ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

New Linux rootkit leverages graphics cards for stealth | Awareness | Nobody Is Perfect

New Linux rootkit leverages graphics cards for stealth | Awareness | Nobody Is Perfect | ICT Security-Sécurité PC et Internet | Scoop.it
The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory


A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.


The rootkit, called Jellyfish, is a proof of concept designed to demonstrate that completely running malware on GPUs (graphics processing units) is a viable option. This is possible because dedicated graphics cards have their own processors and RAM.


Such threats could be more sinister than traditional malware programs, according to the Jellyfish developers. For one, there are no tools to analyze GPU malware, they said.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


Gust MEES's insight:
The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory


A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden.


The rootkit, called Jellyfish, is a proof of concept designed to demonstrate that completely running malware on GPUs (graphics processing units) is a viable option. This is possible because dedicated graphics cards have their own processors and RAM.


Such threats could be more sinister than traditional malware programs, according to the Jellyfish developers. For one, there are no tools to analyze GPU malware, they said.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux



No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Learning basics of Cybersecurity with fun videos: passwords

A scene from the movie "Spaceballs" (MGM, 1987). I use it to educate people to choose better "combinations" aka passwords. The scene has been slightly edited...

 

==========================================

 

Gust MEES

 

Check also my FREE courses here:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

http://gustmees.wordpress.com/2012/05/04/get-smart-with-5-minutes-tutorialsit-securitypart-4-surf-more-secure-which-web-sites-to-trust/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

==========================================

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Learning basic IT-Security visually + with music: Ich bin online

Im Rahmen einer Präventionsmaßnahme zur Online Sicherheit des LKA Sachsen-Anhalt ist dieses Lied/Video entstanden.
Neben der ehem. angelas park Sängerin und Udo Lindenberg Panikpreisträgerin, ist im Video die Band in my days zu sehen.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Unpatched systems and apps on the rise

Unpatched systems and apps on the rise | ICT Security-Sécurité PC et Internet | Scoop.it

As the number of software vulnerabilities increases, and people connect across personal and corporate devices using a multitude of different platforms each day, time and time again, patch management has proven to be one of the most effective practice users can take in securing their PCs.


Learn more:


http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


Gust MEES's insight:

As the number of software vulnerabilities increases, and people connect across personal and corporate devices using a multitude of different platforms each day, time and time again, patch management has proven to be one of the most effective practice users can take in securing their PCs.


Learn more:


http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Learning basics of IT-Security: A day in the life of IT security

Find out how IT security take back control of the endpoint in this animation Learn more about Endpoint Control, the issues affecting organisations and how yo...

 

=============================================

 

Gust MEES

Read also my FREE courses here:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

=============================================

 

Melf's curator insight, April 18, 2014 9:13 AM

Here you see some facts about how companies lack in security.

Some points like file sharing and getting worms are a really big issue. If there is no protection against that the company may be in danger. If all people have about 3 devices and they arent protected, you cant stop this.

Melf's curator insight, April 25, 2014 9:02 AM

I think that people should pay more attention to this because there are more victims every day. Not only persons but also companies could get trouble with not paying attention to your data.

Melf's curator insight, April 25, 2014 9:07 AM

Im very afraid of losing data myself. I saw a commercial once that someone took over the identity of another person. I hope that people pay more attention and try to be more safe in the future.