ICT Security-Sécurité PC et Internet
87.1K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Serious security: Three changes that could turn the tide on hackers | #ProactiveTHINKing #CyberSecurity

Serious security: Three changes that could turn the tide on hackers | #ProactiveTHINKing #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
It's all gone. All the passwords, all the user names, all the credit card numbers, the selfies, the fingerprints, the emails.

The state of tech security is currently so dire that it feels like anything you have ever stored on a computer, or a company or government has ever stored about you, has already been hacked into by somebody.

It's become so bad that it's already generated a mirthless cliché -- that there are only two types of companies: the ones that have been hacked and the ones that don't yet know they've been hacked.

 

So what can we do? I'd suggest three decent starting points.

 

First, as consumers we need to stop shrugging and accepting data leaks as business as usual. Security should influence our buying decisions: the organisations we deal with won't take security seriously unless customers and the public do, too. Our behaviour should signal to companies that good security can be a competitive differentiator. At the moment our apathy too often lets them off the hook. We as consumers need to understand the value of our data and then hold those that store it to account.

 

Second, companies should design security as a fundamental part of the services we use, not a nice-to-have addition. Few hackers will give a new service time to implement security before attacking it, yet too many innovations (the IoT, I'm looking at you) seem to think security is a secondary consideration until they make it big. Until that changes, security will always be an afterthought.

 

Third, the use of strong encryption should be the standard, not the exception. The digital services we use are now too intimate, too important, to be left unencrypted. The revelations of the last few years have shown us that no stream of data on the internet will go untapped by crooks or government.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

Gust MEES's insight:
It's all gone. All the passwords, all the user names, all the credit card numbers, the selfies, the fingerprints, the emails.

The state of tech security is currently so dire that it feels like anything you have ever stored on a computer, or a company or government has ever stored about you, has already been hacked into by somebody.

It's become so bad that it's already generated a mirthless cliché -- that there are only two types of companies: the ones that have been hacked and the ones that don't yet know they've been hacked.

 

So what can we do? I'd suggest three decent starting points.

 

First, as consumers we need to stop shrugging and accepting data leaks as business as usual. Security should influence our buying decisions: the organisations we deal with won't take security seriously unless customers and the public do, too. Our behaviour should signal to companies that good security can be a competitive differentiator. At the moment our apathy too often lets them off the hook. We as consumers need to understand the value of our data and then hold those that store it to account.

 

Second, companies should design security as a fundamental part of the services we use, not a nice-to-have addition. Few hackers will give a new service time to implement security before attacking it, yet too many innovations (the IoT, I'm looking at you) seem to think security is a secondary consideration until they make it big. Until that changes, security will always be an afterthought.

 

Third, the use of strong encryption should be the standard, not the exception. The digital services we use are now too intimate, too important, to be left unencrypted. The revelations of the last few years have shown us that no stream of data on the internet will go untapped by crooks or government.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Gartner Identifies the Top 10 Internet of Things Technologies for 2017 and 2018 | #IoT | #IoE | #CyberSecurity

Gartner Identifies the Top 10 Internet of Things Technologies for 2017 and 2018 | #IoT | #IoE | #CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it

Last week Gartner identified the Top 10 Internet of Things Technologies for 2017 and 2018.

Learn more / En savoir plus / Mehr erfahren:

 

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

Gust MEES's insight:

Last week Gartner identified the Top 10 Internet of Things Technologies for 2017 and 2018.

Learn more / En savoir plus / Mehr erfahren:

 

 

https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=SHODAN+Search+Engine

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Sécuriser les objets connectés dès leur conception

Sécuriser les objets connectés dès leur conception | ICT Security-Sécurité PC et Internet | Scoop.it

Des chercheurs américains ont développé une méthode d’analyse inédite pour protéger les objets connectés des failles de sécurité.

