background preloader

Logiciel d'immixtion (multi-Etats)

Logiciel d'immixtion (multi-Etats)
Map showing the number and geographical location of Flame infections detected by Kaspersky Lab on customer machines. Courtesy of Kaspersky A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation. The malware, discovered by Russia-based antivirus firm Kaspersky Lab, is an espionage toolkit that has been infecting targeted systems in Iran, Lebanon, Syria, Sudan, the Israeli Occupied Territories and other countries in the Middle East and North Africa for at least two years. Dubbed “Flame” by Kaspersky, the malicious code dwarfs Stuxnet in size — the groundbreaking infrastructure-sabotaging malware that is believed to have wreaked havoc on Iran’s nuclear program in 2009 and 2010. Kaspersky Lab is calling it “one of the most complex threats ever discovered.” Related:  air du temps

mémoire historique (métiers) "C'est ici qu'avaient lieu les assemblées générales de dockers, ici qu'ont été votées toutes les grandes grèves." René Vandamme, 67 ans, le secrétaire de la section des dockers retraités CGT de Dunkerque (200 membres), parcourt la salle déserte de L'Avenir, haut lieu historique du syndicalisme local. "Tout le conseil syndical était sur l'estrade, les votes se faisaient à main levée", se souvient Henry Hennebil, 75 ans, dont soixante passées à la CGT. Inauguré fin 1961, le lieu a également accueilli des galas de boxe, des séances de cinéma ou les discours de Georges Séguy, Georges Marchais ou Henri Krasucki. Il n'ouvre plus aujourd'hui ses portes qu'à titre dérogatoire le 1er mai. Dans les locaux de L'Avenir, haut-lieu du syndicalisme dunkerquois. Une déchirure syndicale majeure s'est produite ici il y a tout juste vingt ans. Henry Hennebil et René Vandamme, au balcon de la salle de L'Avenir. © E.R A Dunkerque, la scission syndicale de 1992 a vu des familles se déchirer.

Researchers identify Stuxnet-like cyberespionage malware called 'Flame' IDG News Service - A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has been identified and analyzed by researchers from several security companies and organizations. According to the Iranian Computer Emergency Response Team (MAHER), the new piece of malware is called Flamer and might be responsible for recent data loss incidents in Iran. There are also reasons to believe that the malware is related to the Stuxnet and Duqu cyberespionage threats, the organization said on Monday. IN THE NEWS: Government alarm over cyberattacks validated by terrorists Malware researchers from antivirus firm Kaspersky Lab have also analyzed the malware and found that while it is similar to Stuxnet and Duqu in terms of the geographic propagation and targeting, it has different features and it is, in many ways, more complex than both of those threats. The IDG News Service is a Network World affiliate.

The Flame: Questions and Answers Duqu and Stuxnet raised the stakes in the cyber battles being fought in the Middle East – but now we’ve found what might be the most sophisticated cyber weapon yet unleashed. The ‘Flame’ cyber espionage worm came to the attention of our experts at Kaspersky Lab after the UN’s International Telecommunication Union came to us for help in finding an unknown piece of malware which was deleting sensitive information across the Middle East. While searching for that code – nicknamed Wiper – we discovered a new malware codenamed Worm.Win32.Flame. Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar ‘super-weapons’ currently deployed in the Middle East by unknown perpetrators. For the full low-down on this advanced threat, read on… General Questions What exactly is Flame? Who is responsible?

assemblée évêques (2011) Discours du cardinal Vingt-Trois en ouverture de l'Assemblée plénière des évêques Le débat sur la laïcité "risque de cristalliser les malaises devant un certain nombre de pratiques musulmanes minoritaires, mais, paradoxalement, aussi d'aboutir à réduire la compréhension de la laïcité à sa conception la plus fermée : celle du refus de toute expression religieuse dans notre société", a déclaré mardi 5 avril le cardinal André Vingt-Trois lors de son discours d'ouverture de l'Assemblée plénière des évêques, à Lourdes Les semaines et les mois écoulés ont été fertiles en événements de tous genres. Si le rythme de l'information passe très vite sur des événements aussi importants, je ne pense pas qu'ils s'effacent aussi vite de nos mémoires individuelles et collectives. Notre mission nous incite à ne pas nous laisser embarquer dans le tourbillon du jeu des apparences mais à privilégier les analyses et les recherches argumentées. Je vous remercie.

