ICT Security-Sécurité PC et Internet
87.1K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Darkhotel: Angriff über Hotel-WLAN wird raffiniert

Darkhotel: Angriff über Hotel-WLAN wird raffiniert | ICT Security-Sécurité PC et Internet | Scoop.it
Der Security-Dienstleister Kaspersky warnt vor einer fiesen Masche, dem Angriff auf einzelne Hotelgäste über das geschützte WLAN. Das Szenario trägt den Namen "Darkhotel".




Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/


Gust MEES's insight:
Der Security-Dienstleister Kaspersky warnt vor einer fiesen Masche, dem Angriff auf einzelne Hotelgäste über das geschützte WLAN. Das Szenario trägt den Namen "Darkhotel".


Learn more:


http://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

#SMBchat on Symantec Internet Security Threat Report on Thursday, April 25, at 9 a.m. PT / 12 p.m. ET

#SMBchat on Symantec Internet Security Threat Report on Thursday, April 25, at 9 a.m. PT / 12 p.m. ET | ICT Security-Sécurité PC et Internet | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

The ISTR, which covers the major threat trends observed by Symantec in 2012, reveals that cybercriminals view SMBs as a prime target for stealing information. In fact, the largest growth area for targeted attacks in 2012 was businesses with fewer than 250 employees; 31 percent of all attacks targeted them, representing a threefold increase from 2011.

 

Getting a clear understanding of the dangers is an important step in improving security, and this year’s report is a wake-up call that SMBs are now being specifically targeted by cybercriminals.

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===

 

Gust MEES's insight:

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===


Gust MEES's curator insight, April 22, 2013 1:50 PM

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

10 security best practice guidelines for businesses

10 security best practice guidelines for businesses | ICT Security-Sécurité PC et Internet | Scoop.it
Businesses need extreme security measures to combat extreme threats. Here are ten best practices that provide defense against the majority of all security threats.
Gust MEES's insight:

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 3:59 PM

 

                      ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Scooped by Gust MEES
Scoop.it!

Businesses need an urgent rethink of cyber security

Businesses need an urgent rethink of cyber security | ICT Security-Sécurité PC et Internet | Scoop.it
Enterprises are failing to do enough to defend themselves from 'real and credible threats to cyber security', says GCHQ
Gust MEES's insight:

As hackers become more creative, collaborative and sophisticated in their methods, we must match their ingenuity and intelligence, in order to have any chance of defending our critical assets and sensitive information.


Check also:


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Iran-focused malware tampers with business databases

Iran-focused malware tampers with business databases | ICT Security-Sécurité PC et Internet | Scoop.it
Symantec has discovered an 'interesting' worm that sabotages Microsoft SQL databases and replaces items with random values — something that could be difficult for businesses to remedy, it warns.

 

Read more:

http://www.zdnet.com/iran-focused-malware-tampers-with-business-databases-7000007835/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

8 tips for small business to improve online safety

8 tips for small business to improve online safety | ICT Security-Sécurité PC et Internet | Scoop.it
Summary: What can small businesses do to improve online policies and procedures?

 

 

 

Read more, a MUST:

http://www.zdnet.com/8-tips-for-small-business-to-improve-online-safety-7000005890/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

La cybercriminalité a glané 2,5 milliards d'euros en France en 2011

La cybercriminalité a glané 2,5 milliards d'euros en France en 2011 | ICT Security-Sécurité PC et Internet | Scoop.it
La cybercriminalité a glané 2,5 milliards d'euros en France en 2011 - Sécurité - Symantec estime le montant global de la cybercriminalité en France...

 

Symantec estime le montant global de la cybercriminalité en France à 2,5 milliards d'euros. Un internaute majeur sur trois aurait été touché par le phénomène au cours des douze derniers mois, la perte financière moyenne par victime étant évaluée à 247 €. L'édition 2012 de l'étude met au jour une hausse de nouvelles formes d'attaques perpétrées au travers des réseaux sociaux ou des appareils mobiles. Celles-ci auraient déjà touchées en France 11% des internautes majeurs. Elles peuvent aussi bien prendre la forme d'un piratage de compte que d'une usurpation d'identité.

 

En savoir plus :

 

http://www.lemondeinformatique.fr/actualites/lire-la-cybercriminalite-a-glane-2-5-milliards-d-euros-en-france-en-2011-50302.html?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mac malware, be aware! Forewarned is Forearmed!