La popularisation des objets connectés du quotidien entraîne aujourd’hui une réduction des standards de sécurité. Comme nous l’a confié Olivier Mével lors de notre enquête "dès que les objets vont devenir moins chers, les données vont être moins protégées". Des ingénieurs en informatique ont décidé de résoudre ce problème et ont développé un outil permettant aux concepteurs de hardware de tester la sécurité des appareils électroniques de l’IoT.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things



Gust MEES's insight:

Des ingénieurs en informatique ont décidé de résoudre ce problème et ont développé un outil permettant aux concepteurs de hardware de tester la sécurité des appareils électroniques de l’IoT.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things



No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Gadgets in the Internet of Things Must Be Programmed to Die

Why Gadgets in the Internet of Things Must Be Programmed to Die | ICT Security-Sécurité PC et Internet | Scoop.it
Everyone's talking about the internet of things. They talk about smart lightbulbs programmed to glow purple when it rains, and smoke detectors that do email alerts, and routers that network our houses. But there's one thing they're not talking about, and that could be a problem. No one is asking whether these devices should also be programmed to die when they get old.


This problem will only get worse as the internet of things grows. So many devices that were once unremarkable will morph into mini-computers that hackers will view as targets, things that can be misused for evil purposes. “I don’t think we’re at the point where we can write perfect software,” Geer says.

One way to reduce the danger, Geer says, is to build devices that will eventually die. Maybe we have to: after all, all code has bugs, and in the course of time, these bugs are going to be found and then exploited by a determined attacker.

As we build more and more devices like thermostats and lightbulbs and smart trashcans that are expected to last much longer than a PC or a phone, maybe we need to design them to sign off at the point where they’re no longer supported with software patches. Otherwise, we’re in for a security nightmare.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


No comment yet.
Scooped by Gust MEES
Scoop.it!

Teaching Students (and Teachers) to Dig Deeper

Teaching Students (and Teachers) to Dig Deeper | ICT Security-Sécurité PC et Internet | Scoop.it

A backwoodsman went to a home improvement store and purchased a chainsaw to replace an old, worn-out saw. After a month, the backwoodsman returned the saw to the store, complaining,

 

===> In order to think critically, one must understand what one is criticizing. The way to understand something is to look at it analytically... <===



 

 

Gust MEES's insight:

 

===> In order to think critically, one must understand what one is criticizing. The way to understand something is to look at it analytically... <===

 Learn more: - http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Critical-Thinking&nbsp;-&nbsp;http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking&nbsp;There is much more, BUT start first with the mentioned above ;) 
No comment yet.
Scooped by Gust MEES
Scoop.it!

Think Differently on Cybersecurity Or Fall Farther Behind, Former FBI Lawyer Says

Think Differently on Cybersecurity Or Fall Farther Behind, Former FBI Lawyer Says | ICT Security-Sécurité PC et Internet | Scoop.it
Steven Chabinsky, former top lawyer in the FBI's cybersecurity section, thinks attackers are ahead of us and we need to change our defensive thinking.

 

"When that happens, you know you have a strategy problem on your hands. Had the strategy been working, people would have been executing properly and succeeding. But it isn't. The government and private sector were executing on their plans very well and they didn't improve cybersecurity every year. There was objectively better security, but subjectively, against threat actors, they were gaining momentum. The threat continues to outpace us."

 

Read more, a MUST:

http://threatpost.com/en_us/blogs/think-differently-cybersecurity-or-fall-farther-behind-former-fbi-lawyer-says-091912

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Artificial intelligence-powered malware is coming, and it's going to be terrifying | #AI #CyberSecurity 

Artificial intelligence-powered malware is coming, and it's going to be terrifying | #AI #CyberSecurity  | ICT Security-Sécurité PC et Internet | Scoop.it
As artificial intelligence becomes more and more sophisticated, Palmer told Business Insider in an interview at the FT Cybersecurity Summit in London in September, it will inevitably find its way into malware — with potentially disastrous results for the businesses and individuals that hackers target.