Researchers identify Stuxnet-like malware called 'Flame' IDG News Service - A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has been identified and analyzed by researchers from several security companies and organizations. According to the Iranian Computer Emergency Response Team (MAHER), the new piece of malware is called Flamer and might be responsible for recent data loss incidents in Iran. There are also reasons to believe that the malware is related to the Stuxnet and Duqu cyberespionage threats, the organization said on Monday. Malware researchers from antivirus firm Kaspersky Lab have also analyzed the malware and found that while it is similar to Stuxnet and Duqu in terms of the geographic propagation and targeting, it has different features and it is, in many ways, more complex than both of those threats. Flame, as the Kaspersky researchers call it, is a very large attack toolkit with many individual modules. Reprinted with permission from IDG.net.

"Flame" computer virus strikes Middle East; Israel speculation continues (AP) LONDON - A massive, data-slurping cyberweapon is circulating in the Middle East, and computers in Iran appear to have been particularly affected, according to a Russian Internet security firm. Moscow-based Kaspersky Lab ZAO said the "Flame" virus was unprecedented both in terms of its size and complexity, possessing the ability to turn infected computers into all-purpose spying machines that can even suck information out of nearby cell phones. "This is on a completely different level," Kaspersky researcher Roel Schouwenberg said in a telephone interview Tuesday. The announcement sent a ripple of excitement across the computer security sector. Although their coding is different, Schouwenberg said there was some evidence to suggest that the people behind Flame also helped craft Stuxnet, a notorious virus that disrupted controls of some nuclear centrifuges in Iran in 2010. So far, Flame appears focused on espionage. Flame is unusually large. "Maybe it's just espionage," he said.

confusion = concomitance et causalité LE MONDE | • Mis à jour le | Par Guy Burgel, géographe, professeur à l'université Paris-Ouest-Nanterre-la Défense, auteur du "Miracle athénien au XXe siècle", CNRS Editions, 2002 La crise grecque revient au galop, compromettant les premiers pas de la nouvelle présidence française. Il faut donc aussi revenir à la pédagogie élémentaire, dont la répétition, on le sait, est le premier principe. Si l'on veut voir dans le désastre qu'offre actuellement la Grèce la simple traduction de l'incurie gouvernementale et de l'insouciance sociale, justiciables de traitements d'austérité à doses de cheval, on tuera le malade, mais surtout on n'aura rien compris aux processus historiques des mutations, où les concomitances l'emportent sur les causalités directes. Pendant un peu moins de deux siècles de son histoire contemporaine, la Grèce a construit son développement économique sur un mode sociétal. Débats : "Quelle sortie de crise pour la Grèce ?" Mais ce système est à bout de souffle.

Attacks on Iranian oil industry led to Flame malware find Computerworld - The sophisticated cyber espionage malware known as "Flame" was discovered after computers within Iran's energy industry were wiped clean of data, a security expert said today. "This was discovered during the investigation of a wiping of Iran's gas companies' computers," Liam O Murchu, manager of operations at Symantec's security response center, said in an interview Tuesday. O Murchu was referring to reports out of Iran a month ago, when the country's oil ministry confirmed that servers at several companies had been attacked. Later, other officials there acknowledged that the attacks had been aimed at other government ministries and industries. At the time, Iran admitted that the attacks had crippled some machines by wiping their hard drives, but claimed that it had been able to restore the servers using backups. Reports from Iran's state-backed media said that officials had identified the hackers responsible for the attacks. But there are hints in the code. .

