business analyst
46.1K views | +0 today
business analyst
Your new post is loading...
Your new post is loading...
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

It’s official: Seizure of hacker forum Darkode proves FBI can get anyone | Nobody Is Perfect

It’s official: Seizure of hacker forum Darkode proves FBI can get anyone | Nobody Is Perfect | business analyst | Scoop.it
A joint operation by the FBI and the law enforcement agencies of 19 other countries has led to the takedown of the notorious discussion forum for criminal hackers, Darkode.me. It was the most central English-speaking hub for the sale of credit card numbers, criminal hacking hardware, and malware written for commercial sale. Originally called Darkode.com, the forum had shifted several times in response to pressure from authorities and the “white hat” hacking community, adding layers upon layers of security.


It was a highly encrypted, invite-only forum hosted by true paranoiacs, and featuring a tiered access system designed to keep any unavoidable infiltrators away from the most sensitive discussions. With an air of true satisfaction, the FBI announcement makes the implication clear as day: if we can get Darkode, we can get anybody.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Darkode




Via Gust MEES
Gust MEES's curator insight, July 17, 2015 7:12 PM

A joint operation by the FBI and the law enforcement agencies of 19 other countries has led to the takedown of the notorious discussion forum for criminal hackers, Darkode.me. It was the most central English-speaking hub for the sale of credit card numbers, criminal hacking hardware, and malware written for commercial sale. Originally called Darkode.com, the forum had shifted several times in response to pressure from authorities and the “white hat” hacking community, adding layers upon layers of security.


It was a highly encrypted, invite-only forum hosted by true paranoiacs, and featuring a tiered access system designed to keep any unavoidable infiltrators away from the most sensitive discussions. With an air of true satisfaction, the FBI announcement makes the implication clear as day: if we can get Darkode, we can get anybody.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=cybercrime


http://www.scoop.it/t/securite-pc-et-internet/?tag=Darkode




Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Security Concerns Surrounding Web Browsers | Learning basics of CyberSecurity | Video

This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/



Via Gust MEES
Gust MEES's curator insight, December 18, 2014 5:16 PM
This video provides an in depth look at web browsers, how they are utilized and the security concerns that go along with their usage. At the end of the video...


Learn more:


https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/


Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

CrytoPHP Backdoored Thousands of Wordpress, Joomla and Drupal Websites

CrytoPHP Backdoored Thousands of Wordpress, Joomla and Drupal Websites | business analyst | Scoop.it
Security researchers have released a report examining a social engineering operation designed to trick admins into installing backdoor malware called CrytoPHP by way of of tainted CMS plugins and themes for WordPress, Joomla and Drupal.

The attackers lure targets into publishing the pirated themes and plugins by providing them for free, offerings that usually incur a fee for use.

“After being installed on a webserver the backdoor has several options of being controlled which include command and control server communication, mail communication as well as manual control,” the researchers revealed.

Via Gust MEES
Gust MEES's curator insight, November 24, 2014 2:30 PM

Security researchers have released a report examining a social engineering operation designed to trick admins into installing backdoor malware called CrytoPHP by way of of tainted CMS plugins and themes for WordPress, Joomla and Drupal.

The attackers lure targets into publishing the pirated themes and plugins by providing them for free, offerings that usually incur a fee for use.

“After being installed on a webserver the backdoor has several options of being controlled which include command and control server communication, mail communication as well as manual control,”the researchers revealed.


Rescooped by michel verstrepen from 21st Century Learning and Teaching
Scoop.it!

Internet Of Things | Analytics Trends | A below-the-surface look at 2015 analytics trends | Deloitte Analytics

Internet Of Things | Analytics Trends | A below-the-surface look at 2015 analytics trends | Deloitte Analytics | business analyst | Scoop.it
Take a below-the-surface look at Deloitte's 2015 Analytics Trends report.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

DoubleDirect MitM Attack Targets Android, iOS and OS X Users | CyberSecurity

DoubleDirect MitM Attack Targets Android, iOS and OS X Users | CyberSecurity | business analyst | Scoop.it
Security researchers have discovered a new type of "Man-in-the-Middle" (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world.
The MitM attack, dubbed DoubleDirect, enables an attacker to redirect a victim’s traffic of major websites such as Google, Facebook and Twitter to a device controlled by the attacker. Once done, cyber crooks can steal victims’ valuable personal data, such as email IDs, login credentials and banking information as well as can deliver malware to the targeted mobile device.
San Francisco-based mobile security firm Zimperium detailed the threat in a Thursday blog post, revealing that the DoubleDirect technique is being used by attackers in the wild in attacks against the users of web giants including Google, Facebook, Hotmail, Live.com and Twitter, across 31 countries, including the U.S., the U.K. and Canada.

Via Gust MEES
Gust MEES's curator insight, November 24, 2014 2:39 PM
Security researchers have discovered a new type of "Man-in-the-Middle" (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world.
The MitM attack, dubbed DoubleDirect, enables an attacker to redirect a victim’s traffic of major websites such as Google, Facebook and Twitter to a device controlled by the attacker. Once done, cyber crooks can steal victims’ valuable personal data, such as email IDs, login credentials and banking information as well as can deliver malware to the targeted mobile device.
San Francisco-based mobile security firm Zimperium detailed the threat in a Thursday blog post, revealing that the DoubleDirect technique is being used by attackers in the wild in attacks against the users of web giants including Google, Facebook, Hotmail, Live.com and Twitter, across 31 countries, including the U.S., the U.K. and Canada.
Rescooped by michel verstrepen from ICT Security-Sécurité PC et Internet
Scoop.it!

Apple l'admet : il y a des virus sur Mac !

Apple l'admet : il y a des virus sur Mac ! | business analyst | Scoop.it
Il semble bien que le mythe du Mac infaillible soit en train de tomber. Après l'épisode Flashback (un malware ciblant exclusivement les ...

 

La maturité pour Apple ?

Lorsque l'on regarde l'ancienne version de la page, le discours passé d'Apple fait sourire. Il était temps que l'entreprise redescende sur terre, et reconnaisse enfin la vulnérabilité de son OS aux menaces des cybercriminels.

 

L'épisode Flashback y est certainement pour quelque chose. L'entreprise à la pomme a sûrement pris conscience de quelque chose. On espère que cela la poussera à se focaliser davantage sur la sécurité, de même que ses consommateurs (qui se croient encore trop souvent hors d'atteinte).

 

En savoir plus :

http://www.linformaticien.com/actualites/id/25390/apple-l-admet-il-y-a-des-virus-sur-mac.aspx

 


Via Gust MEES
No comment yet.