background preloader

Petit manuel de contre-espionnage informatique

Petit manuel de contre-espionnage informatique

http://owni.fr/2010/05/24/petit-manuel-de-contre-espionnage-informatique/

Related:  CybercriminalitéInternet et vie privée

The Cybercrime Wave That Wasn’t Yet in terms of economics, there’s something very wrong with this picture. Generally the demand for easy money outstrips supply. Is cybercrime an exception? If getting rich were as simple as downloading and running software, wouldn’t more people do it, and thus drive down returns? We have examined cybercrime from an economics standpoint and found a story at odds with the conventional wisdom. A few criminals do well, but cybercrime is a relentless, low-profit struggle for the majority.

A directory of urls to delete your account from web services Can't find what you're looking for? Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. 30+ Free Online Multimedia (Photo, Audio, Video) Editors We tend to rely heavily on our favorite desktop applications like Photoshop, GIMP, Audacity, Adobe Premier and so on when it comes to dealing with multimedia files. That’s fine on our desktops but what if we need to use an editor on a friend’s computer, or a public one at the workplace? That is where web applications come in handy. Web applications provide ubiquity, convenience and ease of use . Cross-browser fingerprinting test 2.0 While we browse the web, most web pages have an interest in observing our behaviour in order to achieve certain business benefits. Read more » For example, they would like to know what kind of content the visitor is interested in, and, more specifically, what to recommend to a user who has already downloaded certain page(s) (e.g. article(s)).

10 Search Engines to Explore the Invisible Web No, it’s not Spiderman’s latest web slinging tool but something that’s more real world. Like the World Wide Web. The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle”¦they see everything. Unfortunately, they can’t because they aren’t divine at all; they are just web spiders who index pages by following one hyperlink after the other. But there are some places where a spider cannot enter.

Fujitsu cracks 278-digit crypto High performance access to file storage Japanese computing giant Fujitsu is claiming a world record after successfully breaking a 278-digit (978-bit) pairing-based cryptography system, providing useful data on how far this next-generation encryption system can be trusted. The company’s R&D arm, Fujitsu Laboratories, worked with Japan’s National Institute of Information and Communications Technology (NICT) and Kyushu University to crack the code in 148.2 days. Encrypting Your Laptop Like You Mean It Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in which we don’t want really strong encryption.” Even after helping expose all the ways the government can get its hands on your data, NSA whistleblower Edward Snowden still maintained, “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”

Four great digital reporting tools for journalists Taking notes used to be simple for journalists — they just scribbled down an interview and made sure not to lose the notebook. Now, taking notes for a story can involve collecting website URLs, photos, screenshots, text messages and tweets. Losing track of these digital sources can be frustrating at best, plagiarism at worst. How to Detect Apps Leaking Your Data One reason that smartphones and smartphone apps are so useful is that they can integrate intimately with our personal lives. But that also puts our personal data at risk. A new service called Mobilescope hopes to change that by letting a smartphone user examine all the data that apps transfer, and alerting him when sensitive information, such as his name or e-mail address, is transferred.

sh SimpleWash Welcome to SimpleWash orNeed help? HomeAboutPressLegalTeamContact©2013 While True Labs, LLC Safe Browsing - Protecting Web Users for 5 Years and Counting Posted by Niels Provos, Security Team It’s been five years since we officially announced malware and phishing protection via our Safe Browsing effort. The goal of Safe Browsing is still the same today as it was five years ago: to protect people from malicious content on the Internet. Today, this protection extends not only to Google’s search results and ads, but also to popular web browsers such as Chrome, Firefox and Safari. To achieve comprehensive and timely detection of new threats, the Safe Browsing team at Google has labored continuously to adapt to rising challenges and to build an infrastructure that automatically detects harmful content around the globe. For a quick sense of the scale of our effort:

Information Security for Journalists By Silkie Carlo and Arjen Kamphuis We're very glad to be able to provide this handbook as a free download, and we really want to keep it that way. If you've found the handbook useful, or you want to help ensure it remains available to those who couldn't afford to buy a copy, please consider making a donation here. Many thanks from the Centre for Investigative Journalism. Web 2.0 tools for data journalists [SLIDES] - Data Journalism Blog Rating: 3.5/5 (2 votes cast) David Herzog is an associate Professor at Missouri School of Journalism. He also serves as the academic adviser to the National Institute for Computer-Assisted Reporting (NICAR), a joint program of the Missouri School of Journalism and Investigative Reporters and Editors, Inc., a global association of journalists. He recently gave a presentation about new online tools for data journalism and we thought it would be nice to publish the slides on the DJB and to get your opinion. Here is how Herzog introduced his presentation on his blog back in June 2011: “I started putting together a slideshow about free data journalism web tools for a group of visiting television and newspaper reporters from South Korea.The number of free Web 2.0 tools is booming and continues to change as new services appear and others die.

Onion Browser Home | Help/Support | by Mike Tigas Enhance your web privacy Onion Browser is a minimal web browser that encrypts and tunnels web traffic through the Tor onion router network and provides other tools to help browse the internet while maintaining privacy. See more features & benefits. A note on Heartbleed. The Heartbleed bug (info site, Wikipedia) is a weakness in recent versions of OpenSSL, which may leak information that should have been encrypted by SSL transport encryption.

Related:  Security / PrivacyPrivacyInternet security & privacylibertes numeriquesinformatiqueemynonaE-reputation, Personal brandingVie privée