ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Plus de vulnérabilités chez Apple et Adobe que chez Microsoft en 2017 | #CyberSecurity

Plus de vulnérabilités chez Apple et Adobe que chez Microsoft en 2017 | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Pour 2017, Trend Micro prévoit que les cybercriminels intensifieront leurs attaques à partir des vulnérabilités logicielles d'Adobe et Apple.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

Gust MEES's insight:
Pour 2017, Trend Micro prévoit que les cybercriminels intensifieront leurs attaques à partir des vulnérabilités logicielles d'Adobe et Apple.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacker knacken Googles Smartphone Pixel, Safari, Edge | #CyberSecurity #Google #Apple #Microsoft

Hacker knacken Googles Smartphone Pixel, Safari, Edge | #CyberSecurity #Google #Apple #Microsoft | ICT Security-Sécurité PC et Internet | Scoop.it
Zwei Tage lang demonstrierten Hacker in Seoul auf dem "PwnFest" diverse Schwachstellen verbreiteter Software, darunter der Browser Edge und Safari. Auch VMWare Workstations und das Google Pixel wurden geknackt.

Im Rahmen des Hacker-Events "PwnFest 2016" haben Teilnehmer am vergangenen Donnerstag jeweils gleich zweimal Sicherheitsprobleme bei Microsoft Edge unter Windows 10 (Red Stone 1) und von VMWare Workstation 12.5.1 demonstriert. Am Freitag knackte ein chinesisches Hacker-Team dann auch Googles Smartphone Pixel mit Android 7/Nougat und zeigten Sicherheitslücken in Apples Browser Safari unter macOS Sierra auf. Das zweitägige Hackerfestival PwnFest fand im Rahmen der "Power of Community"-Sicherheitskonferenz in Seoul statt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

Gust MEES's insight:
Zwei Tage lang demonstrierten Hacker in Seoul auf dem "PwnFest" diverse Schwachstellen verbreiteter Software, darunter der Browser Edge und Safari. Auch VMWare Workstations und das Google Pixel wurden geknackt.

Im Rahmen des Hacker-Events "PwnFest 2016" haben Teilnehmer am vergangenen Donnerstag jeweils gleich zweimal Sicherheitsprobleme bei Microsoft Edge unter Windows 10 (Red Stone 1) und von VMWare Workstation 12.5.1 demonstriert. Am Freitag knackte ein chinesisches Hacker-Team dann auch Googles Smartphone Pixel mit Android 7/Nougat und zeigten Sicherheitslücken in Apples Browser Safari unter macOS Sierra auf. Das zweitägige Hackerfestival PwnFest fand im Rahmen der "Power of Community"-Sicherheitskonferenz in Seoul statt.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

1.5 billion Windows computers potentially affected by unpatched 0-day exploit | #CyberSecurity #Awareness

1.5 billion Windows computers potentially affected by unpatched 0-day exploit | #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Information security bods at Trustwave have found a zero-day exploit affecting all versions of Microsoft's OS Windows, all the way from Windows 2000 up to a fully patched version of Windows 10 including all server editions. 

It estimates that this affects 1.5 billion computers around the world.

The company provides threat intelligence services and regularly monitors several forums, and it is through this it discovered the exploit which was found on a Russian speaking forum and is currently being offered for sale for £62,000 ($US 90,000).

Trustwave cautioned that there is currently no fix for the exploit and has recommended Windows users stay vigilant for phishing emails. In addition, it has also issued a more general warning about the rise of malware-as-a-service (MaaS). 

Ziv Mador, VP of security research at Trustwave, told SCMagazineUK.com, “This is a very serious exploit. From what we've seen in the past, exploits of this type tend to have somewhere in the region of a 10 percent success rate which spells bad news all around.”

According Trustwave, Microsoft has been notified of the zero day offering and is continuing to monitor the situation.

 

Gust MEES's insight:

Information security bods at Trustwave have found a zero-day exploit affecting all versions of Microsoft's OS Windows, all the way from Windows 2000 up to a fully patched version of Windows 10 including all server editions. 

It estimates that this affects 1.5 billion computers around the world.

The company provides threat intelligence services and regularly monitors several forums, and it is through this it discovered the exploit which was found on a Russian speaking forum and is currently being offered for sale for £62,000 ($US 90,000).

Trustwave cautioned that there is currently no fix for the exploit and has recommended Windows users stay vigilant for phishing emails. In addition, it has also issued a more general warning about the rise of malware-as-a-service (MaaS). 

Ziv Mador, VP of security research at Trustwave, told SCMagazineUK.com, “This is a very serious exploit. From what we've seen in the past, exploits of this type tend to have somewhere in the region of a 10 percent success rate which spells bad news all around.”

According Trustwave, Microsoft has been notified of the zero day offering and is continuing to monitor the situation.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Angler Exploit Kit updated to target PCs and Macs with Silverlight attack | CyberCrime | CyberSecurity

Angler Exploit Kit updated to target PCs and Macs with Silverlight attack | CyberCrime | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
PC and Mac users are being advised to ensure that their computers are updated with the latest security patches, following the discovery that the notorious Angler exploit kit is taking advantage of a known vulnerability in Microsoft’s Silverlight technology.

