ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Researchers Leverage ChatGPT to Expose Notorious macOS Malware

Researchers Leverage ChatGPT to Expose Notorious macOS Malware | ICT Security-Sécurité PC et Internet | Scoop.it

Russian hackers and cybercrime forums are notorious for exploiting critical infrastructure. Last month, Hackread.com exclusively reported that a Russian-speaking threat actor was selling access to a US military satellite. Now, researchers have identified macOS malware being sold for $60,000.

 

 
 
 
 
Gust MEES's insight:

Russian hackers and cybercrime forums are notorious for exploiting critical infrastructure. Last month, Hackread.com exclusively reported that a Russian-speaking threat actor was selling access to a US military satellite. Now, researchers have identified macOS malware being sold for $60,000.

 

 
 
 
 
No comment yet.
Scooped by Gust MEES
Scoop.it!

Electric vehicle charging stations 'easy' to attack, says new research | #CyberSecurity 

Electric vehicle charging stations 'easy' to attack, says new research | #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it

How much do you know about the electric charging station where you plug in your electric vehicle?

New research at the University of Windsor is looking at security vulnerabilities of charging stations — not only could your payment information be stolen, but the electricity grid could be compromised too. 

Mitra Mirhassani, an engineering professor, said not enough is being done when it comes to security of these stations. 

"Most of the charging stations are placed wherever a company sees convenient," said Mirhassani. "These can be insecure roads and parking lots. Everyone seems to forget they are connected to infrastructure — to the energy grid."

Electric vehicle society 'encouraged' by approval of new charging locations
City of Windsor wants to add 11 dual-port electric vehicle charging stations
Mirhassani said if there was to be an attack on that energy infrastructure, there would be a lot of issues that couldn't be fixed quickly. 

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Cars

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

Gust MEES's insight:

How much do you know about the electric charging station where you plug in your electric vehicle?

New research at the University of Windsor is looking at security vulnerabilities of charging stations — not only could your payment information be stolen, but the electricity grid could be compromised too. 

Mitra Mirhassani, an engineering professor, said not enough is being done when it comes to security of these stations. 

"Most of the charging stations are placed wherever a company sees convenient," said Mirhassani. "These can be insecure roads and parking lots. Everyone seems to forget they are connected to infrastructure — to the energy grid."

Electric vehicle society 'encouraged' by approval of new charging locations
City of Windsor wants to add 11 dual-port electric vehicle charging stations
Mirhassani said if there was to be an attack on that energy infrastructure, there would be a lot of issues that couldn't be fixed quickly. 

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Cars

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=GRID

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Virenwächter machtlos: AtomBombing knackt jedes Windows | #CyberSecurity #Awareness

Virenwächter machtlos: AtomBombing knackt jedes Windows | #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

Forscher entwickeln eine Methode, mit der sie bei jeder Windows-Version alle Sicherheitsmechanismen überwinden können. Auch die besten Virenwächter bemerken davon nichts und Microsft kann nichts dagegen unternehmen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=AtomBombing

 

Gust MEES's insight:

Forscher entwickeln eine Methode, mit der sie bei jeder Windows-Version alle Sicherheitsmechanismen überwinden können. Auch die besten Virenwächter bemerken davon nichts und Microsft kann nichts dagegen unternehmen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=AtomBombing

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers find more than 100 Tor nodes that are snooping on users | #CyberSecurity #Privacy #Awareness

Researchers find more than 100 Tor nodes that are snooping on users | #CyberSecurity #Privacy #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it

Tor, or “The Onion Router” as it was originally known, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian governments, and people who are just up to some shady stuff. While Tor is still the most robust form of online anonymity we have, it’s not bulletproof as the repeated takedown of The Silk Road and other law enforcement actions have shown. Now, two computer scientists say they’ve uncovered snoops inside the Tor network that may be listening in on what you’re doing.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet?q=tor

 

Gust MEES's insight:

Tor, or “The Onion Router” as it was originally known, is used around the world as an anonymity network. It provides a private method of communication for journalists, those living under authoritarian governments, and people who are just up to some shady stuff. While Tor is still the most robust form of online anonymity we have, it’s not bulletproof as the repeated takedown of The Silk Road and other law enforcement actions have shown. Now, two computer scientists say they’ve uncovered snoops inside the Tor network that may be listening in on what you’re doing.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet?q=tor

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

EU-Kommission will Forschung gegen Cyberkriminalität vorantreiben | #CyberCrime #Research 

EU-Kommission will Forschung gegen Cyberkriminalität vorantreiben | #CyberCrime #Research  | ICT Security-Sécurité PC et Internet | Scoop.it
Die EU-Kommission will sich im Kampf gegen Cyberkriminalität besser rüsten und in die Grundlagenforschung investieren. Mehr als hundert Unternehmen wollen sich an dem Programm beteiligen. Es gehe um zivile Anwendungen, heißt es.

 

Gust MEES's insight:

Die EU-Kommission will sich im Kampf gegen Cyberkriminalität besser rüsten und in die Grundlagenforschung investieren. Mehr als hundert Unternehmen wollen sich an dem Programm beteiligen. Es gehe um zivile Anwendungen, heißt es.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Research: Powerful cyber attack tools widely available

Research: Powerful cyber attack tools widely available | ICT Security-Sécurité PC et Internet | Scoop.it
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists.

 

“Organisations must have a plan for dealing with infections and data breaches; they can’t just say this is an issue that doesn’t affect me. Any company that stores data is a potential target,” said Aharoni.

 

It is now in the open that countries are using malware as part of their cyber espionage programmes, and he believes companies should be planning their cyber security in light of that fact.

