background preloader

Les menaces

Facebook Twitter

How the WannaCry Attack Will Impact Cyber Security. Putin, Trump, Assange, and More: The Most Dangerous People on the Internet in 2016. Not so long ago, the internet represented a force for subversion, and WIRED’s list of the most dangerous people on the internet mostly consisted of rebellious individuals using the online world’s disruptive potential to take on the world’s power structures.

Putin, Trump, Assange, and More: The Most Dangerous People on the Internet in 2016

But as the internet has entered every facet of our lives, and governments and political figures have learned to exploit it, the most dangerous people on the internet today often are the most powerful people. A Russian dictator has evolved his tactics from suppressing internet dissent to using online media for strategic leaks and disinformation. A media mogul who rose to prominence on a wave of hateful bile now sits at the right hand of the president. And a man who a year ago was a reality television star and Twitter troll is now the leader of the free world. Vladimir Putin. Log In. “I had no way of differentiating the call I just received from a prank call,” Mr.

Log In

Tamene wrote in an internal memo, obtained by The New York Times, that detailed his contact with the F.B.I. It was the cryptic first sign of a cyberespionage and information-warfare campaign devised to disrupt the 2016 presidential election, the first such attempt by a foreign power in American history. What started as an information-gathering operation, intelligence officials believe, ultimately morphed into an effort to harm one candidate, Hillary Clinton, and tip the election to her opponent, Donald J. Trump. Like another famous American election scandal, it started with a break-in at the D.N.C. Police Use Surveillance Tool to Scan Social Media, A.C.L.U. Says.

Photo A Chicago company has marketed a tool using text, photos and videos gleaned from major social media companies to aid law enforcement surveillance of protesters, civil liberties activists say.

Police Use Surveillance Tool to Scan Social Media, A.C.L.U. Says

China-internet-wechat. Four spyware apps removed from Google Play. September 16, 2016 We identified the Overseer malware in an application that claimed to provide search capabilities for specific embassies in different geographical locations.

Four spyware apps removed from Google Play

Through close collaboration with an enterprise customer, Lookout identified Overseer, a piece of spyware we found in four apps live on the Google Play store. One of the apps was an Embassy search tool intended to help travelers find embassies abroad. The malware was also injected as a trojan in Russian and European News applications for Android. Google promptly removed the four affected apps after Lookout notified the company. Someone Is Learning How to Take Down the Internet. Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. Paranoïa et organisation mafieuse : plongée dans le « Dark Web » français. Un milieu paranoïaque et très bien organisé.

Paranoïa et organisation mafieuse : plongée dans le « Dark Web » français

20160915 Enjeux Cyber 2016 vdef. So, you heard about Pegasus and Trident. Here’s what you should do now. September 2, 2016.

So, you heard about Pegasus and Trident. Here’s what you should do now

Cybersécurité : les sociétés sensibles vont devoir débourser pour se mettre en règle. A Computer Security Start-Up Turns the Tables on Hackers. The Chinese Hackers in the Back Office. Les milliards de données collectées par les objets connectés ne sont pas assez protégées. Les entreprises de l'univers des objets connectés doivent être plus vigilantes à la protection des données de leurs clients, avertit la Federal trade commission (FTC), une agence de surveillance indépendante du gouvernement américain, dans un rapport publié le 27 janvier, disponible à la fin de cet article.

Les milliards de données collectées par les objets connectés ne sont pas assez protégées

Elle pousse les acteurs du secteur à mettre en œuvre des mesures concrètes pour protéger la vie privée et la sécurité des citoyens américains. « Comment j'ai déjoué deux tentatives de fraude », Gestion des risques. C'est un témoignage d'autant plus rare qu'il lève un tabou, celui qui interdit de communiquer publiquement lorsque l'on a été victime d'une tentative de fraude. « Pour ma part, je n'ai aucune gêne à en parler : c'est par la communication et la pédagogie que nous pourrons lutter plus efficacement contre les fraudeurs », explique le directeur financier du spécialiste de la sécurité numérique Stormshield et président de la DFCG Rhône-Alpes Auvergne, Pierre-Yves Hentzen. « N'en parlez à personne »

« Comment j'ai déjoué deux tentatives de fraude », Gestion des risques

Internet mapping turned a remote farm into a digital hell. Cyber-attaque : les salariés restent les cibles privilégiées. En poursuivant votre navigation sur ce site, vous acceptez l'utilisation de cookies afin de réaliser des statistiques d'audiences et vous proposer une navigation optimale, la possibilité de partager des contenus sur des réseaux sociaux ainsi que des services et offres adaptés à vos centres d'intérêts.

