ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Alerte au phishing sur LinkedIn | CyberSecurity

Alerte au phishing sur LinkedIn | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

L'éditeur de sécurité Symantec a lancé une alerte à propos de mails de phishing ciblant les utilisateurs du réseau social LinkedIn. Ce mail frauduleux contient une pièce jointe à ne surtout pas ouvrir. 


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


Gust MEES's insight:

L'éditeur de sécurité Symantec a lancé une alerte à propos de mails de phishing ciblant les utilisateurs du réseau social LinkedIn. Ce mail frauduleux contient une pièce jointe à ne surtout pas ouvrir. 


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Orange: 1,3 million de personnes touchées par un nouveau vol de données

Orange: 1,3 million de personnes touchées par un nouveau vol de données | ICT Security-Sécurité PC et Internet | Scoop.it
TÉLÉPHONIE - Le piratage survient trois mois après une intrusion qui avait touché près de 800.000 personnes...
Gust MEES's insight:

Orange: 1,3 million de personnes touchées par un nouveau vol de données...


No comment yet.
Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Phishing-Mail ködert WordPress-Admins

Phishing-Mail ködert WordPress-Admins | ICT Security-Sécurité PC et Internet | Scoop.it
Mit einer kostenlosen Version eines beliebten SEO-Plugins für WordPress versuchen Spammer, Administratoren zu ködern. Das Plugin entpuppt sich als Malware, dass eine Hintertür im Server öffnet und Besucher der Seite infiziert.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/search?q=wordpress+vulnerabilities

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

“Your Apple ID Frozen” Phishing Emails Come as Users Upgrade to Mavericks

“Your Apple ID Frozen” Phishing Emails Come as Users Upgrade to Mavericks | ICT Security-Sécurité PC et Internet | Scoop.it
Apple users have reported receiving phishing emails entitled “Your Apple ID has been frozen temporarily,” which attempt to trick recipient...

 

If you come across such emails, you can report them to Apple by forwarding them to reportphishing@apple.com. If you’re already a victim of this scheme, take the appropriate measures depending on what information you’ve handed over to the scammers. 

Steps may include changing passwords, and keeping a close eye on your bank account in case you’ve provided financial details.

 


Via Gust MEES
Gust MEES's insight:

 

If you come across such emails, you can report them to Apple by forwarding them to ===> reportphishing@apple.com. <=== If you’re already a victim of this scheme, take the appropriate measures depending on what information you’ve handed over to the scammers. 

Steps may include changing passwords, and keeping a close eye on your bank account in case you’ve provided financial details.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, October 25, 2013 6:58 AM

 

If you come across such emails, you can report them to Apple by forwarding them to ===> reportphishing@apple.com. <=== If you’re already a victim of this scheme, take the appropriate measures depending on what information you’ve handed over to the scammers. 

Steps may include changing passwords, and keeping a close eye on your bank account in case you’ve provided financial details.

 

 

Gust MEES's curator insight, October 25, 2013 7:03 AM

 

If you come across such emails, you can report them to Apple by forwarding them to ===> reportphishing@apple.com. <=== If you’re already a victim of this scheme, take the appropriate measures depending on what information you’ve handed over to the scammers. 

Steps may include changing passwords, and keeping a close eye on your bank account in case you’ve provided financial details.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

Department of Energy Hacked; PII Stolen

Department of Energy Hacked; PII Stolen | ICT Security-Sécurité PC et Internet | Scoop.it
Hackers have broken into the computer systems of the U.S. Department of Energy (DOE) to steal sensitive personally information for about 14,000 past and current employees.
Gust MEES's insight:

 

Malicious hackers have broken into computer systems of the U.S. Department of Energy (DOE) to hijack sensitive personally information (PII) for about 14,000 past and current employees.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Humans still the weakest link as phishing gets smarter and more focused

Humans still the weakest link as phishing gets smarter and more focused | ICT Security-Sécurité PC et Internet | Scoop.it

The latest figures from the APWG show a decline in phishing reports. Verizon, on the other hand, implies that almost all incidents of cyber espionage reported in the last year included some phishing...

 

An academic study into human susceptibility to phishing has found that 92% of people misclassify phishing emails, despite efforts to educate people about the dangers.

 

Educating users to keep a wary eye out for phishing attempts has been a major focus for security admins and providers, but it seems like the bad guys are managing to keep ahead of the curve.

 

Gust MEES's insight:

 

Learn more:

 

https://www.hfes.org/web/DetailNews.aspx?ID=312

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Phisher pupils hack class computers

Phisher pupils hack class computers | ICT Security-Sécurité PC et Internet | Scoop.it
A group of children in Alaska took over their classroom computers after phishing account details from teachers.

 

They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://www.scoop.it/t/securite-pc-et-internet?q=Phishing

 

Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Twitter warns of more hacks, threats to come; issues media memo

Twitter warns of more hacks, threats to come; issues media memo | ICT Security-Sécurité PC et Internet | Scoop.it
The microblogging giant has warned news outlets that "these attacks will continue," particularly against high profile media organizations.

Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

- - http://www.scoop.it/t/securite-pc-et-internet?tag=Phishing

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=Privacy

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

APWG-Global Phishing Survey 2012 [pdf]

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=Phishing

 

Scooped by Gust MEES
Scoop.it!

Syrian Hacker Collective Takes Responsibility For AP Twitter Hack

Syrian Hacker Collective Takes Responsibility For AP Twitter Hack | ICT Security-Sécurité PC et Internet | Scoop.it
A hacker group calling itself the Syrian Electronic Army took credit for hacking the Twitter account of the Associated Press Tuesday and sending out a fake tweet about an explosion at the White House that injured President Obama.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Phishing

 
No comment yet.
Scooped by Gust MEES
Scoop.it!

ICANN systems compromised via Spear Phishing attack

ICANN systems compromised via Spear Phishing attack | ICT Security-Sécurité PC et Internet | Scoop.it
The ICANN organization confirmed that several its systems were compromised via Spear Phishing attack. The company is investigating the case.
Gust MEES's insight:

The ICANN organization confirmed that several its systems were compromised via Spear Phishing attack. The company is investigating the case.


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | ICT Security-Sécurité PC et Internet | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.
Gust MEES's insight:

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?


Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Scooped by Gust MEES
Scoop.it!

Phishing email fools Missouri university staff, compromises thousands

Phishing email fools Missouri university staff, compromises thousands | ICT Security-Sécurité PC et Internet | Scoop.it
Employees of Missouribased Saint Louis University fell victim to a phishing email that resulted in them providing account information, subsequently putting thousands at risk.

 

How many victims? More than 3,200 individuals were impacted.

 

What type of personal information? Names, Social Security numbers, direct deposit information and personal health information, including diagnoses, procedures and medical chart information.

 

Gust MEES's insight:

 

How many victims? More than 3,200 individuals were impacted.

 

What type of personal information? Names, Social Security numbers, direct deposit information and personal health information, including diagnoses, procedures and medical chart information.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

Gust MEES's curator insight, October 26, 2013 10:44 AM

 

How many victims? More than 3,200 individuals were impacted.

 

What type of personal information? Names, Social Security numbers, direct deposit information and personal health information, including diagnoses, procedures and medical chart information.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

Academic Writing Aid's curator insight, November 1, 2013 1:02 PM

Order custom written articles, essays, term papers, research papers, thesis papers, dissertations, book reviews, book reports, speeches and others.
.................NO PLAGIARISM.................... http://www.superiorpapers247.org/

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

L'hameçonnage : combien de personnes en sont victimes? [Infographic]

L'hameçonnage : combien de personnes en sont victimes? [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
Transcription de l' infographie : L'hameçonnage : combien de personnes en sont victimes?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Human Factors and Ergonomics Society : Profile of Likely E-mail Phishing Victims Emerges in Human Factors

Human Factors and Ergonomics Society : Profile of Likely E-mail Phishing Victims Emerges in Human Factors | ICT Security-Sécurité PC et Internet | Scoop.it

Human Factors and Ergonomics Society mission is to promote the discovery and exchange of knowledge concerning the characteristics of human beings that are applicable to the design of systems and devices of all kinds.

 

The author of a paper to be presented at the upcoming 2013 International Human Factors and Ergonomics Society Annual Meeting has described behavioral, cognitive, and perceptual attributes of e-mail users who are vulnerable to phishing attacks. Phishing is the use of fraudulent e-mail correspondence to obtain passwords and credit card information, or to send viruses.

 

 

 

Gust MEES's insight:

 

Learn more:

 

https://www.hfes.org/web/DetailNews.aspx?ID=312

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

New Skype phishing scam

New Skype phishing scam | ICT Security-Sécurité PC et Internet | Scoop.it
Our researchers discoveres a scam being spread via Skype that is designed to steal the log in credentials for Skype users by dangling free premium upgrades
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Skype

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Hackers To Manage Your Apple ID, If Caught From Phishing Bait

Hackers To Manage Your Apple ID, If Caught From Phishing Bait | ICT Security-Sécurité PC et Internet | Scoop.it
Phishers appear to have concentrated their fire on a relatively new target: Apple IDs.

Via Gust MEES
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Phishing

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG).
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=Privacy

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

Scooped by Gust MEES
Scoop.it!

Associated Press Twitter hack spreads fake White House bomb story, pushes down Dow Jones

Associated Press Twitter hack spreads fake White House bomb story, pushes down Dow Jones | ICT Security-Sécurité PC et Internet | Scoop.it
With just under two million followers, AP's Twitter account has a wide reach, and is influential.

Influential enough, it seems, that a false rumour from the AP feed can have a visible affect on ...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Phishing

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Phishing techniques, consequences and protection tips

Phishing techniques, consequences and protection tips | ICT Security-Sécurité PC et Internet | Scoop.it


What happens once your identity gets stolen? How exactly does a phisher benefit from gaining access to your sensitive information? What can he do?

Of course it depends on the information stolen, and the goal of the hacker, as to what can be done with sensitive information. The first thing to clarify is that there are two types of phishing attacks – consumer oriented phishing attacks and enterprise oriented phishing attacks.


No comment yet.