Feed aggregator

Sicherheitslücke: Hacker können hören, was Kinder der Barbie anvertrauen

Cyber Crime Feeds - Fri, 12/04/2015 - 12:31
Die Puppe heißt "Hello Barbie". Das Besondere: Was man ihr sagt, wandert auf das Smartphone und auf eine Server. Seit Monaten warnen Experten vor den Risiken. Wohl völlig zurecht, wie sich nun zeigt.
Categories: Cyber Crime Feeds

Building a Career on Taking Apart Malware

Cyber Threats Activists - Fri, 12/04/2015 - 12:30
Malware: How does it work, who built it and what - or who - is it designed to target? Answering these types of questions is a job for Marion Marschalek of Cyphort, who reverse-engineers malicious code for a living.

Building a Career on Taking Apart Malware

Economic Cyber Threats - Fri, 12/04/2015 - 12:30
Malware: How does it work, who built it and what - or who - is it designed to target? Answering these types of questions is a job for Marion Marschalek of Cyphort, who reverse-engineers malicious code for a living.

JD Wetherspoon hack, Snoopers' Charter and VTech woes: The week in security

Cyber Threats Activists - Fri, 12/04/2015 - 12:21
04 Dec 2015. Jason Murdock Hacking and cyber crime again dominated the headlines this week, after UK pub chain JD Wetherspoon and toy manufacturer VTech both fell victim to attacks. Meanwhile, there were developments in the US Office of Personnel Management story when the Chinese government....

5 Stories We Didn't Get to Write, Week of Dec. 4

Economic Cyber Threats - Fri, 12/04/2015 - 12:02
Instart Logic and Verisign Partner to Combat DDoS Attacks: Application delivery solution provider Instart Logic is collaborating with Verisign, a domain name and internet security provider, on a solution that provides distributed denial of service (DDoS) scrubbing capabilities. read more

Emmanuelle Claeys, Consultante mc2i Groupe : Big Brother is costing you

Cyber Security News - Fri, 12/04/2015 - 11:57
L'assemblée nationale a voté en mars dernier le projet de loi relatif au renseignement permettant l'accès aux services secrets de nos données personnelles. Son but officiel : repérer les comportements suspects sur Internet afin de désamorcer les menaces criminelles, notamment terroristes.
Categories: Cyber Security News

Emmanuelle Claeys, Consultante mc2i Groupe : Big Brother is costing you

Cyber Threats Activists - Fri, 12/04/2015 - 11:57
L'assemblée nationale a voté en mars dernier le projet de loi relatif au renseignement permettant l'accès aux services secrets de nos données personnelles. Son but officiel : repérer les comportements suspects sur Internet afin de désamorcer les menaces criminelles, notamment terroristes.

Jak se bránit krádeži identity? Zvažte, komu doklad ukážete, říká expert

Cyber Security News - Fri, 12/04/2015 - 11:38
Pravidla, která by zaručila stoprocentní bezpečnost při obchodování na internetu, neexistují. Vedoucí pražské poradny Sdružení obrany spotřebitelů - Asociace z.s. Tomáš Palla čtenářům v on-line rozhovoru iDNES.cz doporučil vyhnout se hlavně vysloveně rizikovému chování. Ohledně občanek připomněl, že jejich ofocení je možné jen s vašim souhlasem.
Categories: Cyber Security News

Jak se bránit krádeži identity? Zvažte, komu doklad ukážete, říká expert

Cyber Crime Feeds - Fri, 12/04/2015 - 11:38
Pravidla, která by zaručila stoprocentní bezpečnost při obchodování na internetu, neexistují. Vedoucí pražské poradny Sdružení obrany spotřebitelů - Asociace z.s. Tomáš Palla čtenářům v on-line rozhovoru iDNES.cz doporučil vyhnout se hlavně vysloveně rizikovému chování. Ohledně občanek připomněl, že jejich ofocení je možné jen s vašim souhlasem.
Categories: Cyber Crime Feeds

Anonymous claims hack of police servers, releases case data in #OpSingleGateway

Cyber Threats Activists - Fri, 12/04/2015 - 11:33
The Bangkok Post reports: Activist hackers from the Anonymous collective are claiming they have again penetrated secure Thai government computers, this time leaking private information from Royal Thai Police servers in a continuing protest against plans for a single internet gateway, which the group maintains have not been scrapped.

