ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Spam und Malvertising werden gefährlicher

Spam und Malvertising werden gefährlicher | ICT Security-Sécurité PC et Internet | Scoop.it

Die Ergebnisse des Cisco Annual Security Report 2015 zeigen allerdings auch einen Wandel bei den Angriffsmethoden der Cyberkriminellen.


Ihr Primärziel sind nicht mehr Server und Betriebssysteme, ===> sondern einzelne Nutzer. <===

.

Im Vergleich zum Vorjahr nahmen dabei betrügerische Mails und Malvertising-Attacken um satte 250 Prozent zu. Und: Vor allem Anwender in hochgefährdeten Branchen fallen laut Cisco doppelt so häufig auf betrügerische Links und Adware herein.

.

Learn more:

.

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

.

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

.

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


Gust MEES's insight:

Die Ergebnisse des Cisco Annual Security Report 2015 zeigen allerdings auch einen Wandel bei den Angriffsmethoden der Cyberkriminellen.


Ihr Primärziel sind nicht mehr Server und Betriebssysteme, ===> sondern einzelne Nutzer. <===

.

Im Vergleich zum Vorjahr nahmen dabei betrügerische Mails und Malvertising-Attacken um satte 250 Prozent zu. Und: Vor allem Anwender in hochgefährdeten Branchen fallen laut Cisco doppelt so häufig auf betrügerische Links und Adware herein.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hijacking drones with malware

Hijacking drones with malware | ICT Security-Sécurité PC et Internet | Scoop.it

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem.

While in this particular case the actual danger turned out to be non-existent, the fact that these devices can be hijacked and misused for malicious purposes is something that the manufacturers will have to think about very soon.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone


Gust MEES's insight:

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. 

While in this particular case the actual danger turned out to be non-existent, the fact that these devices can be hijacked and misused for malicious purposes is something that the manufacturers will have to think about very soon.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone


No comment yet.
Scooped by Gust MEES
Scoop.it!

Sicherheitsforscher entdecken Hintertür zum Active Directory | Skeleton-Key-Backdoor | CyberSecurity

Sicherheitsforscher entdecken Hintertür zum Active Directory | Skeleton-Key-Backdoor | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Bei einer Analyse eines sich seltsam verhaltenden Domain Controllers entdeckten Sicherheitsspezialisten eine ganz besondere Hintertür: Einbrecher hatten die Windows Server so manipuliert, dass ein Master-Passwort universellen Zugang gewährte.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Skeleton-Key


Gust MEES's insight:
Bei einer Analyse eines sich seltsam verhaltenden Domain Controllers entdeckten Sicherheitsspezialisten eine ganz besondere Hintertür: Einbrecher hatten die Windows Server so manipuliert, dass ein Master-Passwort universellen Zugang gewährte.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Skeleton-Key


No comment yet.
Scooped by Gust MEES
Scoop.it!

Ecigarette from China distributes malware to systems

Ecigarette from China distributes malware to systems | ICT Security-Sécurité PC et Internet | Scoop.it
An executives system was reportedly infected by malware after he charged an ecigarette purchased on eBay through his systems USB port.
Gust MEES's insight:

An executives system was reportedly infected by malware after he charged an ecigarette purchased on eBay through his systems USB port.


No comment yet.
Scooped by Gust MEES
Scoop.it!

WHAT Is Malware? [pdf]

Gust MEES's insight:


Learn more:


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

With Chrome malware on the rise, Google adds automatic blocking of malicious downloads to latest browser build

With Chrome malware on the rise, Google adds automatic blocking of malicious downloads to latest browser build | ICT Security-Sécurité PC et Internet | Scoop.it
Google today announced Chrome is getting automatic download blocking for malware the company detects. The feature has already been added to the latest build of Chrome Canary.

Chrome ...
Gust MEES's insight:

 

Chrome will soon automatically block downloads and let you know in a message at the bottom of your screen. You will be able to “Dismiss” the message, although it’s not clear if you will be able to stop the block...

