ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Spoofing, banking attacks, authentication flaws, and more top the list of 2012's biggest mobile security headaches
Scooped by Gust MEES
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | ICT Security-Sécurité PC et Internet | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&et_rid=454853272&linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

What You Need to Know About Mobile Malware

What You Need to Know About Mobile Malware | ICT Security-Sécurité PC et Internet | Scoop.it

Last week we told you how to protect yourself from mobile malware http://safeandsavvy.f-secure.com/2012/05/08/5-ways-to-keep-your-mobile-phone-safe/

 

 

 For people who want to go a step further and understand the threats your smartphone faces, we’re going to take a quick look inside the F-Secure Mobile Threat Report Q1 2012. What you’ll find is a Android landscape where threats are quickly maturing.

 

Read more:

http://safeandsavvy.f-secure.com/2012/05/18/what-you-need-to-know-about-mobile-malware/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

SMS-controlled Malware Hijacking Android Phones

SMS-controlled Malware Hijacking Android Phones | ICT Security-Sécurité PC et Internet | Scoop.it

Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered Android malware that is controlled via SMS that can do a number of things on the compromised device including recording calls and and surrounding noise.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Android malware - the more things change...

Android malware - the more things change... | ICT Security-Sécurité PC et Internet | Scoop.it

If you think Android phones are immune from malware, listen up: you need to protect yourself. A recent exploit that stole personal data shows why. 

 

There are a few anti-malware apps for Android, including Norton Antivirus & Security, and McAfee Mobile Security among others. Those can help, but they won’t catch everything.

 

To really be secure, you also have to pay attention to the permissions an app is looking for when you’re installing...if a game is looking for access to your contact list, think twice before accepting. But in some cases, even that isn’t enough, because this particular exploit didn’t even ask for permissions.

 

===> Ultimately, you should be trying to only get apps from trusted sources. <===

 

And you should always try to check around to be sure that an app is safe before installing it on an impulse. Just the same what you used to do (or should have done) on your PC.

 

The more things change…

 

Read more: http://www.itworldcanada.com/blogs/android/2012/04/02/android-malware-the-more-things-change/63570/#ixzz1qtiS0RTd
or visit http://www.itworldcanada.com for more Canadian IT News

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD security problem: Less than 10% of tablet owners use auto-lock | ZDNet

BYOD security problem: Less than 10% of tablet owners use auto-lock | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
More of us are bringing our smartphones and tablets to work, but very few enable even the most basic security measures.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Suspected Android SMS malware authors arrested in Paris

Suspected Android SMS malware authors arrested in Paris | ICT Security-Sécurité PC et Internet | Scoop.it
French computer crime investigators have charged two men in connection with money-making malware that targets Android smartphone users.

 

The men, who were charged in the Bobigny area of Paris, are suspected of infecting more than 2000 Android devices with the Foncy Trojan horse.

 

According to the French authorities, the two men alleged to be behind the malware earned up to 100,000 Euros from the scheme.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Federal authorities open Carrier IQ investigation into phone tracking | ZDNet

Federal authorities open Carrier IQ investigation into phone tracking | ZDNet | ICT Security-Sécurité PC et Internet | Scoop.it
U.S. federal authorities, including the FTC and the FCC, are investigating Carrier IQ to see whether consumer rights or privacy was invaded.
No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

10 ways to combat the threat of mobile malware | TechRepublic

10 ways to combat the threat of mobile malware | TechRepublic | ICT Security-Sécurité PC et Internet | Scoop.it
Mobile malware is on the rise, but user awareness is lagging behind. These preventive measures can help safeguard mobile devices.
No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Mobile Security Review September 2012 [pdf]

 

Mobile Security Review September 2012 [pdf]

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Symantec Empowers Enterprises to Embrace Mobility, BYOD

Symantec Empowers Enterprises to Embrace Mobility, BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

 

 

However, IT departments tasked with keeping company networks and sensitive data safe are still struggling to get a handle on mobility. According to the same survey, mobility ranks as the leading IT risk among organizations, that includes being perceived as more risky than virtualization and even public cloud computing.

 

===> Device loss, data breach and mobile malware are some of the chief concerns. And these concerns are not unfounded. For the 12 month period leading up to the survey, the average cost of enterprise losses associated with mobility was $429,000. <===

 

To help enterprises take full advantage of mobility while also mitigating the very real risks associated with it, Symantec has built the strongest mobile security and management product portfolio available. Today, we announced significant updates to this portfolio that enhance our already industry-leading capabilities in mobile device management, mobile application management and mobile threat protection.

No comment yet.
Scooped by Gust MEES
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile phones expose businesses to massive risks

Mobile phones expose businesses to massive risks | ICT Security-Sécurité PC et Internet | Scoop.it

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks.

These are the preliminary findings of a survey by PwC and Infosecurity Europe.


82% of large organisations reported security breaches caused by staff, including 47% who lost or leaked confidential information.


Only 39% of large organisations encrypt data downloaded to smart phones and tablets
54% of small businesses (38% of large organisations) don’t have a security awareness programme
While 52% of small businesses say social networking sites are important to their business, only 8% monitor what their staff post on those sites.

 

Some 75% of large organisations (and 61% of small businesses) allow staff to use smart phones and tablets to connect to their corporate systems and yet only 39% (24% of small businesses) apply data encryption on the devices.

 

Read more...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobility's Situational Unawareness

Mobility's Situational Unawareness | ICT Security-Sécurité PC et Internet | Scoop.it
Ignorance, as those in IT security know, is not bliss.

 

And, two new studies when viewed together show that consumer ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.

 

===> Many organizations unduly place themselves at risk by allowing access to their computers by mobile devices used by employees who download apps without understanding their consequences. That doesn't seems like a smart information risk management policy; actually, it doesn't seem like a policy at all. <===

 

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

So schützen Sie Ihr Smartphone vor Viren

So schützen Sie Ihr Smartphone vor Viren | ICT Security-Sécurité PC et Internet | Scoop.it
Antiviren-Software auf dem PC ist heute so selbstverständlich wie das Schloss an der Haustür – nur bei Smartphones nicht. Wir zeigen, wie Sie Handy-Schädlinge abwehren.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Threat Report, Q4 2011 - F-Secure Weblog

Mobile Threat Report, Q4 2011 - F-Secure Weblog | ICT Security-Sécurité PC et Internet | Scoop.it
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest online threats to guarantee your online wellbeing.
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why Mobile Matters

Why Mobile Matters | ICT Security-Sécurité PC et Internet | Scoop.it
LukeW Ideation + Design provides resources for mobile and Web product design and strategy including presentations, workshops, articles, books and more on usability, interaction design and visual design.

 

Gust MEES: As you see the number of smartphones evolving, so you should be aware of the interest of the #malware creators to take part of this market!

No comment yet.
Scooped by Gust MEES
Scoop.it!

PCPRAXIS Special: So bleibt Android virenfrei - Seite 4.

PCPRAXIS Special: So bleibt Android virenfrei - Seite 4. | ICT Security-Sécurité PC et Internet | Scoop.it
Seriöse Apps weisen in ihrer Market-Beschreibung in der Regel darauf hin, wozu sie welche Berechtigungen brauchen...
No comment yet.