mobilen Bedrohungslage für Deutschland zeigt auch signifikante Steigerung (77,8 Prozent) bei Angriffen auf mobil genutzte Finanzdaten

Moskau/lngolstadt, 30. November 2017 - Das Internet erleichtert den Alltag und Cyberkriminellen möglicherweise den Zugang zum Geldbeutel vieler Smartphone-Nutzer. So sehen die Experten von Kaspersky Lab seit September 2014 bis August 2017 einen Anstieg mobiler Cyberattacken gegen deutsche Nutzer um mehr als 68 Prozent. Zugleich haben immer mehr Schädlinge auf Smartphone und Co. verfügbare Finanzdaten im Visier – mit einem Zuwachs an Attacken durch mobile Banking-Trojaner gegen deutsche Nutzer um 77,8 Prozent (auch seit September 2014 bis August 2017).

 

Die erstmals für Deutschland von Kaspersky Lab durchgeführte Studie ,Mobile Schadprogramme in Deutschland – Panikmache oder echte Gefahr?‘ [1] zeigt: Betrugsversuche über das mobile Web sind auch in Deutschland akut.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Mobile-Security

 

https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/

 

 

Gust MEES's insight:
68 Prozent mehr mobile Cyberangriffe seit September 2014
Kaspersky-Studie zur mobilen Bedrohungslage für Deutschland zeigt auch signifikante Steigerung (77,8 Prozent) bei Angriffen auf mobil genutzte Finanzdaten

Moskau/lngolstadt, 30. November 2017 - Das Internet erleichtert den Alltag und Cyberkriminellen möglicherweise den Zugang zum Geldbeutel vieler Smartphone-Nutzer. So sehen die Experten von Kaspersky Lab seit September 2014 bis August 2017 einen Anstieg mobiler Cyberattacken gegen deutsche Nutzer um mehr als 68 Prozent. Zugleich haben immer mehr Schädlinge auf Smartphone und Co. verfügbare Finanzdaten im Visier – mit einem Zuwachs an Attacken durch mobile Banking-Trojaner gegen deutsche Nutzer um 77,8 Prozent (auch seit September 2014 bis August 2017).

 

Die erstmals für Deutschland von Kaspersky Lab durchgeführte Studie ,Mobile Schadprogramme in Deutschland – Panikmache oder echte Gefahr?‘ [1] zeigt: Betrugsversuche über das mobile Web sind auch in Deutschland akut.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Mobile-Security

 

https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Moskau/lngolstadt, 17. Februar 2015 Kaspersky Lab enttarnt die Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].

Gust MEES's insight:

Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].


No comment yet.
Scooped by Gust MEES
Scoop.it!

Die größten Datendiebstähle des Jahres 2014 | Data Breaches | CyberSecurity

Die größten Datendiebstähle des Jahres 2014 | Data Breaches | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Noch einmal blicken wir zurück: Diesmal auf die größten Datendiebstähle des vergangenen Jahres – von Target und Home Depot über JP Morgan und Barclays Bank bis zu Orange und Dropbox.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Gust MEES's insight:
Noch einmal blicken wir zurück: Diesmal auf die größten Datendiebstähle des vergangenen Jahres – von Target und Home Depot über JP Morgan und Barclays Bank bis zu Orange und Dropbox.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


No comment yet.
Scooped by Gust MEES
Scoop.it!

German Defense Minister von der Leyen's fingerprint copied by Chaos Computer Club | CyberSecurity | Biometrics

German Defense Minister von der Leyen's fingerprint copied by Chaos Computer Club | CyberSecurity | Biometrics | ICT Security-Sécurité PC et Internet | Scoop.it
A speaker at the yearly conference of the Chaos Computer Club has shown how you can fake fingerprints using only a few photographs. Jan Krissler has warned the world about relying on certain security technologies.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


Gust MEES's insight:
A speaker at the yearly conference of the Chaos Computer Club has shown how you can fake fingerprints using only a few photographs. Jan Krissler has warned the world about relying on certain security technologies.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics


No comment yet.
Scooped by Gust MEES
Scoop.it!

Sony Pictures hacked, entire computer system reportedly unusable | CyberSecurity

Sony Pictures hacked, entire computer system reportedly unusable | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Reports that Sony Pictures has been hacked have been trickling in this morning, after a thread appeared on Reddit claiming all computers at the company were offline due to a hack.…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SONY


Gust MEES's insight:
Reports that Sony Pictures has been hacked have been trickling in this morning, after a thread appeared on Reddit claiming all computers at the company were offline due to a hack.…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SONY


No comment yet.
Scooped by Gust MEES
Scoop.it!

iOS tombe et Windows Phone résiste lors d’une compétition de hackers

iOS tombe et Windows Phone résiste lors d’une compétition de hackers | ICT Security-Sécurité PC et Internet | Scoop.it
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.
Gust MEES's insight:

L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.

