ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Windows Meltdown-Spectre patches: If you haven't got them, blame your antivirus | #CyberSecurity #NobodyIsPerfect #Awareness

Windows Meltdown-Spectre patches: If you haven't got them, blame your antivirus | #CyberSecurity #NobodyIsPerfect #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Microsoft has warned users that its patches for the dangerous Meltdown CPU bug won't reach them if their third-party antivirus hasn't been updated to support this week's Windows security update.

By now Windows users should have received the patches Microsoft released yesterday to plug the widespread Meltdown bug and its companion Spectre, which expose most computers and phones to speculative execution side-channel attacks that affect chips from Intel, AMD, and Arm.

Microsoft released software updates for Internet Explorer, Microsoft Edge, Windows, and SQL Server, but customers will also need to apply firmware updates from their respective hardware vendors too.

Surface and Surface Book users can expect an automatic firmware update from Microsoft but those with other hardware will need to check with their vendors.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Meltdown+and+Spectre+Attacks

 

Gust MEES's insight:
Microsoft has warned users that its patches for the dangerous Meltdown CPU bug won't reach them if their third-party antivirus hasn't been updated to support this week's Windows security update.

By now Windows users should have received the patches Microsoft released yesterday to plug the widespread Meltdown bug and its companion Spectre, which expose most computers and phones to speculative execution side-channel attacks that affect chips from Intel, AMD, and Arm.

Microsoft released software updates for Internet Explorer, Microsoft Edge, Windows, and SQL Server, but customers will also need to apply firmware updates from their respective hardware vendors too.

Surface and Surface Book users can expect an automatic firmware update from Microsoft but those with other hardware will need to check with their vendors.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=Meltdown+and+Spectre+Attacks

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Avast to buy AVG in $1.3B antivirus acquisition

Avast to buy AVG in $1.3B antivirus acquisition | ICT Security-Sécurité PC et Internet | Scoop.it

The goal: get bigger to get tougher on malware, with your devices acting as "de facto sensors".

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

Gust MEES's insight:

The goal: get bigger to get tougher on malware, with your devices acting as "de facto sensors".

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Les antivirus Eset touchés par une grosse faille de sécurité | CyberSecurity

Les antivirus Eset touchés par une grosse faille de sécurité | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Une faille critique a récemment été découverte dans de nombreux produits antivirus Eset. La vulnérabilité, corrigée en début de semaine, pourrait permettre à des attaquants de compromettre tout un tas de systèmes complets mais aussi des sites web, courriels, clés USB et autres.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Eset



Gust MEES's insight:

Une faille critique a récemment été découverte dans de nombreux produits antivirus Eset. La vulnérabilité, corrigée en début de semaine, pourrait permettre à des attaquants de compromettre tout un tas de systèmes complets mais aussi des sites web, courriels, clés USB et autres.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Eset




No comment yet.
Scooped by Gust MEES
Scoop.it!

Kaspersky software reverse engineered by NSA, GCHQ: Report | Cyberespionage

Kaspersky software reverse engineered by NSA, GCHQ: Report | Cyberespionage | ICT Security-Sécurité PC et Internet | Scoop.it

Edward Snowden, the former NSA contractor and whistleblower, has leaked documents that claim the US National Security Agency (NSA) and UK Government Communications Headquarters (GCHQ) have actively reverse engineered security and anti-virus software to obtain intelligence, according to a report by The Intercept.

The documents obtained reportedly highlight the Russian software security firm, Kaspersky Lab, as one of the main targets, with GCHQ reverse-engineering Kaspersky's anti-virus software looking for vulnerabilities that could be subverted.

The Intercept posted an NSA document titled "Project Camberdada" that lists at least 23 antivirus and security firms that were in that spy agency's sights -- none of the companies were of U.K. or U.S. origin, but there was more than one firm from the country in which Snowden now calls home.

Earlier this month, Eugene Kaspersky said in a blog post that his firm had recently discovered an advanced attack on its software. The security mogul said that his company was quite confident that there was a nation state behind the attack, but made it clear that he did not wish to attribute it.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage


Gust MEES's insight:

Edward Snowden, the former NSA contractor and whistleblower, has leaked documents that claim the US National Security Agency (NSA) and UK Government Communications Headquarters (GCHQ) have actively reverse engineered security and anti-virus software to obtain intelligence, according to a report by The Intercept.

The documents obtained reportedly highlight the Russian software security firm, Kaspersky Lab, as one of the main targets, with GCHQ reverse-engineering Kaspersky's anti-virus software looking for vulnerabilities that could be subverted.

The Intercept posted an NSA document titled "Project Camberdada" that lists at least 23 antivirus and security firms that were in that spy agency's sights -- none of the companies were of U.K. or U.S. origin, but there was more than one firm from the country in which Snowden now calls home.

Earlier this month, Eugene Kaspersky said in a blog post that his firm had recently discovered an advanced attack on its software. The security mogul said that his company was quite confident that there was a nation state behind the attack, but made it clear that he did not wish to attribute it.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberespionage


No comment yet.
Scooped by Gust MEES
Scoop.it!

