E-Learning-Inclusivo (Mashup)
1.1M views | +31 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Hackerangriff auf Apple: Diese Apps sind betroffen | MobileSecurity

Hackerangriff auf Apple: Diese Apps sind betroffen | MobileSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Apple hat bekanntgegeben, dass der hauseigene App Store erfolgreich von Hackern angegriffen wurde. Im Rahmen des Angriffs wurden hunderte Apps mit schädlichem Code infiziert, die anschließend zum Download bereitstanden.


Learn more / En savoir plus / Mehr erfahren:

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

.

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XcodeGhost+malware+sneaks+into+the+App+Store...



Via Gust MEES
Gust MEES's curator insight, September 21, 2015 9:05 AM
Apple hat bekanntgegeben, dass der hauseigene App Store erfolgreich von Hackern angegriffen wurde. Im Rahmen des Angriffs wurden hunderte Apps mit schädlichem Code infiziert, die anschließend zum Download bereitstanden.


Learn more / En savoir plus / Mehr erfahren:

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

.

https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/

.

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=XcodeGhost+malware+sneaks+into+the+App+Store...


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

DOS ATTACKS ON THE RISE | Cyber Security | Infographic

DOS ATTACKS ON THE RISE | Cyber Security | Infographic | E-Learning-Inclusivo (Mashup) | Scoop.it


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=DDos


http://gustmees.wordpress.com/2014/02/15/often-asked-questions-who-are-the-countries-with-most-hosted-malware-servers-and-other-cyber-problems/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/




Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | E-Learning-Inclusivo (Mashup) | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:




Via Gust MEES
Gust MEES's curator insight, July 21, 2014 9:26 AM
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Rescooped by juandoming from Society Crowdfunding Gamification Business Security HumanRight
Scoop.it!

Safari on Mac OS exposes web login credentials

Safari on Mac OS exposes web login credentials | E-Learning-Inclusivo (Mashup) | Scoop.it
Kaspersky research shows that Safari, in saving a session for reopening later, stores session information in plain text. This includes usernames and passwords.

Via Gust MEES, luigi vico
Gust MEES's curator insight, December 13, 2013 9:46 AM

 

Kaspersky researchers have discovered that Apple's Safari web browser on OS X stores session information, including the username and password, in a plain text XML file, available for any user to read.

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World | E-Learning-Inclusivo (Mashup) | Scoop.it
The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Via Gust MEES
Gust MEES's curator insight, December 21, 2014 10:44 AM

The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information

Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

OnionDuke: APT Attacks Via the Tor Network | Cyber Security

OnionDuke: APT Attacks Via the Tor Network | Cyber Security | E-Learning-Inclusivo (Mashup) | Scoop.it

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR




Via Gust MEES
Gust MEES's curator insight, November 14, 2014 11:18 AM

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Rescooped by juandoming from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Update asap!!! ===> Apple Fixes More Than 25 Flaws in Safari

Update asap!!! ===> Apple Fixes More Than 25 Flaws in Safari | E-Learning-Inclusivo (Mashup) | Scoop.it
Apple has fixed more than 25 security flaws in its Safari browser.


That flaw was fixed in iOS and other products earlier this year but Apple just released the fix for Safari on Monday. Along with the 25 memory corruption vulnerabilities the company fixed, it also pushed out a patch for a separate issue in Safari that could enable an attacker to read arbitrary files on a user’s machine.


=========> UPDATE ASAP!!! <========



Via Gust MEES
Gust MEES's curator insight, April 3, 2014 11:48 AM


=========> UPDATE ASAP!!! <========