ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Microsoft warns users about 0-day behind PowerPoint attacks

Microsoft warns users about 0-day behind PowerPoint attacks | ICT Security-Sécurité PC et Internet | Scoop.it

Might put out patch in update, might chuck it out sooner.

The bug (CVE-2014-6352) can be triggered by sending a specially crafted Microsoft Office files to intended targets before tricking them into opening the booby-trapped files. "Currently, attacks using PowerPoint files are known to exist, but all Office file types can be used to carry out this attack," Jonathan Leopando, a technical communications staffer at Trend Micro, warns in a blog post.


Gust MEES's insight:

The bug (CVE-2014-6352) can be triggered by sending a specially crafted Microsoft Office files to intended targets before tricking them into opening the booby-trapped files. "Currently, attacks using PowerPoint files are known to exist, but all Office file types can be used to carry out this attack," Jonathan Leopando, a technical communications staffer at Trend Micro, warns in a blog post.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Drive-by Download Attacks: Examining the Web Server Platforms Attackers Use Most Often

Drive-by Download Attacks: Examining the Web Server Platforms Attackers Use Most Often | ICT Security-Sécurité PC et Internet | Scoop.it

The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance. 


We have included data on drive-by download attacks in numerous past volumes of the Microsoft Security Intelligence Report. But in the latest volume of the report, volume 15, we published some new data that we haven’t included in the report before - the relative prevalence of drive-by download sites hosted on different web server platforms.


Drive-by download attacks continue to be many attacker’s favorite type of attack. This is something I have written about several times in the past:

.





Gust MEES's insight:
.



No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft welcomes Secunia to vulnerability security alliance

Microsoft welcomes Secunia to vulnerability security alliance | ICT Security-Sécurité PC et Internet | Scoop.it
Secunia and Microsoft have partnered to offer a consolidated approach to patch management.

 

The partnership sees Secunia selected as Microsoft's first vulnerability security alliance partner, which will also enable the technology giant to introduce Secunia's products to its global technology centres that will allow users to deploy third-party patches.


Gust MEES's insight:

 

The partnership sees Secunia selected as Microsoft's first vulnerability security alliance partner, which will also enable the technology giant to introduce Secunia's products to its global technology centres that will allow users to deploy third-party patches.


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Microsoft et Symantec ferment un botnet touchant 8 millions de PC

Microsoft et Symantec ferment un botnet touchant 8 millions de PC | ICT Security-Sécurité PC et Internet | Scoop.it

Microsoft annonce avoir fermé un nouveau botnet en collaboration avec Symantec et affectant les requêtes des internautes sur les moteurs de recherche. 

 


Sur l'un de ses blogs officiels, Microsoft explique que le botnet en question, Bamital, était constitué d'environ huit millions d'ordinateurs zombies. Ces derniers étaient infectés d'un malware modifiant les liens cibles au sein des moteurs de recherche. Ce click jacking était opéré sur Google, Bing et Yahoo! ainsi que sur leurs plateformes publicitaires.

 

Gust MEES's insight:

Microsoft et Symantec ferment un botnet touchant 8 millions de PC


Gust MEES's curator insight, February 7, 2013 7:56 AM

Microsoft et Symantec ferment un botnet touchant 8 millions de PC


Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Know your enemy - protect yourself - Microsoft Malware Protection Center

Know your enemy - protect yourself - Microsoft Malware Protection Center | ICT Security-Sécurité PC et Internet | Scoop.it

Of the many weapons and tricks in an attacker’s arsenal, none is more dangerous or insidious than the ability to hide and continuously compromise a system from within.

 

This is the role of a rootkit. Malware uses rootkits, or rootkit functionality, in order to hide their presence on an affected computer and thus impede their removal.

