ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

MasterCard and Visa payment processor compromised, up to 10 million cards stolen

MasterCard and Visa payment processor compromised, up to 10 million cards stolen | ICT Security-Sécurité PC et Internet | Scoop.it
Over 10 million credit cards may have been stolen by criminals who compromised a credit card processing company last month. Read on to find out what happened and what actions you may wish to take t...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac backdoor Trojan embedded inside boobytrapped Word documents

Mac backdoor Trojan embedded inside boobytrapped Word documents | ICT Security-Sécurité PC et Internet | Scoop.it
A backdoor Trojan horse, which would allow a remote hacker to access your Mac computer without your knowledge and potentially snoop on your files and activity, has been discovered hidden inside a b...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Topless supermodel photos used to spread Mac malware

Topless supermodel photos used to spread Mac malware | ICT Security-Sécurité PC et Internet | Scoop.it
The Mac Imuler Trojan uses images of FHM supermodel Irina Shayk to do its dirty work.

 

Somehow I doubt that Mac users are any smarter than their Windows cousins when it comes to resisting temptation.

 

We're all human, after all. And there is a (probably significant) proportion of the population which isn't adverse to searching the web for nude pictures of supermodels.

 

Of course, the bad guys who spread malware know about human weakness all too well - and exploit it regularly to trick computer users into clicking on files and installing malicious code that exposes them to risks.

 

===> By default, Mac OS X doesn't display file extensions. Which means, that Mac users might be duped into believing that the file they are about to click on is a JPG image, rather than an application. <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyberwar: hype or reality?

Cyberwar: hype or reality? | ICT Security-Sécurité PC et Internet | Scoop.it
Is "cyberwar" really upon us? Is a "digital Pearl Harbour" imminent? And is an international agreement on "cyberarms" a plausible solution?
No comment yet.
Scooped by Gust MEES
Scoop.it!

Smartphone apps are sending your data to China | Naked Security

Smartphone apps are sending your data to China | Naked Security | ICT Security-Sécurité PC et Internet | Scoop.it
A Sunday Times report found that many smartphone apps are collecting too much personal data and then sending it outside the EU to the US, Israel, China and India.

 

 

 

===> But do these countries meet EU data protection standards? <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Bring your own: practical advice for handling BYOD

Bring your own: practical advice for handling BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?". So how do you respond?
No comment yet.
Scooped by Gust MEES
Scoop.it!

Check your Twitter account for rogue applications

Check your Twitter account for rogue applications | ICT Security-Sécurité PC et Internet | Scoop.it
If you're careless about what applications you allow to access your Twitter account, don't be surprised if you find the bad guys are spamming tweets out in your name without your permission.

 

Here's just a small sample of the messages we saw earlier today, claiming to link to free iPhone 4 offers or tools to help you find out who had unfollowed your Twitter account.

 

Some of the messages posted from innocent users' Twitter accounts have claimed that it's easy to get your hands on a free iPhone 4:

 

===> Read more...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft and US Marshals bring down Zeus botnet servers [VIDEO]

Microsoft and US Marshals bring down Zeus botnet servers [VIDEO] | ICT Security-Sécurité PC et Internet | Scoop.it
Microsoft, working with others in the financial services and computer security industry, has disrupted a number of botnets being used by the Zeus malware family, allegedly responsible for nearly ha...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Is online privacy a right or a privilege?

Is online privacy a right or a privilege? | ICT Security-Sécurité PC et Internet | Scoop.it
ENISA conducted some research to examine the economic dimension of privacy. Put simply: would you pay a bit extra for additional privacy?
No comment yet.
Scooped by Gust MEES
Scoop.it!

Anonymous OS – you’d be crazy to trust it

Anonymous OS – you’d be crazy to trust it | ICT Security-Sécurité PC et Internet | Scoop.it
Proceed with caution if you're thinking of downloading and installing Anonymous OS, the purported new operating system from the Anonymous collective.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Suspected Anonymous hacker arrested after abortion website attack | Naked Security

Suspected Anonymous hacker arrested after abortion website attack | Naked Security | ICT Security-Sécurité PC et Internet | Scoop.it
Police have arrested a 27-year-old man, suspected of defacing and hacking into the website of Britain's largest single abortion provider.
No comment yet.