ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Lenovo.com hijacking made possible by compromise of Webnic registrar | CyberSecurity

Lenovo.com hijacking made possible by compromise of Webnic registrar | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Lenovo simply can't catch a break. After the massive negative attention it received for their ill-advised decision to ship some of its notebooks with pre-installed adware that also uses MITM SSL certificates, for a short time on Wednesday their main domain - Lenovo.com - has been hijacked and effectively defaced by the hacker collective Lizard Squad.

The defaced page showed a slideshow of photos of two youngsters - according to Brian Krebs, they are Ryan King (aka “Starfall”) and Rory Andrew Godfrey (“KMS”), two former members of the hacker collective Hack The Planet - accompanied with music. The reason for the defacement is purportedly Lenovo's Superfish blunder.

The defaced page pointed to Lizard Squad's Twitter feed and served as an advertisement for its LizardStresser DoS service.

The hackers didn't compromise Lenovo's servers. Instead, they (apparently) compromised those of Web Commerce Communications (Webnic.cc), a popular Malaysia-based Internet registrar with whom the Lenovo domain is registered.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Executive Cyber Intelligence Report: Februrary 23, 2015 | CyberSecurity

Executive Cyber Intelligence Report: Februrary 23, 2015 | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

This report was prepared by INSS and CSFI to create better cyber situational awareness of the nature and scope of threats to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-­up measures.


Gust MEES's insight:

This report was prepared by INSS and CSFI to create better cyber situational awareness of the nature and scope of threats to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-­up measures.


Oksana Borukh's curator insight, March 6, 2015 1:46 AM

Quoted:

This report was prepared by The Institute for National Security Studies (INSS) and The Cyber Security Forum Initiative (CSFI) to create better cyber situational awareness (Cyber SA) of the nature and scope of threats and hazards to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State, Local, Tribal, Territorial and private sector officials to aid in the identification and development of appropriate actions, priorities and follow-­up measures.

Scooped by Gust MEES
Scoop.it!

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity

Gust MEES's insight:

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity


No comment yet.
Scooped by Gust MEES
Scoop.it!

Größter Mobilfunkskandal aller Zeiten: NSA hat seit 2010 Zugriff auf Handy-SIM-Karten weltweit | Cyberespionage

Größter Mobilfunkskandal aller Zeiten: NSA hat seit 2010 Zugriff auf Handy-SIM-Karten weltweit | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

 CyberespionageIn einem der folgenreichsten Hacks der IT-Geschichte verschafften sich amerikanischer und britischer Geheimdienst Zugang zum größten Handy-SIM-Karten-Hersteller der Welt und klauten dort die Verschlüsselungskeys, mit denen nahezu jede SIM weltweit gesichert ist. Damit haben NSA und GCHQ seit 2010 Zugriff auf Telefonate, SMS und mobile Internet-Verbindungen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


 

Gust MEES's insight:

CyberespionageIn einem der folgenreichsten Hacks der IT-Geschichte verschafften sich amerikanischer und britischer Geheimdienst Zugang zum größten Handy-SIM-Karten-Hersteller der Welt und klauten dort die Verschlüsselungskeys, mit denen nahezu jede SIM weltweit gesichert ist. Damit haben NSA und GCHQ seit 2010 Zugriff auf Telefonate, SMS und mobile Internet-Verbindungen.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Geheimdienste unterwandern SIM- und Kreditkarten | Cyberespionage | Privacy | CyberSecurity

Geheimdienste unterwandern SIM- und Kreditkarten | Cyberespionage | Privacy | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Seit Jahren kopieren NSA und GCHQ bei den Herstellern von SIM-Karten und Smart Cards die zugehörigen Schlüssel ab. Damit können sie die übertragenen Informationen mitlesen und manipulieren. Auch die Rechnungssysteme vieler Mobilfunker sind unterwandert.