Le FBI et Microsoft font trembler le botnet Dorkbot

Cyber Security News - Fri, 12/04/2015 - 11:23
Microsoft a fait sa bonne action. La firme de Redmond a déclaré jeudi avoir collaboré avec les autorités de plusieurs régions (...)
Categories: Cyber Security News

Le FBI et Microsoft font trembler le botnet Dorkbot

Cyber Crime Feeds - Fri, 12/04/2015 - 11:23
Microsoft a fait sa bonne action. La firme de Redmond a déclaré jeudi avoir collaboré avec les autorités de plusieurs régions (...)
Categories: Cyber Crime Feeds

The Power of Prevention: What SMBs Need to Know About Cybersecurity

Economic Cyber Threats - Fri, 12/04/2015 - 11:09
There is no such thing as a company that can't afford security. But where do you start?

Social Media's Troubling Terrorist Infestation

Cyber Threats Activists - Fri, 12/04/2015 - 11:07
For individuals, social networking means sharing small moments and major events in life. For businesses, social media marketing can help build brands. For terrorist groups such as ISIS, the Islamic State of Iraq and Syria, social networks increasingly are the tool of choice for delivering messages of hate and recruiting new members to their cause.

US, China agree to guidelines for requesting cybercrime assistance

Cyber Threats Activists - Fri, 12/04/2015 - 11:04
The United States and China have reached an agreement on guidelines for requesting assistance on cybercrime and other malicious online activities. The agreement was reached in talks in Washington this week among officials including US Attorney General Loretta Lynch, US Department of Homeland....

US, China agree to guidelines for requesting cybercrime assistance

Economic Cyber Threats - Fri, 12/04/2015 - 11:04
The United States and China have reached an agreement on guidelines for requesting assistance on cybercrime and other malicious online activities. The agreement was reached in talks in Washington this week among officials including US Attorney General Loretta Lynch, US Department of Homeland....

Tracking hackers with their own digital shadow

Cyber Threats Activists - Fri, 12/04/2015 - 11:02
The age of digital business has, for the most part, been positive. It has increased the ease and speed of communication while at the same time as reducing the cost. But with more than 3 billion individuals interacting across social media, mobile and cloud services every day it means that digital footprints are increasing.

Iron-Clad Cloud Networks By @JamesCarlini | @CloudExpo #IoT #Cloud

Cyber Threats Activists - Fri, 12/04/2015 - 10:52
Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure which not susceptible to cyberattacks.

Iron-Clad Cloud Networks By @JamesCarlini | @CloudExpo #IoT #Cloud

Economic Cyber Threats - Fri, 12/04/2015 - 10:52
Today, most enterprises have some type of cloud-based solutions or are looking at cloud-based infrastructure for some of their enterprise applications. What is lacking in many organizations is the strategic design focus and sophisticated implementation for very secure infrastructure which not susceptible to cyberattacks.

Dzięki szybkiej edycji Wikipedii fan poznał członków ulubionego zespołu

Sekurak.pl - Fri, 12/04/2015 - 10:37
Pewien fan zespołu Peking Duk, w trakcie jednego z ostatnich koncertów tej grupy, w bardzo pomysłowy sposób oszukał mechanizmy kontroli dostępu do strefy zakulisowej. Dzięki wykonanej naprędce edycji artykułu w Wikipedii (fan dopisał swoje personalia do sekcji opisującej rodzinne powiązania członków zespołu) udało mu się przekonać ochronę do wpuszczenia go do strefy...

Pages