ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

LʼActuSécu est un magazine numérique rédigé & édité par les consultants du cabinet de conseil XMCO #CyberSecurity

LʼActuSécu est un magazine numérique rédigé & édité par les consultants du cabinet de conseil XMCO #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

LʼActuSécu est un magazine numérique rédigé et édité par les consultants du cabinet de conseil XMCO. Sa vocation est de fournir des présentations claires et détaillées sur le thème de la sécurité informatique, et ce, en toute indépendance. Tous les numéros de lʼActuSécu sont téléchargeables à lʼadresse suivante :


https://www.xmco.fr/actusecu/

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=XMCO

 

 

Gust MEES's insight:

LʼActuSécu est un magazine numérique rédigé et édité par les consultants du cabinet de conseil XMCO. Sa vocation est de fournir des présentations claires et détaillées sur le thème de la sécurité informatique, et ce, en toute indépendance. Tous les numéros de lʼActuSécu sont téléchargeables à lʼadresse suivante :


https://www.xmco.fr/actusecu/

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=XMCO

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Measures for Digital Service Providers — ENISA | #CyberSecurity #EU #Europe

Security Measures for Digital Service Providers — ENISA | #CyberSecurity #EU #Europe | ICT Security-Sécurité PC et Internet | Scoop.it

ENISA publishes its study on technical guidelines for the implementation of minimum security measures for Digital Service Providers (DSPs).

 

Full report available online

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENISA

 

Gust MEES's insight:

ENISA publishes its study on technical guidelines for the implementation of minimum security measures for Digital Service Providers (DSPs).

 

Full report available online

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENISA

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Verizon: Data Breach Digest [pdf] | #CyberSecurity #CyberCrime 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

Gust MEES's insight:

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity

Gust MEES's insight:

Symantec Intelligence Report January 2015 [pdf] | CyberSecurity


No comment yet.
Scooped by Gust MEES
Scoop.it!

Security-Ratgeber kostenlos als PDF-Download | CyberSecurity | BYOD | eSkills | eLeaderShip

Security-Ratgeber kostenlos als PDF-Download | CyberSecurity | BYOD | eSkills | eLeaderShip | ICT Security-Sécurité PC et Internet | Scoop.it
Anlässlich der vom 16. bis 20. März 2015 stattfindenden IT-Messe Cebit stellt Kaspersky Lab zwei Security-Ratgeber der Dummy-Serie als kostenlosen PDF-Download bereit.
Gust MEES's insight:

Anlässlich der vom 16. bis 20. März 2015 stattfindenden IT-Messe Cebit stellt Kaspersky Lab zwei Security-Ratgeber der Dummy-Serie als kostenlosen PDF-Download bereit.


No comment yet.
Scooped by Gust MEES
Scoop.it!

McAfee Labs Threats report Q4-2013 [PDF]

Gust MEES's insight:


Check it out!!!


Gust MEES's curator insight, March 11, 2014 7:28 PM


Check it out!!!

Scooped by Gust MEES
Scoop.it!

Belgian Cyber-Security Guide [PDF]

Gust MEES's insight:

 

A great guide, check it out!

 

Learn more:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security: madware and malware analysis [pdf]

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Be safe! | Luxembourg for Business [PDF and videos]

Be safe! | Luxembourg for Business [PDF and videos] | ICT Security-Sécurité PC et Internet | Scoop.it
Gust MEES's insight:

 

Check ALSO the videos!!!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

SYMANTEC | Internet Security Threat Report April 2013 [pdf]

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

Gust MEES's insight:

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

Gust MEES's curator insight, April 22, 2013 9:14 AM

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Hackers attack European governments using 'MiniDuke' malware

Hackers attack European governments using 'MiniDuke' malware | ICT Security-Sécurité PC et Internet | Scoop.it
Kaspersky Lab identifies attempt to steal intelligence from countries including Ireland and Romania using Adobe PDF bug. By Josh Halliday
Gust MEES's insight:

                          ===> BEWARE of the MALWARE!!! <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

XMCO-ActuSecu-33-Forensics-Part1 [pdf]

Investigations Forensics


Votre Mac est-il infecté ?


Conférences


Actualité du moment


Retours d’expériences sur plusieurs types d’attaques et les profils des pirates.
10 astuces pour vérifier si votre machine est compromise


Hack.Iu et BRUCon


Analyses de Mini-Flame, de la vulnérabilité «Authentec Protector Suite» et
de l’effacement des téléphones Samsung à distance

 

Gust MEES's insight:

Toujours un MUST et un plaisir à lire...

 

Gust MEES's curator insight, January 18, 2013 11:17 AM

Toujours un MUST et un plaisir à lire..


Scooped by Gust MEES
Scoop.it!

What is Cybersecurity? [PDF] from MIT

What is Cybersecurity?


Explorations in Automated Knowledge Generation

 

Nazli Choucri
Department of Political Science Massachusetts Institute of Technology

 

Gihan Daw Elbait
Masdar Institute of Science and Technology and Massachusetts Institute of Technology

 

Stuart Madnick
Sloan School of Management and Engineering Systems Division Massachusetts Institute of Technology

 

Download:

http://ecir.mit.edu/images/stories/Madnick%20et%20al%20Comparison%20Paper%20for%20ECIR%20workshop%20-%20Fig%201%20also%20FIXED%20v2.pdf

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Insecurity in the Internet of Things | #CyberSecurity #IoT #PDF

Insecurity in the Internet of Things | #CyberSecurity #IoT #PDF | ICT Security-Sécurité PC et Internet | Scoop.it

The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.