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

 

Gust MEES's curator insight, October 31, 2013 9:29 AM

 

Chrome will soon automatically block downloads and let you know in a message at the bottom of your screen. You will be able to “Dismiss” the message, although it’s not clear if you will be able to stop the block...

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

 

 

 

 

Scooped by Gust MEES
Scoop.it!

Malware-Infektionen im Europavergleich

Malware-Infektionen im Europavergleich | ICT Security-Sécurité PC et Internet | Scoop.it
Laut Microsoft steht Rumänien an der Spitze Europas, soweit es infizierte Rechner betrifft. Die größte Dichte an Malware-Sites weist Luxemburg auf. Deutschland bewegt sich im Mittelfeld der europäischen Staaten.
Gust MEES's insight:

 

That hurts!!! What I say since ages and NOT getting taken for serious about it is NOW official!

 

Wer den Schaden hat braucht für den Spott nicht zu sorgen :( & ;)

 

Learn more:

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2012/05/28/what-should-get-be-taught-and-learned-more-in-21st-century-while-using-ict/

 

 

 

 

Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

8 Ways to Accidentally Infect Your Friends with Malware

8 Ways to Accidentally Infect Your Friends with Malware | ICT Security-Sécurité PC et Internet | Scoop.it
A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations intersect with ways to protect your friends from attacks?

 

By failing to protect your own data, you’re sometimes putting them at risk as well. Here are a few ways people end up mindlessly spreading the malware love....

 


Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

XSS Flaw in WordPress Plugin Allows Injection of Malicious Code

XSS Flaw in WordPress Plugin Allows Injection of Malicious Code | ICT Security-Sécurité PC et Internet | Scoop.it
A security vulnerability in the WP Banners Lite plugin for WordPress sites allows an attacker to inject malicious html or javascript code.

Via Gust MEES
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=Cybersecurity

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing

 

Scooped by Gust MEES
Scoop.it!

NBC.com hacked, briefly compromised with RedKit malware | ZDNet

NBC.com hacked, briefly compromised with RedKit malware | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
It appears that the website NBC.com was compromised by malware for around fifteen minutes Thursday 12pm PST with RedKit malware.
Gust MEES's insight:

                     ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

One in three PCs are infected with malware

One in three PCs are infected with malware | ICT Security-Sécurité PC et Internet | Scoop.it
China and South Korea are most infected, says Panda Labs

 

"One of the reasons for this growth is the increased use of exploit kits such as Black Hole, which are capable of exploiting multiple system vulnerabilities to infect computers automatically without user intervention."

 

Gust MEES's insight:

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Browser-hijacking malware talks to attackers using SPF email validation protocol

Browser-hijacking malware talks to attackers using SPF email validation protocol | ICT Security-Sécurité PC et Internet | Scoop.it
The technique makes malicious traffic harder to detect for firewalls and other network security systems, researcher says
Gust MEES's insight:

                      ===> BEWARE of the MALWARE!!! <===

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Botnet Control Servers Span the Globe - Is Your country in there!?

Botnet Control Servers Span the Globe - Is Your country in there!? | ICT Security-Sécurité PC et Internet | Scoop.it

McAfee Labs has long monitored botnet activities and their control servers as they plague the Internet.  With millions of McAfee endpoints and network security appliances sending information to McAfee Global Threat Intelligence (GTI) in the cloud, coupled with a vast collection of malicious binary and proactive research, McAfee Labs has a clear view of botnet threats around the world.

 

Gust MEES's curator insight, January 23, 2013 8:06 PM

One sees every time the same countries on TOP of the BAD lists of Cyber-Security!!!

 

===> These countries SHOULD start to Teach the basics of Cyber-Security in Education to make sure that people from other countries will not get touched by malware as Internet doesn't have any borders!!! <===

 

Check ALSO:

 

TOP 20 countries with Malware Resources:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=TOP+20+countries+whit+malware+resources

 

 

 

https://gustmees.wordpress.com/2012/05/28/not-only-rights-but-also-responsibility/

 

https://gustmees.wordpress.com/2013/01/15/safer-internet-day-2013-sid2013-participation/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

https://gustmeesfr.wordpress.com/

 

 

Scooped by Gust MEES
Scoop.it!