Israel hints it may be behind 'Flame' super-virus targeting Iran - Middle East - World A top Israeli minister yesterday fed speculation that the Jewish state could be responsible for a powerful new virus said to have been used in a fresh attack on computers in Iran and elsewhere in the Middle East. Click HERE to view graphic The discovery of the unprecedented complex data-stealing "Flame" virus was disclosed by a Russian-based digital security firm Kaspersky Lab. Its experts reported on Monday that it had been applied most actively in Iran, but also in Israel and the occupied Palestinian territories, Sudan, Syria, Lebanon, Saudi Arabia and Egypt. Moshe Yaalon, Israel's Vice Prime Minister and Strategic Affairs Minister, told the country's Army Radio: "Anyone who sees the Iranian threat as a significant threat – it's reasonable [to assume] that he will take various steps, including these, to harm it." Mr Yaalon, a former military Chief of Staff, added: "Israel was blessed as being a country rich with high-tech. There are disagreements over how long it has been in existence.

reality interaction Over the past two decades, HCI researchers have developed a broad range of new interfaces that diverge from the "window, icon, menu, pointing device" (WIMP) or Direct Manipulation interaction style. Development of this new generation of post-WIMP interfaces has been fueled by advances in computer technology and improved understanding of human psychology. Some examples of these post-WIMP interaction styles are: virtual, mixed and augmented reality, tangible interaction, ubiquitous and pervasive computing, context-aware computing, handheld, or mobile interaction, perceptual and affective computing as well as lightweight, tacit or passive interaction. We use the term "real world" to refer to aspects of the physical, non-digital world. Nave Physics: people have common sense knowledge about the physical world. To a greater extent than in previous generations, these four themes play a prominent role in emerging interaction styles.

Flame virus: United Nations to issue warning against 'world's most powerful computer bug' 'Flame' bug has been used to hack into Iran computersTrojan superbug 100 times bigger than most forms of malicious software By David Gardner Created: 19:47 GMT, 29 May 2012 The virus, called 'Flame' is the third major cyber weapon uncovered after the Stuxnet virus that attacked Iran's nuclear program in 2010, and its data-stealing cousin Duqu, named after the Star Wars villain The United Nations is set to issue an urgent warning to guard against the most powerful computer virus ever unleashed amid fears it could be used to bring countries to a standstill. In what was being seen last night as the dawn of a new era in cyber warfare, UN computer security chief Marco Obiso said: 'This is the most serious warning we have ever put out.' He was speaking after it was revealed that a massive superbug had been used to hack into computers in Iran. Israel did little to dispute claims yesterday that it was behind the clandestine online assault. Mr. And the Israelis didn't try and deflect blame.

réflexe porno Vous êtes né après 1976 et disposez d’une connexion web digne de ce nom? Vous consommez très probablement du porno seul ou en couple, et souvent sur des plateformes de vidéos en streaming. Inutile de nier, c’est statistique. Et si ce n’est pas vous, c’est donc que votre conjoint consulte pour deux. Si le phénomène n’est en lui-même pas nouveau, le temps de la découverte semble bien révolu. Certains liens contenus dans l’article renvoient vers des contenus à caractère pornographique. publicité Avec Internet, la démocratisation de l’accès au porno s’est considérablement accélérée ces dix dernières années. Youporn Génération Selon ce même sondage Ifop, 89% des Français interrogés affirment avoir déjà regardé un film porno. On a beaucoup discuté de leur impact moral et économique sur l’industrie porno, de la propagation des déviances que le faible contrôle opéré sur ces sites engendre, du succès évidement énorme auprès des adolescents... Nicolas* raconte: Regarder c’est tromper? Marc de Boni

Flame: Another Holiday, Another Super Virus Another holiday here in upstate New York, another roll of the fire trucks while some were supposed to be kicking back and enjoying a barbeque. It's times like this when I'm glad I'm not in the antivirus business anymore and doubly relieved that none of our machines run Windows. No flames here. Computer security people however may have to reach for the extinguisher this morning as the latest conflagration in the news bounces across their desk, the discovery of yet another "super virus" called "FLAME" as reported by this BBC article. Only problem is that according to Kaspersky, who made the discovery in coordination with the U.N.' Here we go... again. FLAME is described by Kaspersky as "one of the most complex threats ever discovered". Stranger yet is that the infector is an ActiveX control in the form of an OCX (OLE Control Extensions) file which apparently has run completely undetected for years.

Related: