ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims

Can Apple read your iMessages? Ars deciphers “end-to-end” crypto claims | ICT Security-Sécurité PC et Internet | Scoop.it
"Black-box" testing uncovers several ways the NSA could tap the popular service.

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 


Via Gust MEES
Gust MEES's insight:

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, June 26, 2013 5:39 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.


                         ===> Nobody Is Perfect!!! <===


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, June 26, 2013 5:42 PM

 

As Soghoian and other critics admit, the end-to-end encryption included with iMessage may make it impossible for Apple to decrypt conversations, at least in some circumstances. But in the absence of key details that Apple has steadfastly declined to provide, customers who are especially concerned about their privacy would do well to assume otherwise.

 

                         ===> Nobody Is Perfect!!! <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Scooped by Gust MEES
Scoop.it!

Sicherheitsmaßnahme Festplattenverschlüsselung – Nicht nur für Laptops!

Sicherheitsmaßnahme Festplattenverschlüsselung – Nicht nur für Laptops! | ICT Security-Sécurité PC et Internet | Scoop.it
Festplattenverschlüsselung sorgt für sichere Daten bei Diebstahl
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/ict-security-tools/?tag=Encryption

 

Scooped by Gust MEES
Scoop.it!

Indiana University hospital laptop stolen, contains data on 10K patients

Indiana University hospital laptop stolen, contains data on 10K patients | ICT Security-Sécurité PC et Internet | Scoop.it
The laptop was password protected, but not encrypted. The theft marks the second breach in just over a year that affected the university health care system.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Do programmers understand the meaning of PRIVATE?

Do programmers understand the meaning of PRIVATE? | ICT Security-Sécurité PC et Internet | Scoop.it
Public-key encryption relies on a pair of cryptographic keys, one public and the other private. You'd think that programmers would be able to tell which one to keep private and which one to make pu...
Gust MEES's insight:

Not too tricky, is it?

 

For all the software you're likely to use, such as OpenSSH, OpenSSL and GPG, private keys are labelled with the text PRIVATE KEY.

And that's the one you're supposed to keep private!

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

IT professionals do not display enough concern for data encryption

IT professionals do not display enough concern for data encryption | ICT Security-Sécurité PC et Internet | Scoop.it

Nearly two-thirds of IT professionals have admitted that they do not encrypt data stored on portable storage devices.

 

According to a survey of 106 delegates at IP Expo 2012 by iStorage, 64 per cent admitted to not encrypting data held on portable storage devices, while fewer (than those surveyed in 2011) believed that data loss was a serious concern. (!!!???)

 

============================================

 

Gust MEES

 

I am actually preparing a new FREE course about the "Cyber-Security Practice-the basics" which everyone can and should learn, very easy actually... There will be also included a FREE solution for encrypting the complete Hard Disk, stay tuned... It will be published here (soon):

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

============================================

 

 

Read more, a MUST:

http://www.scmagazineuk.com/it-professionals-do-not-display-enough-concern-for-data-encryption/article/270509/?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Stolen Nasa laptop contained sensitive staff information

Stolen Nasa laptop contained sensitive staff information | ICT Security-Sécurité PC et Internet | Scoop.it
A stolen laptop belonging to Nasa contained sensitive personal information on employees and contractors, the space agency has confirmed.

 

===========================================

 

Gust MEES

 

Must be really difficult to learn the basics of Cyber-Security for NASA! Already in 2008 a worm has infected machines on the International Space Station due to an infected USB flash drive :(

Naivety is the worst enemy for Cyber-Security!

 

Read also:

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

 

===========================================

 

Read more:

http://www.scmagazineuk.com/stolen-nasa-laptop-contained-sensitive-staff-information/article/268422/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Encryption on your HD: How to Break Into a Windows PC, easy without...

Encryption on your HD: How to Break Into a Windows PC, easy without... | ICT Security-Sécurité PC et Internet | Scoop.it
If you're trying to break into a Windows computer—whether you've forgotten your password or are hatching a more sinster plan—you have quite a few options.

 

Gust MEES: Encryption of your HD is a MUST!

 

Read more why...:

http://lifehacker.com/5674972/how-to-break-into-a-windows-pc-and-prevent-it-from-happening-to-you

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CipherUSB: Encryption for Flash, USB or optical drives

CipherUSB: Encryption for Flash, USB or optical drives | ICT Security-Sécurité PC et Internet | Scoop.it
Addonics announced CipherUSB, a USB pass-through adapter that provides a way to encrypt data stored on flash drives, flash media, USB hard drives as well as Blu-ray, DVD or CD media.

 

The CipherUSB is the size of a typical flash drive. Just plug the USB drive, flash drive or optical drive to the device end of the CipherUSB, and then plug the CipherUSB into your computer’s USB port.