Gust MEES's curator insight, November 15, 2014 4:02 AM
L’iPhone 5S a été mis à mal par une équipe de Corée du Sud, qui a réussi à profiter d'une combinaison de deux bugs dans Safari pour en prendre le contrôle. Le Samsung Galaxy S5 non plus n'a pas réisté aux assauts des hackers. Deux équipes ont profité de failles dans la gestion du protocole NFC pour en prendre le contrôle. le Nexus 5 a lui aussi été piraté via NFC, grâce à une technique étonnante, qui a consisté à forcer un appairage Bluetooth entre deux appareils.


Scooped by Gust MEES
Scoop.it!

Tip of the week: How to protect yourself from cryptoware

Tip of the week: How to protect yourself from cryptoware | ICT Security-Sécurité PC et Internet | Scoop.it

What do you do if your files are encrypted but Kaspersky Internet Security is not installed? Use our free utilities and regain access to your files:

Gust MEES's insight:

What do you do if your files are encrypted but Kaspersky Internet Security is not installed? Use our free utilities and regain access to your files:


Pierre-André Fontaine's curator insight, October 4, 2014 1:44 PM

ajouter votre point de vue ...

Scooped by Gust MEES
Scoop.it!

China Is The World's Top Source Of Internet Attack Traffic [Infographic]

China Is The World's Top Source Of Internet Attack Traffic [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
China is the place where the vast majority of Internet attack traffic originates from, according to Akamai's most recent "State of The Internet" report. Denial-of-service or DDoS attacks overwhelm computers and networks with high levels of online activity, usually through a network taken over or compromised by viruses. Akamai observed attack [...]


Learn more:


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


Gust MEES's insight:
China is the place where the vast majority of Internet attack traffic originates from, according to Akamai's most recent "State of The Internet" report. Denial-of-service or DDoS attacks overwhelm computers and networks with high levels of online activity, usually through a network taken over or compromised by viruses. Akamai observed attack [...]


Learn more:


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Black Hat 2014: Where the Internet of Things Meets Reality | Security Cannot Be an Afterthought

Black Hat 2014: Where the Internet of Things Meets Reality | Security Cannot Be an Afterthought | ICT Security-Sécurité PC et Internet | Scoop.it
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Scooped by Gust MEES
Scoop.it!

Dirty Dozen Spampionship – which country is spewing the most spam?

Dirty Dozen Spampionship – which country is spewing the most spam? | ICT Security-Sécurité PC et Internet | Scoop.it
The World Cup may be done and dusted, but the Spampionship continues!

Where did you come in our spam-sending league tables?


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:

Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackerangriff: Ebay-Nutzer sollen dringend Passwörter ändern

Hackerangriff: Ebay-Nutzer sollen dringend Passwörter ändern | ICT Security-Sécurité PC et Internet | Scoop.it
Unbekannte Angreifer haben E-Mail-Adressen, Telefonnummern und Geburtstagsdaten von Ebay-Kunden erbeutet. Wer ein Konto bei dem Dienst hat, soll umgehend sein Passwort ändern.


Dabei seien persönliche Kundendaten wie Namen, verschlüsselte Passwörter, Adressen, E-Mail-Adressen, Geburtstage und Telefonnummern erbeutet worden. Offenbar konnten die Angreifer Login-Daten von Mitarbeitern abgreifen und sich so Zugang zu den Kundendaten verschaffen. Es gebe allerdings keine Anzeichen, dass die Angreifer Zugriff auf Finanzinformationen wie Kreditkarten gehabt hätten.


Gust MEES's insight:

Dabei seien persönliche Kundendaten wie Namen, verschlüsselte Passwörter, Adressen, E-Mail-Adressen, Geburtstage und Telefonnummern erbeutet worden. Offenbar konnten die Angreifer Login-Daten von Mitarbeitern abgreifen und sich so Zugang zu den Kundendaten verschaffen. Es gebe allerdings keine Anzeichen, dass die Angreifer Zugriff auf Finanzinformationen wie Kreditkarten gehabt hätten.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Pwn2Own: The perfect antidote to fanboys who say their platform is safe

Pwn2Own: The perfect antidote to fanboys who say their platform is safe | ICT Security-Sécurité PC et Internet | Scoop.it
Despite huge leaps in secure code, nothing is immune when hackers are motivated.


The first day of this year's Pwn2Own 2014and the companion contest that ran concurrently stuck with much the same theme, with successful hacks of the Internet Explorer, Firefox, and Safari browsers and Adobe's Flash and Reader applications.



But as long as there's a strong enough incentive—say, in the form of financial gain or the ability to acquire valuable national security or industry intelligence—exploits like the ones delivered at Pwn2Own won't just be possible. They'll be inevitable.




Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Pwn20wn


No comment yet.