Der britische Geheimdienst GCHQ und die US-amerikanische NSA haben schon vor Jahren die Sicherheitsvorkehrungen der Chiphersteller ausgehebelt. Also sind SIM-Karten, elektronische Reisepässe, Kredit- und Debitkarten, elektronische Türöffner, TAN-Generatoren und so weiter unsicher. Den darin verbauten Chips und den mit ihnen fix verbundenen Schlüsseln kann nicht mehr vertraut werden. Die Dienste können beispielsweise mobile Übertragungen einfach mitlesen oder rückwirkend entschlüsseln. Und es ist schlimmer.


SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards


Gust MEES's insight:

Seit Jahren kopieren NSA und GCHQ bei den Herstellern von SIM-Karten und Smart Cards die zugehörigen Schlüssel ab. Damit können sie die übertragenen Informationen mitlesen und manipulieren. Auch die Rechnungssysteme vieler Mobilfunker sind unterwandert.

Der britische Geheimdienst GCHQ und die US-amerikanische NSA haben schon vor Jahren die Sicherheitsvorkehrungen der Chiphersteller ausgehebelt. Also sind SIM-Karten, elektronische Reisepässe, Kredit- und Debitkarten, elektronische Türöffner, TAN-Generatoren und so weiter unsicher. Den darin verbauten Chips und den mit ihnen fix verbundenen Schlüsseln kann nicht mehr vertraut werden. Die Dienste können beispielsweise mobile Übertragungen einfach mitlesen oder rückwirkend entschlüsseln. Und es ist schlimmer.


SIM Cards Have Finally Been Hacked, And The Flaw Could Affect Millions Of Phones


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards




No comment yet.
Scooped by Gust MEES
Scoop.it!

Until Superfish fix, Lenovo devices can't be trusted for secure work | CyberSecurity | Adware

Until Superfish fix, Lenovo devices can't be trusted for secure work  | CyberSecurity | Adware | ICT Security-Sécurité PC et Internet | Scoop.it
Enterprise customers are not said to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Enterprise customers are not said to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Scandale "Superfish" : quand Lenovo installe des malwares dans ses PC | Adware | CyberSecurity #Ethics

Scandale "Superfish" : quand Lenovo installe des malwares dans ses PC | Adware | CyberSecurity #Ethics | ICT Security-Sécurité PC et Internet | Scoop.it


Un logiciel préinstallé dans des PC Lenovo compromet gravement la sécurité des échanges chiffrés via SSL.




Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO

Gust MEES's insight:
Un logiciel préinstallé dans des PC Lenovo compromet gravement la sécurité des échanges chiffrés via SSL.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

PC-Adware von Lenovo korrumpiert SSL/TLS | Adware | CyberSecurity | Ethics

PC-Adware von Lenovo korrumpiert SSL/TLS | Adware | CyberSecurity | Ethics | ICT Security-Sécurité PC et Internet | Scoop.it
Der PC-Hersteller Lenovo installiert auf seine neuen PCs anscheinend Adware ab Werk, die im Browser Zusatz-Werbung anzeigt und sichere SSL/TLS-Verbindungen korrumpiert.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Der PC-Hersteller Lenovo installiert auf seine neuen PCs anscheinend Adware ab Werk, die im Browser Zusatz-Werbung anzeigt und sichere SSL/TLS-Verbindungen korrumpiert.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Experten: NSA kann Viren in jeder Festplatte verstecken | Cyberespionage | CyberSecurity

Experten: NSA kann Viren in jeder Festplatte verstecken | Cyberespionage | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Auf Firmware der Festplatten namhafter Hersteller könnte Spionagesoftware installiert sein. Steckt die NSA dahinter?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Auf Firmware der Festplatten namhafter Hersteller könnte Spionagesoftware installiert sein. Steckt die NSA dahinter?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer | CyberSecurity

A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES


Gust MEES's insight:

Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At…


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES



No comment yet.
Scooped by Gust MEES
Scoop.it!

HUGE SPY PROGRAM EXPOSED: NSA has hidden software in hard drives around the world | Cyberespionage | Privacy

HUGE SPY PROGRAM EXPOSED: NSA has hidden software in hard drives around the world | Cyberespionage | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Security research firm Kaspersky uncovered the trick.