 

The drive will appear on your computer in seconds and is ready for use like an ordinary USB drive. There is no password to remember or software or drivers to install.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Satellite telephony encryption cracked

Satellite telephony encryption cracked | ICT Security-Sécurité PC et Internet | Scoop.it
Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst Görtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have cracked the encryption algorithms of the European Telecommunications Standards Institute (ETSI), which is used globally for satellite telephones, and revealed significant weaknesses.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Smartcard Encryption Cracked by German Scientists - Softpedia

Smartcard Encryption Cracked by German Scientists - Softpedia | ICT Security-Sécurité PC et Internet | Scoop.it
Smartcard Encryption Cracked by German Scientists...

 

Researchers from the Ruhr University in Germany found a way to get past the encryption that protects the chip cards considered up until recently to be unbreakable, allowing potential villains to replicate and alter them as they please.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Encryption can’t protect your data while you’re logged in | PCWorld

Encryption can’t protect your data while you’re logged in | PCWorld | ICT Security-Sécurité PC et Internet | Scoop.it
If you don't use a password to unlock your computer, smartphone, or tablet, most encryption software won't protect your private or proprietary data if the device is lost or stolen.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Reasons to Encrypt Your Data

Reasons to Encrypt Your Data | ICT Security-Sécurité PC et Internet | Scoop.it
Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to grow and then send a ...

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.

 

Gust MEES's insight:

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 
Gust MEES's curator insight, May 24, 2013 4:56 PM

 

Encryption is the process of transforming information in such a way that an unauthorized third party cannot read it; a trusted person can decrypt data and access it in its original form.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Scooped by Gust MEES
Scoop.it!

New Ransomware Encrypts Victim Data | threatpost

New Ransomware Encrypts Victim Data | threatpost | ICT Security-Sécurité PC et Internet | Scoop.it
An unusual new strain of ransomware makes good on its threat, doing what the majority of other varieties only claim to do.

 

In this case however, Blinka has witnessed the Trojan encrypting images, documents and executables in an attempt to hinder any removal attempts. Whomever is responsible for the malware is not in the business of completely crippling machines, so Windows system files are not included in the forced encryption. Infected computers will still function for the most part, but data will be lost and many third-party programs will not work.


Gust MEES's insight:

                     ===> BEWARE of the MALWARE!!! <===

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Scooped by Gust MEES
Scoop.it!

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives | ICT Security-Sécurité PC et Internet | Scoop.it
October 23, 2009

"Evil Maid" Attacks on Encrypted Hard Drives
Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this:

Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down.

Step 2: You boot your computer using the attacker's hacked bootloader, entering your encryption key. Once the disk is unlocked, the hacked bootloader does its mischief. It might install malware to capture the key and send it over the Internet somewhere, or store it in some location on the disk to be retrieved later, or whatever.
No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

NASA to Encrypt Laptops after Personal Details Got Stolen

NASA to Encrypt Laptops after Personal Details Got Stolen | ICT Security-Sécurité PC et Internet | Scoop.it
NASA plans to implement full disk encryption on laptops after a security breach affected thousands of employees and contractors in the US, according to Infoworl...

Via Frederic GOUTH
No comment yet.
Scooped by Gust MEES
Scoop.it!

NASA laptop with unencrypted data stolen from vehicle

NASA laptop with unencrypted data stolen from vehicle | ICT Security-Sécurité PC et Internet | Scoop.it
“On October 31, 2012, a NASA laptop and official NASA documents issued to a Headquarters employee were stolen from the employee's locked vehicle,” says a 13 November email to all NASA employees.

 

Read more:

http://www.infosecurity-magazine.com/view/29348/nasa-laptop-with-unencrypted-data-stolen-from-vehicle/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Mac Security Error Exposes Encrypted Data

Mac Security Error Exposes Encrypted Data | ICT Security-Sécurité PC et Internet | Scoop.it
A security flaw rolled out with Apple's latest update to Mac OS X Lion, version 10.7.3, may expose file passwords thought to be protected via Apple's data encryption system.

 

Read more... Mac users should do so!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

SafeSync: Verschlüsselter Gratis-Online-Speicher von Trend Micro

SafeSync: Verschlüsselter Gratis-Online-Speicher von Trend Micro | ICT Security-Sécurité PC et Internet | Scoop.it
Das Sicherheits-Unternehmen Trend Micro hat eine Online-Speicher-Lösung für Privatpersonen vorgestellt, die besonders sicher sein soll:

 

SafeSync. Der Online-Speicher ist gratis und verschlüsselt, die Server stehen in Deutschland.

 

Online-Speicher gibt es viele, die bekanntesten dürften Dropbox, Microsoft Skydrive, Ubuntu One und Strato Hidrive Free sein; Google plant demnächst den Start einer eigenen Online-Festplatte namens Google Drive.

 

===> Jetzt hat auch Trend Micro ein derartiges Angebot gestartet und versucht dabei mit dem Thema Sicherheit zu punkten. <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Self-Encrypting Drives Are the Future of Storage

Why Self-Encrypting Drives Are the Future of Storage | ICT Security-Sécurité PC et Internet | Scoop.it
Almost every day we read about some new data leak and, as a result, almost every IT company seeks new and better security solutions.

 

Why Self-Encrypting Drives Are the Future of Storage... Read more...

No comment yet.