 

Read more:

http://www.computerweekly.com/news/2240162578/Powerful-cyber-attack-tools-widely-available-say-researchers

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers jailbreak AI chatbots like ChatGPT, Claude

Researchers jailbreak AI chatbots like ChatGPT, Claude | ICT Security-Sécurité PC et Internet | Scoop.it

Researchers jailbreak AI chatbots, including ChatGPT
Like a magic wand that turns chatbots evil.

 

 
 
 
 
Gust MEES's insight:

Researchers jailbreak AI chatbots, including ChatGPT
Like a magic wand that turns chatbots evil.

 

 
 
 
 
No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers exploit unencrypted radio to hack wireless mice, keyboards | #CyberSecurity #Research #Awareness

Researchers exploit unencrypted radio to hack wireless mice, keyboards | #CyberSecurity #Research #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Two researchers have demonstrated that an attacker can hack unencrypted radio communication to seize control of many leading wireless keyboards and mice.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Wireless

 

Gust MEES's insight:
Two researchers have demonstrated that an attacker can hack unencrypted radio communication to seize control of many leading wireless keyboards and mice.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Wireless

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researcher believes major DDoS attacks part of military recon to shut down internet | #CybertSecurity #CyberWar

Researcher believes major DDoS attacks part of military recon to shut down internet | #CybertSecurity #CyberWar | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.

The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defenses to determine how well they can protect themselves, according to a Sept. 13 blog post.

Schneier said he is unable to give details concerning which companies were targeted because he spoke with the companies under anonymity, but said the attack rate has increased in the last two years and that his findings are supported by a Verisign DDoS trends report.

Schneier told SCMagazine.com he believes the attacks are part a foreign cyber organization doing military recon activities.

 

Learn mor / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

Gust MEES's insight:
Security researcher Bruce Schneier spotted a series of DDoS attacks which may be part of a larger effort to learn how to take down the internet on a national or even global scale.

The attacks targeted major companies that provide the basic infrastructure for the internet and the incidents seem to appear to have probed the companies' defenses to determine how well they can protect themselves, according to a Sept. 13 blog post.

Schneier said he is unable to give details concerning which companies were targeted because he spoke with the companies under anonymity, but said the attack rate has increased in the last two years and that his findings are supported by a Verisign DDoS trends report.

Schneier told SCMagazine.com he believes the attacks are part a foreign cyber organization doing military recon activities.

 

Learn mor / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwarfare

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberwar...

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

MIT researchers unveil new anonymity scheme that could rival Tor | #Privacy 

MIT researchers unveil new anonymity scheme that could rival Tor | #Privacy  | ICT Security-Sécurité PC et Internet | Scoop.it
In response to the disclosure of vulnerabilities in Tor's design, researchers at MIT have created Riffle, a system that allegedly provides better security and uses bandwidth more efficiently.

 

Gust MEES's insight:

In response to the disclosure of vulnerabilities in Tor's design, researchers at MIT have created Riffle, a system that allegedly provides better security and uses bandwidth more efficiently.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

IBM Watson im Kampf gegen Cyber-Kriminelle | #Research #CyberCrime #CyberSecurity #InfoSec 

IBM Watson im Kampf gegen Cyber-Kriminelle | #Research #CyberCrime #CyberSecurity #InfoSec  | ICT Security-Sécurité PC et Internet | Scoop.it
Viele IT-Sicherheitsverantwortliche sind überfordert mit der Bewältigung der ständig steigenden Datenflut. Die Identifizierung von Sicherheitslücken wird dabei oft zur Suche nach der berühmten Stecknadel im Heuhaufen", sagt Gerd Rademann, Business Unit Executive Security Systems, IBM DACH. "Wir setzen daher auf den Einsatz von kognitiven Watson-Technologien, um Cyber-Kriminalität künftig noch effektiver zu bekämpfen. Das lernende System kann sehr große Datenmengen in Echtzeit verarbeiten und analysieren, schnell Muster und Anomalien erkennen und in einem weiteren Schritt auch Empfehlungen für denkbare Abwehrstrategien geben", führt er weiter aus.

 

Gust MEES's insight:
Viele IT-Sicherheitsverantwortliche sind überfordert mit der Bewältigung der ständig steigenden Datenflut. Die Identifizierung von Sicherheitslücken wird dabei oft zur Suche nach der berühmten Stecknadel im Heuhaufen", sagt Gerd Rademann, Business Unit Executive Security Systems, IBM DACH. "Wir setzen daher auf den Einsatz von kognitiven Watson-Technologien, um Cyber-Kriminalität künftig noch effektiver zu bekämpfen. Das lernende System kann sehr große Datenmengen in Echtzeit verarbeiten und analysieren, schnell Muster und Anomalien erkennen und in einem weiteren Schritt auch Empfehlungen für denkbare Abwehrstrategien geben", führt er weiter aus.

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Innovative Technologies and Developments as also discoveries, curiosity ( insolite)...
Scoop.it!

Les cyber-risques, tout le monde en parle enfin !

Les cyber-risques, tout le monde en parle enfin ! | ICT Security-Sécurité PC et Internet | Scoop.it

La médiatisation a néanmoins favorisé la prise de conscience des dangers liés à ces nouvelles technologies et l'émergence de solutions.

 

Il est désormais possible de faire surveiller son réseau informatique comme on fait surveiller ses locaux et d'intervenir en temps réel pour se protéger des malveillances détectées. Il est également devenu possible de s'assurer contre les conséquences financières de ces intrusions et malveillances.

 

Plusieurs assureurs proposent depuis peu des contrats spécifiques pour garantir les cyber-risques.

 

Cependant tant la nature des garanties, que leur montant et les primes sont très dépendants du niveau de prévention mis en place par l'entreprise.

No comment yet.