ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

SEC Employees Take Unencrypted Work Computers to Black Hat Conference

SEC Employees Take Unencrypted Work Computers to Black Hat Conference | ICT Security-Sécurité PC et Internet | Scoop.it
SEC Employees Take Unencrypted Work Computers to Black Hat Conference [Reuters]...

 

Some employees of the US Securities and Exchange Commission (SEC) Trading and Markets Division have failed to encrypt their computers, despite the fact that they contain highly sensitive information. Furthermore, according to reports, they even have even taken the devices to the Black Hat security conference.

 

Read more, a MUST:

http://news.softpedia.com/news/SEC-Employees-Take-Unencrypted-Work-Computers-to-Black-Hat-Conference-Reuters-305722.shtml?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

First holistic security platform unveiled at Black Hat

First holistic security platform unveiled at Black Hat | ICT Security-Sécurité PC et Internet | Scoop.it

“In the age of Stuxnet and Flame, organizations need the visibility and response capabilities CIRT provides,” commented Jason Mical, Director of Network Forensics at AccessData. “It’s not just another platform that provides a mound of data to sift through. It delivers the threat intelligence you need and it remediates.”

 

Using CIRT, organizations can continuously monitor network traffic, computers and removable media to detect threats and more quickly acquire actionable intelligence in the event of a cyber incident. In addition, with CIRT’s “check in” feature, CIRT users can monitor the laptops of traveling employees, even when they are not logged on to the organization’s network.

 

Read more:

http://www.net-security.org/secworld.php?id=13327

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Black Hat 2011 : les batteries des PC portables vulnérables aux attaques

Black Hat 2011 : les batteries des PC portables vulnérables aux attaques | ICT Security-Sécurité PC et Internet | Scoop.it
Un chercheur en sécurité a montré comment il parvient à prendre le contrôle du processeur qui gère la batterie d’un MacBook.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Black Hat: iSec condemns OS X network security

Black Hat: iSec condemns OS X network security | ICT Security-Sécurité PC et Internet | Scoop.it
Apple networks almost trivial to compromise, say researchers...
No comment yet.
Scooped by Gust MEES
Scoop.it!

#BlackHat: Phones hijacked by malicious NFC tag

#BlackHat: Phones hijacked by malicious NFC tag | ICT Security-Sécurité PC et Internet | Scoop.it
Android, Nokia compromised....

 

A malicious wireless tag has been created that can crack an Android phone in seconds.

The tag exploits a vulnerability in near field communication (NFC), a wireless technology popular on Android phones that establishes communication between devices through physical contact.

 

Well-known Apple hacker and Accuvant researcher Charlie Miller wowed the crowed at Black Hat Las Vegas through a demo that involved infiltrating an Android phone by simply grazing it with a tag embedded with an NFC chip...

 

Read more:

http://www.scmagazine.com.au/News/310189,blackhat-phones-hijacked-by-malicious-nfc-tag.aspx?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

All eyes on Apple with it set to take security public

All eyes on Apple with it set to take security public | ICT Security-Sécurité PC et Internet | Scoop.it
In a first, Apple manager scheduled to take stage Thursday at Black Hat to discuss security technologies in iOS...

 

Beyond Flashback, research has shown that Macs are carrying malware unbeknownst to users. A security scan of 100,000 Macs found 3 percent infected with Mac-capable malware, according to anti-virus vendor Sophos. When Windows malware was included, one in five Macs were found to be harboring some type of malware.

 

While the Mac has been the primary target, hackers are taking notice of iOS. This month, Kaspersky Lab reported finding an iOS Trojan that uploaded a user's address book to a remote server. Spam messages with a URL to the application, called "Find and Call," were sent from the server to all the users' contacts.

 

For years hackers focused on Microsoft Windows PCs instead of Apple products, which had a fraction of the market share. Today,

 

===> Apple's success in selling the iPhone and iPad have made it the world's most valuable company and its products a potentially lucrative target for cybercriminals. <===

 

Read more:

http://www.csoonline.com/article/712227/all-eyes-on-apple-with-it-set-to-take-security-public?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Black Hat: Lots of hacks and a patriotic plea

Black Hat: Lots of hacks and a patriotic plea | ICT Security-Sécurité PC et Internet | Scoop.it
Black Hat hasn't disappointed this year, with research revealing a flaw that undercuts OSPF routing, two separate assertions that security for Apple products in the enterprise isn't that bad and a friendly hand being offered to hackers and crackers...
No comment yet.