Sneaky Linux malware comes with sophisticated custom-built rootkit | CyberSecurity

Sneaky Linux malware comes with sophisticated custom-built rootkit | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.

The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen in the wild as recently as Jan. 20, according to a new report Thursday from security firm FireEye, which analyzed the threat in detail.

XOR.DDoS is installed on targeted systems via SSH (Secure Shell) brute-force attacks launched primarily from Internet Protocol (IP) addresses registered to a Hong Kong-based company called Hee Thai Limited.

The attacks attempt to guess the password for the root account by using different dictionary-based techniques and password lists from past data breaches. FireEye observed well over 20,000 SSH login attempts per targeted server within a 24-hour period and more than 1 million per server between mid-November and end of January.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux



Gust MEES's insight:
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that’s custom built for each infection.

The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen in the wild as recently as Jan. 20, according to a new report Thursday from security firm FireEye, which analyzed the threat in detail.

XOR.DDoS is installed on targeted systems via SSH (Secure Shell) brute-force attacks launched primarily from Internet Protocol (IP) addresses registered to a Hong Kong-based company called Hee Thai Limited.

The attacks attempt to guess the password for the root account by using different dictionary-based techniques and password lists from past data breaches. FireEye observed well over 20,000 SSH login attempts per targeted server within a 24-hour period and more than 1 million per server between mid-November and end of January.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux


No comment yet.
Scooped by Gust MEES
Scoop.it!

Maldrone: Malware which hijacks your personal drone | CyberSecurity

Maldrone: Malware which hijacks your personal drone | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
A backdoor has been discovered in popular consumer drones which can hijack your favorite new flying toy.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone


Gust MEES's insight:

A backdoor has been discovered in popular consumer drones which can hijack your favorite new flying toy.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Maldrone




No comment yet.
Scooped by Gust MEES
Scoop.it!

'Skeleton Key' malware unlocks corporate networks | CyberSecurity

'Skeleton Key' malware unlocks corporate networks | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
It's time to use two-factor authentication, folks.


The newly-discovered "Skeleton Key" malware is able to circumvent authentication on Active Directory systems, according to Dell researchers.

The Dell SecureWorks Counter Threat Unit (CTU) teampublished their findings in an advisory notice this week.


Gust MEES's insight:
It's time to use two-factor authentication, folks.


The newly-discovered "Skeleton Key" malware is able to circumvent authentication on Active Directory systems, according to Dell researchers.

The Dell SecureWorks Counter Threat Unit (CTU) teampublished their findings in an advisory notice this week.


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

And the Gold Medal Goes to: Finland, the country with the lowest malware infection rates.

And the Gold Medal Goes to: Finland, the country with the lowest malware infection rates. | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.


Each week you’ll hear from Microsoft security experts who share insights and report on research and our collaborative work internally and with industry and governments around the world to build more secure software and services; to advance the IT ecosystem; and collective efforts to build a safer, more trusted Internet for everyone.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=country


Scooped by Gust MEES
Scoop.it!

Virus takes user's photo via webcam

Virus takes user's photo via webcam | ICT Security-Sécurité PC et Internet | Scoop.it
A rogue anti-virus product that blackmails people by secretly taking their picture with their webcam is on the rise.
Gust MEES's insight:

 

Beware of the Malware!!!

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Protect Your Tablets and Smartphone From Malware Attacks - Norton Security Spotlight

Norton interviews with Internet Security expert Marian Merritt on the steps we can take to ensure that our mobile devices - our tablets and smartphones - are...
Gust MEES's insight:

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Scooped by Gust MEES
Scoop.it!

Researchers warn of increased Zeus malware activity this year

Researchers warn of increased Zeus malware activity this year | ICT Security-Sécurité PC et Internet | Scoop.it
The amount of cybercriminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from antivirus vendor Trend Micro.
Gust MEES's insight:

 

The amount of cybercriminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from antivirus vendor Trend Micro.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac malware found in malformed Word documents - is China to blame?