AV engines are riddled with exploitable bugs

AV engines are riddled with exploitable bugs | ICT Security-Sécurité PC et Internet | Scoop.it
A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, pro...


Most (if not all...) antivirus engines run with the highest privileges: root or local system," he noted. "If one can find a bug and write an exploit for the AV engine, (s)he just won root or system privileges."

Finally, most AVs get updates via HTTP only protocols, which could lead to man-in-the-middle attacks that deliver malware instead of updates.





Gust MEES's insight:

Most (if not all...) antivirus engines run with the highest privileges: root or local system," he noted. "If one can find a bug and write an exploit for the AV engine, (s)he just won root or system privileges."

Finally, most AVs get updates via HTTP only protocols, which could lead to man-in-the-middle attacks that deliver malware instead of updates.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Design-Fehler macht namhafte Antivirenlösungen angreifbar | #CyberSecurity #Awareness

Design-Fehler macht namhafte Antivirenlösungen angreifbar | #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Der Sicherheitsforscher Florian Bogner, der für den österreichischen IT-Dienstleister Kapsch arbeitet, hat einen Fehler in Antivirenlösungen verschiedener Hersteller gefunden, der diese Produkte unter Umständen unbrauchbar macht. Demnach ist es möglich, bereits erkannte Schadsoftware an den Sicherheitsanwendungen vorbei aus der Quarantäne zu holen und auszuführen. Der von ihm als AVGater bezeichnete Fehler betrifft demnach unter anderem Check Point, Emisoft, Ikarus, Kaspersky Lab, Malwarebytes, Trend Micro und Zone Alarm.

Allerdings muss ein Angreifer lokalen Zugriff auf das System haben, wie Bleeping Computer berichtet. Administratorrechte benötigt er jedoch nicht – ein Konto mit eingeschränkten Nutzerrechten ist vollkommen ausreichend. Die für die Ausführung der Malware benötigten höheren Rechte erhält der Angreifer später automatisch von der Antivirensoftware.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=antivirus

 

Gust MEES's insight:
Der Sicherheitsforscher Florian Bogner, der für den österreichischen IT-Dienstleister Kapsch arbeitet, hat einen Fehler in Antivirenlösungen verschiedener Hersteller gefunden, der diese Produkte unter Umständen unbrauchbar macht. Demnach ist es möglich, bereits erkannte Schadsoftware an den Sicherheitsanwendungen vorbei aus der Quarantäne zu holen und auszuführen. Der von ihm als AVGater bezeichnete Fehler betrifft demnach unter anderem Check Point, Emisoft, Ikarus, Kaspersky Lab, Malwarebytes, Trend Micro und Zone Alarm.

Allerdings muss ein Angreifer lokalen Zugriff auf das System haben, wie Bleeping Computer berichtet. Administratorrechte benötigt er jedoch nicht – ein Konto mit eingeschränkten Nutzerrechten ist vollkommen ausreichend. Die für die Ausführung der Malware benötigten höheren Rechte erhält der Angreifer später automatisch von der Antivirensoftware.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/securite-pc-et-internet/?&tag=antivirus

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Critical flaw in ESET products shows why spy groups are interested in antivirus programs | CyberSecurity

Critical flaw in ESET products shows why spy groups are interested in antivirus programs | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
The flaw could allow attackers to fully compromise systems via websites, email, USB drives and other methods.




Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Eset

Gust MEES's insight:
The flaw could allow attackers to fully compromise systems via websites, email, USB drives and other methods.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Eset


No comment yet.
Scooped by Gust MEES
Scoop.it!

Anti-Viren-Software: Fehler in NOD32-Scanner erlaubte kompletten Systemzugriff | CyberSecurity

Anti-Viren-Software: Fehler in NOD32-Scanner erlaubte kompletten Systemzugriff | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Über eine Schwachstelle im Virenscanner von Esets Anti-Viren-Programm NOD32 konnten sich Angreifer vollständigen Zugriff auf ein System verschaffen. Die Schwachstelle wurde inzwischen behoben.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Eset


Gust MEES's insight:

Über eine Schwachstelle im Virenscanner von Esets Anti-Viren-Programm NOD32 konnten sich Angreifer vollständigen Zugriff auf ein System verschaffen. Die Schwachstelle wurde inzwischen behoben.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Eset




No comment yet.
Scooped by Gust MEES
Scoop.it!

Revealed: The anti-virus vendor cheating in independent tests

Revealed: The anti-virus vendor cheating in independent tests | ICT Security-Sécurité PC et Internet | Scoop.it
As one anti-virus vendor is named for cheating in independent detection tests, another is said to be in the spotlight for deliberately manipulating performance tests - and potentially introducing a security risk.
Gust MEES's insight:

As one anti-virus vendor is named for cheating in independent detection tests, another is said to be in the spotlight for deliberately manipulating performance tests - and potentially introducing a security risk.


No comment yet.