In the past, few viruses have targeted Apple operating systems -- but this is gradually changing. The increased popularity of Apple smart devices has led some cybercriminals to exploit a traditionally ignored audience.

 

IT admins needs to educate their users about this growing threat and implement a business antivirus solution for Macs as they do for PCs.

 

Video here:

http://www.youtube.com/watch?v=MOflZBB4qGc

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online file sharing poses great security risks

Online file sharing poses great security risks | ICT Security-Sécurité PC et Internet | Scoop.it

As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec.

 

A new survey revealed that SMB employees are increasingly adopting unmanaged, personal-use online file sharing solutions without permission from IT, part of the broader trend of the consumerization of IT in which the adoption of online services for use on personal mobile devices blurs the lines between work and play.

 

These early-adopter behaviors – like those driving the use of file sharing technology – are making organizations vulnerable to security threats and potential data loss.

 

Read more:

http://www.net-security.org/secworld.php?id=13133

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Report says cyber security still takes a backseat for major companies

Report says cyber security still takes a backseat for major companies | ICT Security-Sécurité PC et Internet | Scoop.it
A recent study finds that major enterprises have yet to catch on to the importance of cyber security.

 

 

 

 

Read more:

http://www.scmagazine.com/report-says-cyber-security-still-takes-a-backseat-for-major-companies/article/241654/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Establishing where cybersecurity gaps are, saves organisations effort and money

Establishing where cybersecurity gaps are, saves organisations effort and money | ICT Security-Sécurité PC et Internet | Scoop.it
Establishing where cybersecurity gaps are, saves organisations effort and money.

 

The ISO27001 Feasibility & Gap Analysis Service from IT Governance Ltd helps companies identify the cyber risks relevant to them. The service helps senior managers justify IT expenditure in terms of ROI, providing them with a business case for closing their cybersecurity gaps and, if relevant, pursuing ISO27001 certification.

 

Find out more here: www.itgovernance.co.uk/ISO27001-feasibility-and-gap-analysis-service.aspx.

No comment yet.
Scooped by Gust MEES
Scoop.it!

CipherUSB: Encryption for Flash, USB or optical drives

CipherUSB: Encryption for Flash, USB or optical drives | ICT Security-Sécurité PC et Internet | Scoop.it
Addonics announced CipherUSB, a USB pass-through adapter that provides a way to encrypt data stored on flash drives, flash media, USB hard drives as well as Blu-ray, DVD or CD media.

 

The CipherUSB is the size of a typical flash drive. Just plug the USB drive, flash drive or optical drive to the device end of the CipherUSB, and then plug the CipherUSB into your computer’s USB port.

 

The drive will appear on your computer in seconds and is ready for use like an ordinary USB drive. There is no password to remember or software or drivers to install.

No comment yet.
Scooped by Gust MEES
Scoop.it!

MasterCard and Visa payment processor compromised, up to 10 million cards stolen

MasterCard and Visa payment processor compromised, up to 10 million cards stolen | ICT Security-Sécurité PC et Internet | Scoop.it
Over 10 million credit cards may have been stolen by criminals who compromised a credit card processing company last month. Read on to find out what happened and what actions you may wish to take t...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Be safe! | Luxembourg for Business [PDF and videos]

Be safe! | Luxembourg for Business [PDF and videos] | ICT Security-Sécurité PC et Internet | Scoop.it
Gust MEES's insight:

 

Check ALSO the videos!!!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Datenklau auf Geschäftsreisen: So schützen Sie Ihren Laptop vor Spionen

Datenklau auf Geschäftsreisen: So schützen Sie Ihren Laptop vor Spionen | ICT Security-Sécurité PC et Internet | Scoop.it
Staatliche Industriespione aus Russland, China oder den USA schlagen gerne bei Geschäftsreisenden zu. Denn die liefern wertvolle Daten auf ihren Laptops oft frei Haus - zum Beispiel im Hotel.
Gust MEES's insight:

 

Check also:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies

L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies | ICT Security-Sécurité PC et Internet | Scoop.it
Détecter 1% de malware supplémentaires peut permettre à une entreprise d’économiser plusieurs milliers d’euros dans les coûts inhérents au nettoyage (...)