Silverlight, Microsoft’s attempt to rival Adobe Flash, is an application and browser plugin that allows PC and Mac users to watch online media content.

According to security blogger Kafeine, a recently updated version of the Angler exploit kit has been spotted taking advantage of a critical remote code execution Silverlight vulnerability that Microsoft patched in January.

At the time, Microsoft explained that the vulnerability (known as CVE-2016-0034) could allow hackers to infect vulnerable PCs and Macs without requiring any user interaction. All that would be required would be for a victim to visit a website harbouring a boobytrapped Silverlight application


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's insight:
PC and Mac users are being advised to ensure that their computers are updated with the latest security patches, following the discovery that the notorious Angler exploit kit is taking advantage of a known vulnerability in Microsoft’s Silverlight technology.

Silverlight, Microsoft’s attempt to rival Adobe Flash, is an application and browser plugin that allows PC and Mac users to watch online media content.

According to security blogger Kafeine, a recently updated version of the Angler exploit kit has been spotted taking advantage of a critical remote code execution Silverlight vulnerability that Microsoft patched in January.

At the time, Microsoft explained that the vulnerability (known as CVE-2016-0034) could allow hackers to infect vulnerable PCs and Macs without requiring any user interaction. All that would be required would be for a victim to visit a website harbouring a boobytrapped Silverlight application


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft to disable most Flash content in its Edge browser | #CyberSecurity

Microsoft to disable most Flash content in its Edge browser | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Following in the footsteps of other major browser makers, Microsoft announced plans to enable Click-to-Run functionality for Flash-based content in the next public release of its default web browser for Windows 10.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Flash-Player-Vulnerabilities

 

Gust MEES's insight:
Following in the footsteps of other major browser makers, Microsoft announced plans to enable Click-to-Run functionality for Flash-based content in the next public release of its default web browser for Windows 10.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Flash-Player-Vulnerabilities

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft: No More Pick-and-Choose Patching | #CyberSecurity #Updates #Responsibility #eSkills #ICT

Microsoft: No More Pick-and-Choose Patching | #CyberSecurity #Updates #Responsibility #eSkills #ICT | ICT Security-Sécurité PC et Internet | Scoop.it
Adobe and Microsoft today each issued updates to fix critical security flaws in their products. Adobe’s got fixes for Acrobat and Flash Player ready. Microsoft’s patch bundle for October includes fixes for at least five separate “zero-day” vulnerabilities — dangerous flaws that attackers were already exploiting prior to today’s patch release. Also notable this month is that Microsoft is changing how it deploys security updates, removing the ability for Windows users to pick and choose which individual patches to install.

Zero-day vulnerabilities describe flaws that even the makers of the targeted software don’t know about before they start seeing the flaws exploited in the wild, meaning the vendor has “zero days” to fix the bugs.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

Gust MEES's insight:
Adobe and Microsoft today each issued updates to fix critical security flaws in their products. Adobe’s got fixes for Acrobat and Flash Player ready. Microsoft’s patch bundle for October includes fixes for at least five separate “zero-day” vulnerabilities — dangerous flaws that attackers were already exploiting prior to today’s patch release. Also notable this month is that Microsoft is changing how it deploys security updates, removing the ability for Windows users to pick and choose which individual patches to install.

Zero-day vulnerabilities describe flaws that even the makers of the targeted software don’t know about before they start seeing the flaws exploited in the wild, meaning the vendor has “zero days” to fix the bugs.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

Scooped by Gust MEES
Scoop.it!

ALERT!!! Dateiendung .zcrypt: Microsoft warnt vor wurmartigem Erpressungstrojaner | #Ransomware #CyberSecurity

ALERT!!! Dateiendung .zcrypt: Microsoft warnt vor wurmartigem Erpressungstrojaner | #Ransomware #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Die Ransomware ZCryptor verbreitet sich von System zu System, in dem der Trojaner sich im Autostart von USB-Sticks einnistet. Sie verschlüsselt über 80 verschiedene Dateitypen.

Microsoft warnt Nutzer vor einem neu entdeckten Erpressungstrojaner namens ZCryptor. Der Schädling verhält sich eigentlich wie viele andere Ransomware-Programme, hat aber die besonders perfide Eigenheit, sich auch auf eingesteckte USB-Laufwerke und -Sticks zu kopieren. In dem sich ZCryptor in die Autostart-Datei der Laufwerke einklinkt, verbreitet er sich wurmartig von System zu System.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Gust MEES's insight:
Die Ransomware ZCryptor verbreitet sich von System zu System, in dem der Trojaner sich im Autostart von USB-Sticks einnistet. Sie verschlüsselt über 80 verschiedene Dateitypen.

Microsoft warnt Nutzer vor einem neu entdeckten Erpressungstrojaner namens ZCryptor. Der Schädling verhält sich eigentlich wie viele andere Ransomware-Programme, hat aber die besonders perfide Eigenheit, sich auch auf eingesteckte USB-Laufwerke und -Sticks zu kopieren. In dem sich ZCryptor in die Autostart-Datei der Laufwerke einklinkt, verbreitet er sich wurmartig von System zu System.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/ict-security-tools/?tag=Ransomware

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

No comment yet.