It's important to remember that Palmer is in the security business: It's his job to hype up the threats out there (present and future), and convince customers that Darktrace is the only one that can save them. It's a $500 million (£401 million) British firm, with an AI-driven approach to defend networks. It creates an "immune system" for customers that learns how businesses operate then monitors for potential irregularities.

 

Malware will learn to mimic people you know


Google has taught neural network AI to play Go — but the tech could also be used for far more nefarious ends. Mustafa Suleyman/Twitter

Using recurring neural networks, it's already possible to teach AI software to mimic writing styles — whether that's clickbait viral news articles or editorial columns from The Guardian. Palmer suggests that in the future, malware will be able to look through your correspondence, learn how you communicate, and then mimic you in order to infect other targets.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=AI

 

Gust MEES's insight:
As artificial intelligence becomes more and more sophisticated, Palmer told Business Insider in an interview at the FT Cybersecurity Summit in London in September, it will inevitably find its way into malware — with potentially disastrous results for the businesses and individuals that hackers target.

It's important to remember that Palmer is in the security business: It's his job to hype up the threats out there (present and future), and convince customers that Darktrace is the only one that can save them. It's a $500 million (£401 million) British firm, with an AI-driven approach to defend networks. It creates an "immune system" for customers that learns how businesses operate then monitors for potential irregularities.

 

Malware will learn to mimic people you know


Google has taught neural network AI to play Go — but the tech could also be used for far more nefarious ends. Mustafa Suleyman/Twitter

Using recurring neural networks, it's already possible to teach AI software to mimic writing styles — whether that's clickbait viral news articles or editorial columns from The Guardian. Palmer suggests that in the future, malware will be able to look through your correspondence, learn how you communicate, and then mimic you in order to infect other targets.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=AI

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Government Don’t Address Network Vulnerabilities Proactively

Government Don’t Address Network Vulnerabilities Proactively | ICT Security-Sécurité PC et Internet | Scoop.it
Half of the respondents are reactive to network vulnerabilities and, as a result, struggle to maintain compliance with mandated IT policies and standards.


Learn more:


http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/


Gust MEES's insight:
Half Of Government Agencies Don’t Address Network Vulnerabilities Proactively

Learn more:


http://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/



No comment yet.
Scooped by Gust MEES
Scoop.it!

The Internet of Things: Data Goldmine and Social Nightmare

The Internet of Things: Data Goldmine and Social Nightmare | ICT Security-Sécurité PC et Internet | Scoop.it
Social inequality, privacy erosion, the exploitation of employees — the Internet of Things has huge downsides, according to a Pew Research Center study.


But experts also warned of the some of negative ramifications of the new hyper-connected environment. “Concerning the bad things that can be done with the Internet and big data, it’s a rat race between those with good and bad intentions in terms of setting up security and hacking that same security,” Pew quoted Maurice Vergeer, researcher in communication science at Radboud University in the Netherlands, as saying.


The problem is that increasingly more people are dependent on it. So, any damage that’ll be done will affect more and more people.”


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things



Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why aren't we learning long-term lessons from security disasters?

Why aren't we learning long-term lessons from security disasters? | ICT Security-Sécurité PC et Internet | Scoop.it
Shouldn't we be thinking further ahead, developing new protocols, processes and technologies that don't stick a hasty patch over the latest problem, but push us towards a world where whole categori...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Proactive+Thinking

 

Scooped by Gust MEES
Scoop.it!

Proactive detection of security incidents II - Honeypots | ENISA

An increasing number of complex attacks demand improved early warning detection capabilities for CERTs. By having threat intelligence collected without any impact on production infrastructure, CERTs can better defend their constituencies assets. Honeypots are powerful tools that can be used to achieve this goal. This document is the final report of the ‘Proactive Detection of Security Incidents: Honeypots’ study.  

Publication date: Nov 22, 2012

No comment yet.