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba, and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

Read more: http://uk.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2#ixzz3RzfELBrL


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Security research firm Kaspersky uncovered the trick.

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba, and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

Read more: http://uk.businessinsider.com/r-russian-researchers-expose-breakthrough-us-spying-program-2015-2#ixzz3RzfELBrL


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Plus d'un milliard de données volées en 2014 | CyberSecurity | Data Breaches

Plus d'un milliard de données volées en 2014 | CyberSecurity | Data Breaches | ICT Security-Sécurité PC et Internet | Scoop.it
Les vols de données ont explosé en 2014, selon le Breaches Level Index. La faute à un modèle de protection dépassé face aux nouveaux modes d’attaque, selon Gemalto.

L’année 2014 s’illustrera comme une année record en matière d’infractions informatiques. Plus d’un milliard (1,023 précisément) de données ont été perdues ou volées au cours de l’année passée. Sont considérées comme données les informations propres à l’identité personnelle ou bancaire ainsi que les identifiants d’accès.


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


Gust MEES's insight:
Les vols de données ont explosé en 2014, selon le Breaches Level Index. La faute à un modèle de protection dépassé face aux nouveaux modes d’attaque, selon Gemalto.

L’année 2014 s’illustrera comme une année record en matière d’infractions informatiques. Plus d’un milliard (1,023 précisément) de données ont été perdues ou volées au cours de l’année passée. Sont considérées comme données les informations propres à l’identité personnelle ou bancaire ainsi que les identifiants d’accès.


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES


No comment yet.
Scooped by Gust MEES
Scoop.it!

US to form cybersecurity agency to combat online threats

US to form cybersecurity agency to combat online threats | ICT Security-Sécurité PC et Internet | Scoop.it
The Obama administration will create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.
Gust MEES's insight:

The Obama administration will create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.


No comment yet.
Scooped by Gust MEES
Scoop.it!

3 million strong RAMNIT botnet taken down | CyberCrime | CyberSecurity

3 million strong RAMNIT botnet taken down | CyberCrime | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
3 million strong RAMNIT botnet taken down
Posted on 25.02.2015
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol’s European Cybercrime Centre (EC3), to shut down command and control servers used by the RAMNIT botnet.

RAMNIT spread malware via seemingly trustworthy links sent out on phishing emails or social networking websites. If users running Windows clicked on the links, the malware would be installed, infecting the computer. Infected computers would then be under the control of criminals, enabling them to access personal or banking information, steal passwords and disable antivirus protection.

Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts. Analysis is now taking place on the servers and an investigation is ongoing.
Gust MEES's insight:

3 million strong RAMNIT botnet taken down
Posted on 25.02.2015
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol’s European Cybercrime Centre (EC3), to shut down command and control servers used by the RAMNIT botnet.

RAMNIT spread malware via seemingly trustworthy links sent out on phishing emails or social networking websites. If users running Windows clicked on the links, the malware would be installed, infecting the computer. Infected computers would then be under the control of criminals, enabling them to access personal or banking information, steal passwords and disable antivirus protection.

Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts. Analysis is now taking place on the servers and an investigation is ongoing.


No comment yet.
Scooped by Gust MEES
Scoop.it!

CMS: Sicherheitslücke in Typo3 ===> Update asap!!! <=== | CyberSecurity | Awareness

CMS: Sicherheitslücke in Typo3 ===> Update asap!!! <=== | CyberSecurity | Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

Über eine gravierende Sicherheitslücke in alten Versionen des CMS Typo3 kann sich jeder authentifizieren, der nur den Namen eines registrierten Benutzers kennt. Es gibt Updates und einen Patch.