Via Frederic GOUTH, Gust MEES
Gust MEES's insight:
L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies


Gust MEES's curator insight, February 25, 2013 3:06 PM
L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies


Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Infographic of the week: Why ignoring information security is lethal

Infographic of the week: Why ignoring information security is lethal | ICT Security-Sécurité PC et Internet | Scoop.it

Infographic of the week: Why ignoring information security is lethal


Via Frederic GOUTH
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD savings may be lost by security and admin costs

BYOD savings may be lost by security and admin costs | ICT Security-Sécurité PC et Internet | Scoop.it
BYOD savings may be lost by security and admin costs
Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort.

 

The Aberdeen Group found that BYOD, on average, costs companies 33 percent more than adopting a company-owned device policy. This is particularly surprising because, at first glance, BYOD seems to be the ultimate cost saver.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22614-BYOD-savings-may-be-lost-by-security-and-admin-costs.html?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

10 steps to cyber security

10 steps to cyber security | ICT Security-Sécurité PC et Internet | Scoop.it
Advice to business leaders on how to better tackle the growing cyber threats to their companies.

 

The New Cyber Security Guidance will help the private sector minimise the risks to company assets.

 

Read more:

http://www.fco.gov.uk/en/global-issues/cyber-space/005-cyber-security/10-steps?utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers Identify Four BlackBerry Zitmo Variants

Researchers Identify Four BlackBerry Zitmo Variants | ICT Security-Sécurité PC et Internet | Scoop.it
Security researcher Denis Maslennikov identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. The samples were three .cod files and one .jar file with a .cod file inside.

 

Security researchers have identified new Zeus samples targeting Android and BlackBerry devices.

 

Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as Kaspersky Lab recently analyzed four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy, Denis Maslennikov, a researcher at Kaspersky Lab wrote on the company's Securelist blog. These variants were communicating with two command-and-control cell phone numbers associated with a Swedish mobile operator.

 

Read more:

http://www.securityweek.com/researchers-identify-four-blackberry-zitmo-variants

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Practical IT: How your firm can better secure access to social networks

Practical IT: How your firm can better secure access to social networks | ICT Security-Sécurité PC et Internet | Scoop.it
Facebook’s potential to ruin (or make) your business is a common news topic. We've looked into the risks, and how businesses might provide a more secure way of accessing social networks.

 

 

 

 

 

 

Read more:

http://nakedsecurity.sophos.com/2012/06/21/how-secure-access-social-networks/?utm_source=gplus&amp;amp;utm_medium=status%2Bmessage&amp;amp;utm_campaign=naked%2Bsecurity

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile workspace offers a secure Windows OS on any computer

Mobile workspace offers a secure Windows OS on any computer | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile workspace offers a secure Windows OS on any computer

 

Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business travelers, teleworkers and contractors to carry a secure, managed Microsoft Windows 7 operating system and an encrypted data transfer solution on a single, fully managed USB device.

 

Read more:

http://www.net-security.org/secworld.php?id=13082&amp;utm_source=dlvr.it&amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from IT Security
Scoop.it!

Ten Ways to Handle Insider Threats

Ten Ways to Handle Insider Threats | ICT Security-Sécurité PC et Internet | Scoop.it

Tough economic times make it tempting for an employee to switch his white hat to a black one for financial gain. Insider threats also include contractors, auditors, and anyone who has authorized access to systems.

 

Read more, A MUST...

 


Via IS Decisions
No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

How Apple Botched Its First Really Big Security Problem

How Apple Botched Its First Really Big Security Problem | ICT Security-Sécurité PC et Internet | Scoop.it
It tried to kill the messenger...

 

Now that the Mac has achieved uber popularity, it is attracting hackers.


Last week Apple got its first taste of what Microsoft security goes through on a daily basis and its response was a big, fat fail.


Apple tried to take out the security researcher who told Apple it had a security problem, reports Forbes.

 

Read more: http://www.businessinsider.com/how-apple-botched-its-first-really-big-security-problem-2012-4?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed:+typepad/alleyinsider/silicon_alley_insider+(Silicon+Alley+Insider)#ixzz1rjAV8CzP

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture | ICT Security-Sécurité PC et Internet | Scoop.it
As ESET's BYOD Infographic shows, BYOD is no LOL matter, bringing with it some serious risks to company networks and data. Based on an ESET Harris Interactive survey.

 

Another BYOD risk factor is the practice of letting someone else use the device. This could be "just" a family member or friend but it introduces the possibility of that person gaining access to the company network or sensitive company data stored on the device.

 

===> Furthermore, if this "other person" is not trained in safe computing practices there is a serious risk of them getting the device infected or compromised. <===

No comment yet.