ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

mySchool! - Le Portail de l'Éducation du Grand-Duché de Luxembourg

mySchool! - Le Portail de l'Éducation du Grand-Duché de Luxembourg | ICT Security-Sécurité PC et Internet | Scoop.it
Fiches de sécurité informatique
No comment yet.
Scooped by Gust MEES
Scoop.it!

UK developing cyber-weapons programme to counter cyber war threat | UK news | The Guardian

UK developing cyber-weapons programme to counter cyber war threat | UK news | The Guardian | ICT Security-Sécurité PC et Internet | Scoop.it
Military to gain a new range of offensive options to defend critical installations around the country from cyber attacks...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple's malware challenge: Usability as its security world changes | ZDNet

Apple's malware challenge: Usability as its security world changes | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
Apple’s security reality is changing right before our eyes and the company’s response will be telling.
No comment yet.
Scooped by Gust MEES
Scoop.it!

A quick guide to mobile malware (part 2)

A quick guide to mobile malware (part 2) | ICT Security-Sécurité PC et Internet | Scoop.it
WHY (SHOULD I BE WORRIED)?

Worm:iOS/Ikee.A changed the phone's wallpaper
Last week I gave a brief summary of the kinds of threats a user might encounter on the smartphones of today. This week’s article is supposed to cover the reasons why a user would worry about mobile malware, so let me give the short answer now:

Usually, mobile malware attacks are motivated by: Bragging rights; money; stealing personal information that can be sold for money. For the user that gets hit by the malware, it means: Losing control over your phone; losing your money; someone else might be using your personal details for who-knows-what.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac malware authors release a new, more dangerous version | ZDNet

Mac malware authors release a new, more dangerous version | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
Apple finally responded to the Mac Defender outbreak, with a technical note containing removal instructions and the promise of a removal tool.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Le cookiejacking, nouvelle menace pour Internet Explorer

Le cookiejacking, nouvelle menace pour Internet Explorer | ICT Security-Sécurité PC et Internet | Scoop.it
Un chercheur italien a démontré comment dérober à distance des informations de connexion stockées dans des cookies par IE. La technique est complexe et n’inquiète pas Microsoft, à ce stade.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple - iOS-Update v4.3.4 deaktiviert Jailbreak - Apple iPad - PC-WELT

Apple - iOS-Update v4.3.4 deaktiviert Jailbreak - Apple iPad - PC-WELT | ICT Security-Sécurité PC et Internet | Scoop.it
Die neueste Version des mobilen Betriebssystems iOS schließt eine kritische Sicherheitslücke und deaktiviert den Jailbreak auf iPhone, iPad und iPod Touch.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Krebs’s 3 Basic Rules for Online Safety — Krebs on Security

Krebs’s 3 Basic Rules for Online Safety — Krebs on Security | ICT Security-Sécurité PC et Internet | Scoop.it
Yes, I realize that’s an ambitious title for a blog post about staying secure online, but there are a handful of basic security principles that — if followed religiously — can blunt the majority of malicious threats out there today.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Modern Mac owners need to ignore the dinosaurs and get protection | ZDNet

Modern Mac owners need to ignore the dinosaurs and get protection | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
I can’t believe that we’re still having a discussion over whether or not the bad guys have begun targeting Mac users. I’ve one word to describe these people who choose to ignore the real problems facing the modern Mac user and instead choose to live in the past - Dinosaurs.

Times have changed. The old-guard, fervor-filled dinosaurs of the past who for some reason (ego, self esteem, ignorance …) want to frantically and fanatically cheer lead have been replaced by the modern Mac user who sees the Mac as a tool rather than an idol. What is a modern Mac user? Well, for starters I see them as someone who started using a Mac since its transition from the PowerPC architecture to Intel architecture, a move which began in mid-2006. Much of the zealotry and nonsense spouted today dates back to the PowerPC years when owning a Mac was seen by many as a deviant pastime. Times have changed.

The modern Mac user also uses their machine in a very different way to the dinosaurs of old. People nowadays surf a lot more, social media has in many ways replaced email as the preferred method of communication. Multimedia on the web has exploded. More people doing more things in ways that we couldn’t really have dreamed possible a decade ago.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Florent Fortuné, Websense : Les cinq types de cybercriminels, tous les hackers sont-ils identiques ? - Global Security Mag Online

Florent Fortuné, Websense : Les cinq types de cybercriminels, tous les hackers sont-ils identiques ? - Global Security Mag Online | ICT Security-Sécurité PC et Internet | Scoop.it
« Hacker » est un terme utilisé depuis des années pour désigner de nombreuses personnes et qui est assez bien accepté comme nom générique pour les (...)...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Sécurité PC et Internet/sources d'information - un knol de Gust MEES

Sécurité PC et Internet/sources d'information - un knol de Gust MEES | ICT Security-Sécurité PC et Internet | Scoop.it
L'insécurité sur Internet, les ordinateurs (PC et Mac) et les smartphones (exemples STUXNET et ZEUS) progresse tellement vite...
No comment yet.
Scooped by Gust MEES
Scoop.it!