Gust MEES's insight:

Über eine gravierende Sicherheitslücke in alten Versionen des CMS Typo3 kann sich jeder authentifizieren, der nur den Namen eines registrierten Benutzers kennt. Es gibt Updates und einen Patch.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Teen hacks car with $15 worth of parts | Internet of Things | Internet of Everything | CyberSecurity

Teen hacks car with $15 worth of parts | Internet of Things | Internet of Everything | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
With just a little soldering and assembly, a 14-year-old built a device to wirelessly communicate with a vehicle's controller area network (CAN) and remotely start and unlock the vehicle.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

Lenovo admits security issues with Superfish, releases removal tool | CyberSecurity | Adware

Lenovo admits security issues with Superfish, releases removal tool | CyberSecurity | Adware | ICT Security-Sécurité PC et Internet | Scoop.it
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO

No comment yet.
Scooped by Gust MEES
Scoop.it!

Snowden-Papier: Geheimdienste entschlüsseln SIM-Karten | Cyberespionage | CyberSecurity | Privacy

Snowden-Papier: Geheimdienste entschlüsseln SIM-Karten | Cyberespionage | CyberSecurity | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Die Geheimdienste der USA und Großbritanniens können offenbar die SIM-Karten in Mobiltelefonen entschlüsseln. Das berichtet die Internetseite "The Intercept". Handys seien somit unauffällig anzapfbar. Der Bericht bezieht sich auf ein Snowden-Papier.


===> Der gläserne Surfer!!! <===


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards



Gust MEES's insight:
Die Geheimdienste der USA und Großbritanniens können offenbar die SIM-Karten in Mobiltelefonen entschlüsseln. Das berichtet die Internetseite "The Intercept". Handys seien somit unauffällig anzapfbar. Der Bericht bezieht sich auf ein Snowden-Papier.


===> Der gläserne Surfer!!! <===


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SIM-Cards



No comment yet.
Scooped by Gust MEES
Scoop.it!

What You Need to Know About Superfish | LENOVO | Adware | CyberSecurity | Ethics

What You Need to Know About Superfish | LENOVO | Adware | CyberSecurity | Ethics | ICT Security-Sécurité PC et Internet | Scoop.it
FAQ about the man-in-the-middle adware installed on Lenovo PCs.



Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


Gust MEES's insight:
FAQ about the man-in-the-middle adware installed on Lenovo PCs.



Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Lenovo's Bundled Adware Comes With A Big Security Problem | Adware | CyberSecurity #Ethics

Lenovo's Bundled Adware Comes With A Big Security Problem | Adware | CyberSecurity #Ethics | ICT Security-Sécurité PC et Internet | Scoop.it

We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought. 


The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO



Gust MEES's insight:

We reported earlier today on Lenovo bundling adware with some of its newer computers, but over the last few hours it’s emerged that the situation is worse than originally thought. 


The software, named Superfish, was pre-installed by Lenovo on some consumer computers. The software injects unwanted advertising into users’ browsers in search results and on third-party websites.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=LENOVO


http://www.scoop.it/t/securite-pc-et-internet/?tag=LENOVO


No comment yet.
Scooped by Gust MEES
Scoop.it!

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage

,Hunting Desert Falcons‘: Kaspersky Lab enttarnt erste arabische Cyberspionagegruppe | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Moskau/lngolstadt, 17. Februar 2015 Kaspersky Lab enttarnt die Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].

Gust MEES's insight:

Cyberspionagegruppe „Desert Falcons“, die sich gegen verschiedene hochrangige Organisationen und Einzelpersonen im Nahen Osten richtet [1]. Damit konnten die IT-Sicherheitsexperten erstmals eine Gruppe von Cybersöldnern aus dem arabischen Raum enttarnen, die offenbar über das komplette Spektrum von Cyberspionagemitteln verfügt.


Die Gruppe startete ihre Aktivitäten bereits im Jahr 2011, seit dem Jahr 2013 werden Rechner infiziert. Den Experten von Kaspersky Lab zufolge erreichte die Kampagne ihren Höhepunkt zu Beginn des Jahres 2015 [2].


No comment yet.
Scooped by Gust MEES
Scoop.it!