Cyber-attaque : les salariés restent les cibles privilégiées

Pour en savoir plus et paramétrer les cookies... Il semblerait que vous utilisiez un bloqueur de publicité. La publicité nous permet de vous proposer une information gratuite et de qualité. Veuillez désactiver votre adblocker lorsque vous consultez notre site. Merci de votre compréhension et bonne navigation. Cyber-attaque : les salariés restent les cibles privilégiées. Petya, le nouveau ransomware qui chiffre l’ensemble du disque - G DATA Software AG. Citizen cybersecurity. A new organization for cybersecurity across the electric grid. Cyber attacks are an increasing risk for the US electric sector and have eclipsed terrorism as the primary threat, according to the Federal Bureau of Investigation.

A new organization for cybersecurity across the electric grid

The Industrial Control Systems Cyber Emergency Response Team responded to 256 incidents that targeted critical infrastructure sectors in fiscal year 2013, and 59 percent of those incidents involved the energy sector. A large-scale cyber attack or combined cyber and physical attack could lead to enormous costs, potentially triggering sustained power outages over large portions of the electric grid and prolonged disruptions in communications, food and water supplies, and health care delivery. Moreover, cyber threats are more difficult to anticipate and address than traditional threats to electric grid reliability, such as extreme weather.

A cyber attack could come from many sources and—given the size and complexity of the North American electric grid—could target multiple vulnerabilities. Cyberwarfare ethics, or how Facebook could accidentally make its engineers into targets. Without clear rules for cyberwarfare, technology workers could find themselves fair game in enemy attacks and counterattacks. If they participate in military cyberoperations—intentionally or not—employees at Facebook, Google, Apple, Microsoft, Yahoo! , Sprint, AT&T, Vodaphone, and many other companies may find themselves considered “civilians directly participating in hostilities” and therefore legitimate targets of war, according to the legal definitions of the Geneva Conventions and their Additional Protocols. It may all seem a minor issue of semantics, but definitions matter a lot. Learning from the Sony hack attack. As the fallout from the November 2014 cyberattack on Sony Pictures Entertainment continues, with Sony co-chairman Amy Pascal stepping down this month, it’s still not clear how the story will end, either for Hollywood luminaries or US national security.

In the meantime, though, we can learn from the incident and start to formulate responses for the future attacks that will inevitably occur. The attack, which according to the US government was launched by North Korea, compromised unreleased films, private correspondence, and other sensitive information, and trashed hard drives on the Sony Pictures Entertainment computer network. Final 2015 DoD CYBER STRATEGY for web. The flawed analogy between nuclear and cyber deterrence. “If Internet security cannot be controlled, it’s not an exaggeration to say the effects could be no less than a nuclear bomb,” said General Fang Fenghui, Chief of General Staff of the People’s Liberation Army of China, in April 2013.

General Fang is not alone in drawing comparisons between nuclear and cyber weapons during the past few years. Secretary of State John Kerry responded to a cyber security question during his confirmation hearings in January 2013 by saying, “I guess I would call it the 21st century nuclear weapons equivalent.” Hollywood Presbyterian Concedes to Hacker’s Demands in Ransomware Attack. In a chain of events that should be a wake-up call to any entity using and storing critical health information, Hollywood Presbyterian Medical Center (“HPMC”) has announced that it paid hackers $17,000 to end a malware attack on the hospital’s computer systems. On February 5, HPMC fell victim to an attack that locked access to the medical center’s electronic medical record (“EMR”) system and blocked the electronic exchange of patient information.

Google Expert Offers Online Security Tips. Yahoo - Connexion. Watering holes exploiting JSONP hijacking to track users in China. Condamnation pour usurpation d’identité sur Facebook. F.Z., bien que vivant en couple depuis 2010, a entretenu une relation amoureuse avec une collègue de bureau, A.S., qu'il a quittée en février 2012. Gcig_paper_no6. Le numérique et les droits fondamentaux. - Publication - 50 propositions du Conseil d'État pour mettre le numérique au service des droits individuels et de l’intérêt général. Intermarché escroqué de 15 millions d'euros. Cybercrime will Cost Businesses Over $2 Trillion by 2019 - Juniper Research. Diff_2016562060515182125.pdf. Threat LiveMap. Wi-Fi on planes opens door to in-flight hacking, warns US watchdog. Peut-on pirater l'informatique d'un Airbus ou d'un Boeing ? - Les Echos. Iran Is Raising Sophistication and Frequency of Cyberattacks, Study Says.