PC Security-HowTo Secure my PC - a knol by Gust MEES

PC Security-HowTo Secure my PC - a knol by Gust MEES | ICT Security-Sécurité PC et Internet | Scoop.it
Secure your PC by easy to follow steps. A knol about a series of Knol-Tutorials who will show you how to secure your PC and...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Trojans, viruses, worms: How does malware get on PCs and Macs? | ZDNet

Trojans, viruses, worms: How does malware get on PCs and Macs? | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
What’s the best way to deal with malicious software on PCs and Macs?
No comment yet.
Scooped by Gust MEES
Scoop.it!

A quick guide to mobile malware (part 1)

A quick guide to mobile malware (part 1) | ICT Security-Sécurité PC et Internet | Scoop.it
From late 2010 to the first few months of 2011, there’s been a fair bit of buzz in the tech media about how mobile malware may be the big IT security issue for 2011. (To be fair, I also said something similar in a previous post.)

Even though PC threats are still hugely more prevalent, mobile malware tends to get more press because they’re like the up-and-coming starlets of tech threats – they’re fresh, new, interesting, and frankly, just a little sexier than plain ol’ Windows malware.
No comment yet.
Scooped by Gust MEES
Scoop.it!

A quick guide to mobile malware (part 3)

A quick guide to mobile malware (part 3) | ICT Security-Sécurité PC et Internet | Scoop.it
This is the third and final article in this series on mobile malware.

HOW (CAN I PROTECT MYSELF)?

Permissions request list from Trojan:Android/AdSMS
In my previous articles, I’ve covered what kind of mobile threats have emerged in the first half of 2011 and why these malicious programs may cause concern for smartphone users.

Now, let’s assume you’re a cautious smartphone user who wants to make sure you don’t get hit by a malware infection on your smartphone. What can you do?
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple malware evolved – No password required | Naked Security

Apple malware evolved – No password required | Naked Security | ICT Security-Sécurité PC et Internet | Scoop.it
A new variant of the fake security software for OS X was discovered today and it no longer requires administrators to enter their passwords. We take a brief look at the advancement of malware on the Mac over the last month.
No comment yet.
Scooped by Gust MEES
Scoop.it!

L'alerte au faux virus sur Mac, un vrai problème

L'alerte au faux virus sur Mac, un vrai problème | ICT Security-Sécurité PC et Internet | Scoop.it
SECURITE - Apple publie un guide pour se débarrasser du malware Mac Defender, en attendant une mise à jour de son OS...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple Mac OS X update to put Mac Defender malware issue to bed | ZDNet

Apple Mac OS X update to put Mac Defender malware issue to bed | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
Apple will deliver a Mac OS X update “in coming days” that will put its Mac Defender malware headaches to rest...
No comment yet.
Scooped by Gust MEES
Scoop.it!

How to avoid or remove Mac Defender malware

A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus. The user is then offered Mac Defender "anti-virus" software to solve the issue.

This “anti-virus” software is malware (i.e. malicious software). Its ultimate goal is to get the user's credit card information which may be used for fraudulent purposes.

The most common names for this malware are MacDefender, MacProtector and MacSecurity.

In the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants. The update will also help protect users by providing an explicit warning if they download this malware.

In the meantime, the Resolution section below provides step-by-step instructions on how to avoid or manually remove this malware.
No comment yet.
Scooped by Gust MEES
Scoop.it!

TeachersFirst: Timely Topics: Internet Safety; Bullying; Cyberbullying...

TeachersFirst: Timely Topics: Internet Safety; Bullying; Cyberbullying... | ICT Security-Sécurité PC et Internet | Scoop.it
Tough Economic Times ; Internet Safety; Bullying; Cyberbullying...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Accueil | Bee secure

Accueil | Bee secure | ICT Security-Sécurité PC et Internet | Scoop.it
BEESECURE, the Luxembourg Portal for Internet Security...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Web Of Trust - Website Trust Ratings from Other Internet Users

Web Of Trust - Website Trust Ratings from Other Internet Users | ICT Security-Sécurité PC et Internet | Scoop.it
WOT relies on a "crowdsourced" model of information gathering. What that means is that registered WOT members provide ratings of websites based on four criteria: Trustworthiness, Vendor reliability, Privacy and Child Safety. Members rate sites that they actually visit and interact with.

Much like a rating system that you might find in an online store or other votable venue, sites accumulate a reputation based on how people vote.

Those ratings are then made available to anyone.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Why malware for Macs is on its way | ZDNet

Why malware for Macs is on its way | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
This isn’t about Mac-versus-Windows. It’s about engineering and (shady) economics.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Sécurité PC et Internet/logiciels de sécurité spéciaux - un knol de Gust MEES

Sécurité PC et Internet/logiciels de sécurité spéciaux - un knol de Gust MEES | ICT Security-Sécurité PC et Internet | Scoop.it
Un antivirus et un pare-feu ne suffisent plus, disons le clairement. Proposition d'une liste de logiciels spéciaux qui...
No comment yet.