ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Cartons pleins pour hack.lu

Cartons pleins pour hack.lu | ICT Security-Sécurité PC et Internet | Scoop.it
Avec 250 inscrits en provenance de 41 pays, la convention Hack.lu s’impose comme référence en tant que conférence sur la cyber-sécurité.
Gust MEES's insight:

 

Elle pourrait même accueillir le plus grand challenge Capture The Flag au monde… 

 

En savoir plus :

 

www.hack.lu

 

Gust MEES's curator insight, October 22, 2013 10:12 AM

 

Elle pourrait même accueillir le plus grand challenge Capture The Flag au monde… 


En savoir plus :


- www.hack.lu

 


Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

CIRCL map - potential network attacks targeting IP addresses in Luxembourg

CIRCL map - potential network attacks targeting IP addresses in Luxembourg | ICT Security-Sécurité PC et Internet | Scoop.it
Gust MEES's insight:

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Gust MEES's curator insight, May 13, 2013 12:10 PM

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Gust MEES's curator insight, May 13, 2013 12:14 PM

 

Learn more with also other REAL TIME ATTACKS global maps here:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Real-time+Web+Monitor

 

Rescooped by Gust MEES from Luxembourg (Europe)
Scoop.it!

Octobre Rouge sur l'Alzette

Octobre Rouge sur l'Alzette | ICT Security-Sécurité PC et Internet | Scoop.it
Le Luxembourg a été mentionné comme une des victimes d’une cyberattaque connue sous le nom de code "Red October"...

 

Les investigations menées par le Computer Emergency Response Team (CERT) gouvernemental permettent de constater que l’attaque a été limitée à une machine du réseau informatique de l’État. L’analyse en détail de l’incident informatique par le CERT gouvernemental a permis de conclure que cette attaque peut être considérée comme n’étant pas exceptionnellement grave.

 

Des mesures de protection adéquates ont été mises en place, qui ont permis un arrêt immédiat de transferts illicites de données. Le gouvernement rappelle dans ce contexte que les mesures tant proactives que réactives mises en œuvre par les services compétents du gouvernement, notamment le Centre des technologies de l’information de l’État, ont permis de maîtriser l’attaque en question.

 

Gust MEES's curator insight, January 17, 2013 12:26 PM

De bonnes infrastructures et des mesures proactives aident à contrer des attaques...

 

                           ===> Proactive Thinking! <===

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Visual Cyber-Security: See Attacks On Real Time

Visual Cyber-Security: See Attacks On Real Time | ICT Security-Sécurité PC et Internet | Scoop.it

Introduction .In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is the human...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

Scooped by Gust MEES
Scoop.it!

TR-10 - Red October / Sputnik malware - Recommendations

TR-10 - Red October / Sputnik malware - Recommendations | ICT Security-Sécurité PC et Internet | Scoop.it

Overview

Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations.

 

As a cover, different office file formats have been used to transport the loader of the malware, using different exploits to drop the malicious content. After several stages of unpacking, the malware is running persistently on the computer and only when it successfully probes internet connectivity, it decrypts a separate file and starts to behave maliciously: it connects to a Command and Control server, awaiting new commands or downloading and executing specific malware modules.

 

Detection

 

Currently, the domains in this document are known to be used for Command and Control activity.

 

Any hit in your organisation's Proxy or DNS log files or firewall logs during the last 6 years indicate a compromised host in your organization.

 

Proactive measures

 

- Block access to below mentioned domains and IP addresses.

 

- Reactive measures

 

- Review log files, also those from backups regarding hits on the domains / IP addresses. In case of a hit, identify and isolate the machine by unplugging it from the network. CIRCL can assist with the analysis of memory and file system dumps.

 

Read more...

Gust MEES's insight:

Stay informed...

 

Philip Verghese 'Ariel's curator insight, January 18, 2013 1:31 AM

Overview

Red October is a malware family, also named Sputnik, which was detected in October 2012 by Kaspersky. It was active since 2007, installations have been spotted around the globe and targets were diplomatic and governmental agencies. The malware usually was sent by email to selected people in the respective organizations.