Equation-Group: "Höchstentwickelte Hacker der Welt" infizieren u.a. Festplatten-Firmware | Cyberespionage

Equation-Group: "Höchstentwickelte Hacker der Welt" infizieren u.a. Festplatten-Firmware | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it
Seit Jahren, wenn nicht sogar Jahrzehnten treibt eine Gruppe von Cyberangreifern weltweit ihr Unwesen und setzt auf äußerst hochentwickelte Technik, behauptet Kaspersky. Details bereits bekannter Malware impliziert Verbindungen zum US-Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
Seit Jahren, wenn nicht sogar Jahrzehnten treibt eine Gruppe von Cyberangreifern weltweit ihr Unwesen und setzt auf äußerst hochentwickelte Technik, behauptet Kaspersky. Details bereits bekannter Malware impliziert Verbindungen zum US-Geheimdienst NSA.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

HARES Tool Hampers the Reverse-Engineering of Code | CyberSecurity

HARES Tool Hampers the Reverse-Engineering of Code | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
In what could prove to be a revolutionary development in information security, researcher Jacob Torrey will be unveiling the Hardened Anti-Reverse Engineering System (HARES) at several upcoming security conferences, a crypto breakthrough will make reverse engineering code an almost impossible feat.

HARES is a tool that focuses on encrypting code to protect it from being reverse engineered, as the code remains obscured until it is decrypted by the system’s processor at the moment of execution.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES


Gust MEES's insight:

In what could prove to be a revolutionary development in information security, researcher Jacob Torrey will be unveiling the Hardened Anti-Reverse Engineering System (HARES) at several upcoming security conferences, a crypto breakthrough will make reverse engineering code an almost impossible feat.

HARES is a tool that focuses on encrypting code to protect it from being reverse engineered, as the code remains obscured until it is decrypted by the system’s processor at the moment of execution.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=HARES




No comment yet.
Scooped by Gust MEES
Scoop.it!

Un nouveau logiciel espion de la NSA mis au jour | Video | Cyberespionage | Privacy

Un nouveau logiciel espion de la NSA mis au jour | Video | Cyberespionage | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
L'Agence nationale de sécurité américaine (NSA) aurait, selon d'anciens agents du renseignement américain, trouvé le moyen de dissimuler un logiciel espion dans les disques durs fabriqués par les sociétés Western Digital, Seagate, Toshiba et d'autres fabriquants.


Ce procédé signifie que la NSA dispose des moyens de contrôler la majeure partie des ordinateurs dans le monde, affirment-ils à l'agence de presse Reuters.


À regarder absolument la vidéo dans l'article !!!


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:
L'Agence nationale de sécurité américaine (NSA) aurait, selon d'anciens agents du renseignement américain, trouvé le moyen de dissimuler un logiciel espion dans les disques durs fabriqués par les sociétés Western Digital, Seagate, Toshiba et d'autres fabriquants.


Ce procédé signifie que la NSA dispose des moyens de contrôler la majeure partie des ordinateurs dans le monde, affirment-ils à l'agence de presse Reuters.


À regarder absolument la vidéo dans l'article !!!


En savoir plus :


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

No comment yet.
Scooped by Gust MEES
Scoop.it!

A critical flaw in NetGear routers exposes them to cyber attacks | CyberSecurity

A critical flaw in NetGear routers exposes them to cyber attacks | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
The security Expert Peter Adkins discovered a serious Information disclosure vulnerability that affects several Netgear wireless routers.
The researcher Peter Adkins discovered that several wireless routers produced by Netgear are affected by serious vulnerability that could allow an unauthenticated attacker to access sensitive data from the network device.

By exploiting the vulnerability a hacker could also extract administrator passwords, the name and access keys for the wireless networks configured on the device, and details about the device including its model, firmware version and serial number, as explained in a post published on the Full Disclosure mailing list last week.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


Gust MEES's insight:
The security Expert Peter Adkins discovered a serious Information disclosure vulnerability that affects several Netgear wireless routers.
The researcher Peter Adkins discovered that several wireless routers produced by Netgear are affected by serious vulnerability that could allow an unauthenticated attacker to access sensitive data from the network device.


By exploiting the vulnerability a hacker could also extract administrator passwords, the name and access keys for the wireless networks configured on the device, and details about the device including its model, firmware version and serial number, as explained in a post published on the Full Disclosure mailing list last week.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


No comment yet.