 

===> Once compromised by a rootkit, any information returned by an affected system can no longer be trusted and must be regarded as suspect (which is exactly how they hide themselves and their components from you - by modifying requests for information that might give them away). <===

 

===> Know your enemy and protect yourself by learning about these threats. <===

 

You can download the paper here [PDF]:

http://download.microsoft.com/download/D/2/C/D2C47748-0310-4D6F-AC72-3D298BE58108/Microsoft%20Malware%20Protection%20Center%20Threat%20Report%20Rootkits_English.pdf

 

Read more:

http://blogs.technet.com/b/mmpc/archive/2012/10/19/know-your-enemy-protect-yourself.aspx?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Microsoft releases critical updates for Internet Explorer flaws

Microsoft releases critical updates for Internet Explorer flaws | ICT Security-Sécurité PC et Internet | Scoop.it
Summary: Microsoft released two eagerly awaited updates for Internet Explorer today, both addressing serious security issues. One covers a zero-day flaw in IE9 and earlier versions, the second updates Flash in Windows 8.

 

Read more:

http://www.zdnet.com/microsoft-releases-critical-updates-for-internet-explorer-flaws-7000004651/?s_cid=e589

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Office - Vulnérabilité dans le traitement des fichiers RTF

Office - Vulnérabilité dans le traitement des fichiers RTF | ICT Security-Sécurité PC et Internet | Scoop.it

Une vulnérabilité, permettant l'exécution de code malicieux, a été découverte dans Microsoft Word. Cette vulnérabilité est déjà exploitée activement dans des pièces jointes au format RTF (Rich text files) de courriers électroniques indésirables.

RéférencesClassification

Orange (niveau 4/5)

Systèmes vulnérables

Toutes les versions de Microsoft Office Word sont vulnérables (même sur Mac).

Mesures à prendre :
  • n'ouvrez pas les fichiers au format RTF avec Word ;
  • appliquez la solution de contournement de Microsoft en attendant une mise à jour ;
  • réglez word pour que les fichiers RTF soient bloqués ;
  • installez l'outil de protection contre l'exploitation de vos logiciels, EMET ;
  • observez les réflexes BEE SECURE/CASES de sécurité.


Gust MEES's insight:


Mesures à prendre :
  • n'ouvrez pas les fichiers au format RTF avec Word ;
  • appliquez la solution de contournement de Microsoft en attendant une mise à jour ;
  • réglez word pour que les fichiers RTF soient bloqués ;
  • installez l'outil de protection contre l'exploitation de vos logiciels, EMET ;
  • observez les réflexes BEE SECURE/CASES de sécurité.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Critical security updates for users of Microsoft and Adobe software

Critical security updates for users of Microsoft and Adobe software | ICT Security-Sécurité PC et Internet | Scoop.it
Patch Tuesday has been and gone, which means that if you're responsible for the security of the computers in your office - or the ones you use at home - it's time to update your systems once again.
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Microsoft fixes 9 flaws, Adobe 3 in April's Tuesday update

Microsoft fixes 9 flaws, Adobe 3 in April's Tuesday update | ICT Security-Sécurité PC et Internet | Scoop.it
As expected Microsoft released seven important and two critical fixes for Windows, Internet Explorer and other Microsoft products. Adobe followed suite releasing fixes for ColdFusion, Flash and Sho...
Gust MEES's insight:

 

                              ===> Update asap!!! <===

Gust MEES's curator insight, April 9, 2013 5:54 PM

 

                                 ===> Update asap!!! <===

 

 

Scooped by Gust MEES
Scoop.it!

Operating System Infection Rates: Application Vulnerabilities & Exploits Trend Up, Increase OS Infection Rates

Operating System Infection Rates: Application Vulnerabilities & Exploits Trend Up, Increase OS Infection Rates | ICT Security-Sécurité PC et Internet | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
Gust MEES's insight:

                       

                      ===> Be AWARE of the MALWARE!!! <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The number of reported application vulnerabilities has increased, Microsoft report says

The number of reported application vulnerabilities has increased, Microsoft report says | ICT Security-Sécurité PC et Internet | Scoop.it
The number of application vulnerabilities reported during the first half of 2012 increased compared to previous semesters...

 

 

 

A MUST read:

http://www.csoonline.com/article/718416/the-number-of-reported-application-vulnerabilities-has-increased-microsoft-report-says?source=rss_news&amp;amp;utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.