Mac malware found in malformed Word documents - is China to blame? | ICT Security-Sécurité PC et Internet | Scoop.it
Minority groups in China appear to have been targeted by a Mac malware attack, delivered via boobytrapped Word documents.

Who could possibly be interested in targeting their computers?

 

It is true that there is much less malware for OS X than there is for Windows, but that's not going to make you feel any better if you end up targeted in an attack like this.

 

Mac users, just like Windows users, need to ensure that they install the latest security patches and keep their software properly up-to-date.

If you're not already doing so, run anti-virus software on your Macs.

 

If you're a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

 

Gust MEES's insight:

 

It is true that there is much less malware for OS X than there is for Windows, but that's not going to make you feel any better if you end up targeted in an attack like this.

 

Mac users, just like Windows users, need to ensure that they install the latest security patches and keep their software properly up-to-date.

If you're not already doing so, run anti-virus software on your Macs.

 

If you're a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

 

 Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, April 27, 2013 8:37 AM

 

It is true that there is much less malware for OS X than there is for Windows, but that's not going to make you feel any better if you end up targeted in an attack like this.

 

Mac users, just like Windows users, need to ensure that they install the latest security patches and keep their software properly up-to-date.

If you're not already doing so, run anti-virus software on your Macs.

 

If you're a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

 

 Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Malware attack recovery costs an average of $3,000 per day

Malware attack recovery costs an average of $3,000 per day | ICT Security-Sécurité PC et Internet | Scoop.it
Organizations citing cybersecurity costs as an impediment to implementing a layered defense should rethink their priorities: Denial of service (DDoS) and malware infection recovery costs range into the thousands of dollars – per day.
Gust MEES's insight:

 

==> Malware attack recovery costs an average of $3,000 per day <==

 

Gust MEES's curator insight, March 15, 2013 5:37 PM

 

A MUST read...

 

Scooped by Gust MEES
Scoop.it!

Malware injected into legitimate JavaScript code on legitimate websites

Malware injected into legitimate JavaScript code on legitimate websites | ICT Security-Sécurité PC et Internet | Scoop.it
SophosLabs has observed a trend of hackers inserting their malicious code into legitimate JavaScript hosted on legitimate compromised websites.

Learn more about what our experts have seen, and e...

 

 

 

 

 

 

 

Recently SophosLabs has seen a flurry of detections of Troj/Iframe-JG on legitimate websites, including:

Primary School websites in EnglandSmall community websites in ItalyA nightclub website in LondonThe website of an East African nation's TV companyThe website of trade association of Financial Advisors in the US
Gust MEES's insight:

                      ===> BEWARE of the MALWARE!!! <===

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

Scooped by Gust MEES
Scoop.it!

Android malware emerges on Google Play which installs a trojan on your PC

Android malware emerges on Google Play which installs a trojan on your PC | ICT Security-Sécurité PC et Internet | Scoop.it

We’ve seen malware for PCs that infects mobile devices, but it turns out there’s also malware for mobile devices designed to infect PCs. Kaspersky researchers have discovered a new piece of Android malware that masquerades as a “cleaner” app meant to free memory for Google’s operating system but wreaks havoc on your smartphone in the background and on Microsoft’s operating system when it’s connected to a PC.

The security firm says the malware has the most “extensive feature set” it has ever seen in one mobile app. Here’s the list:

Sending SMS messages.Enabling Wi-Fi.Gathering information about the device.Opening arbitrary links in a browser.Uploading the SD card’s entire contents.Uploading an arbitrary file (or folder) to the master’s server.Uploading all SMS messages.Deleting all SMS messages.Uploading all the contacts/photos/coordinates from the device to the master.
Gust MEES's insight:

                     ===> BEWARE of the MALWARE!!! <===

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BKA malware shocks victims with child pornography

BKA malware shocks victims with child pornography | ICT Security-Sécurité PC et Internet | Scoop.it
The German Federal Police are warning of new malware which displays child pornography while claiming that victims' computers have been used for illegal purposes.
Gust MEES's insight:

                    ===> BEWARE of the MALWARE!!! <===

Gust MEES's curator insight, January 30, 2013 6:41 AM

                       ===> BEWARE of the MALWARE!!! <===