To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common ulnerabilities.

 

All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks.

 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

Gust MEES's insight:

The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.


To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common ulnerabilities.

 

All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks.

 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Internet+of+things

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CyberSecurity 2016 | Executive Summary | #Infographic #pdf

CyberSecurity 2016 | Executive Summary | #Infographic #pdf | ICT Security-Sécurité PC et Internet | Scoop.it

2016 was a tense and turbulent year in cyberspace – from the massive IoT botnets and ransomware to targeted cyberespionage attacks, financial theft...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Big Data Security — ENISA

Big Data Security — ENISA | ICT Security-Sécurité PC et Internet | Scoop.it
The study aims at identifying the key security challenges that the companies are facing when implementing Big Data solutions, from infrastructures to analytics applications, and how those are mitigated. The analysis focuses on the use of Big Data by private organisations in given sectors (e.g. Finance, Energy, Telecom). However, more institutions (e.g. research centres, public organisations, and government agencies) have also been considered.

 

https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/big-data-security/at_download/fullReport

 

Gust MEES's insight:
The study aims at identifying the key security challenges that the companies are facing when implementing Big Data solutions, from infrastructures to analytics applications, and how those are mitigated. The analysis focuses on the use of Big Data by private organisations in given sectors (e.g. Finance, Energy, Telecom). However, more institutions (e.g. research centres, public organisations, and government agencies) have also been considered.

 

https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/big-data-security/at_download/fullReport

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Securing the Internet of Things | CyberSecurity | Privacy | pdf

Securing the Internet of Things | CyberSecurity | Privacy | pdf


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

Gust MEES's insight:

Securing the Internet of Things | CyberSecurity | Privacy | pdf


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Detecting Steganographic Content on the Internet [pdf] | Steganography

Detecting Steganographic Content on the Internet [pdf] | Steganography


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Steganography



Gust MEES's insight:

Detecting Steganographic Content on the Internet [pdf] | Steganography


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Steganography



No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Deepweb and Cybercrime [pdf]

Gust MEES's insight:

 

A MUST READ!!!


Gust MEES's curator insight, November 25, 2013 2:51 AM

 

A MUST READ!!!

 

Scooped by Gust MEES
Scoop.it!

Malicious Websites-2013-Threat [Infographic]

Gust MEES's insight:

 

Learn more with Infographics:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Scooped by Gust MEES
Scoop.it!

Be Safe! A Practical Guide for Business Travel [PDF download]

Be Safe! A Practical Guide for Business Travel [PDF download] | ICT Security-Sécurité PC et Internet | Scoop.it
Gust MEES's insight:

 

Here is the download link for the PDF:

 

http://t.co/NfMt4PT3MJ

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacker greifen Regierungscomputer an

Hacker greifen Regierungscomputer an | ICT Security-Sécurité PC et Internet | Scoop.it
Hacker haben Dutzende Computersysteme von Regierungen in Europa angegriffen. Auch luxemburgische Regierungsstellen sind von den Hacker-Angriffen betroffen.
Gust MEES's insight:
Hacker haben Dutzende Computersysteme von Regierungen in Europa angegriffen. Auch luxemburgische Regierungsstellen sind von den Hacker-Angriffen betroffen.

 

Gust MEES's curator insight, February 27, 2013 1:40 PM
Hacker haben Dutzende Computersysteme von Regierungen in Europa angegriffen. Auch luxemburgische Regierungsstellen sind von den Hacker-Angriffen betroffen.

 

Scooped by Gust MEES
Scoop.it!

Vulnérabilité extrêmement critique dans Adobe Reader et Acrobat - Cases

Vulnérabilité extrêmement critique dans Adobe Reader et Acrobat -  Cases | ICT Security-Sécurité PC et Internet | Scoop.it

Versions du document

 

14 février 2013: Publication intitiale

 

Description / Résumé

 

Une faille extrêmement critique a été détectée dans Adobe Reader et Acrobat. Découverte par les spécialistes au travers d’un document piégé sur Internet, elle est actuellement exploitée activement par des fraudeurs et  représente pour cette raison un risque pour l’utilisateur.


Le simple fait d’ouvrir à l’aide d’un logiciel d’Adobe un fichier PDF spécialement conçu suffit à exploiter cette vulnérabilité. Ceci vaut également pour les ajouts de navigateur installés automatiquement, rendant ainsi la consultation de pages web tout aussi hasardeuse.


En exploitant la faille,  l'attaquant peut prendre le contrôle de l’ordinateur de sa victime.

 

Gust MEES's insight:

                          ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Proactive detection of security incidents II - Honeypots | ENISA

An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets. Honeypots are powerful tools that can be used to achieve this goal. This document is the final report of the ‘Proactive Detection of Security Incidents: Honeypots’ study.  

Publication date: Nov 22, 2012

No comment yet.