E-Learning-Inclusivo (Mashup)
1.1M views | +13 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Future attacks: Hiding exploit code in images | CyberSecurity | Stegosploit | imajs

Future attacks: Hiding exploit code in images | CyberSecurity | Stegosploit | imajs | E-Learning-Inclusivo (Mashup) | Scoop.it

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it?

Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.


He is not the first one to try and hide exploits in images. But he created Stegosploit, a technology that lets attackers deliver executable JavaScript code via images, and trigger them, too.

The technology opens the door for attacks executed as simply as pointing users to sites containing a booby-trapped image or delivering the image via email. By virtue of simply viewing the image, the exploit code is triggered and can deliver malware on the victim's computer.

"A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time," he explains. 

"Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit."

This type of attack won't show in network traffic, he pointed out, be invisible to the naked eye, and the image will "autorun" in the browser.

In order to make the attack payload look harmless and not trigger defenses, Shah split it into two: dangerous pixel data (exploit code), and a safe decoder. 


Via Gust MEES
Gust MEES's curator insight, June 2, 2015 5:56 AM

Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one - and run it? 

Saumil Shah, founder and CEO of Net-Square, has demonstrated at the Hack in the Box Amsterdam 2015 that it's possible, and has posited that such attacks are more than likely to crop up in the near future, as he can't be the only one who thought about this, tried it and succeeded.


He is not the first one to try and hide exploits in images. But he created Stegosploit, a technology that lets attackers deliver executable JavaScript code via images, and trigger them, too.

The technology opens the door for attacks executed as simply as pointing users to sites containing a booby-trapped image or delivering the image via email. By virtue of simply viewing the image, the exploit code is triggered and can deliver malware on the victim's computer.

"A single file can be rendered as a perfectly valid HTML file, executed as a perfectly valid Javascript file, and displayed as a perfectly valid image, all at the same time," he explains. 

"Stegosploit is the result of malicious exploit code hidden within pixels of the image carrying it. The image however, is a multi format container, which also contains the code required to decode the steganographically encoded pixels to execute the exploit."

This type of attack won't show in network traffic, he pointed out, be invisible to the naked eye, and the image will "autorun" in the browser.


In order to make the attack payload look harmless and not trigger defenses, Shah split it into two: dangerous pixel data (exploit code), and a safe decoder. 


Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Adding Security to the Internet of Everything | Internet of Things | CyberSecurity

Adding Security to the Internet of Everything | Internet of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.

The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, February 9, 2015 10:12 AM
Don’t panic just yet: but in a few years, your fridge could become a target for cybercriminals. As the number of devices in the Internet of Everything grows, so does the likelihood that connecting these devices and networking them together could increase the number and type of attack vectors we will see in the future. And that means we need to think differently about IT security and the levels of protection needed for this new, connected world. Protecting all of IoE interactions is crucial in enabling people and organizations to benefit from these advances.

The IoE builds on the foundation of the Internet of Things, or IoT. By comparison, the IoT refers to the networked connection of physical objects (doesn’t include the “people” and “process” components of IoE). IoT is a single technology transition, while IoE is a superset that includes IoT.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Spencer Tan's curator insight, February 20, 2015 11:49 AM

Thus with the above news from Cisco one can be sure that with the increase of devices, internet security will be the next big thing and top investment from Small Business to Large Scale Enterprises? One could deny the need of investing in as simple as SSL certificates to DOS prevention  or even large scale hardware and Software firewall.


I deem ICT companies will make a big ding investing in specialization of deploying and implementing in Internet Security.


Also Read up on how to verify that the Website you visit or intend to make purchases is secure. 


Insights from Spencer Tan

Rescooped by juandoming from business analyst
Scoop.it!

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity

Conveniently Connected And…Compromised? | Internet Of Things | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it
The New Security Landscape of IoT


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Via Gust MEES, michel verstrepen
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

La maison connectée | Internet Of Things | YouTube

Au salon International CES qui se tient à Las Vegas du 6 au 9 janvier 2015, une large place est consacrée à la "maison intelligente", avec beaucoup d'électroménag...


En savoir plus :



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip

Triangulation of Cyber Security, Social Media + You | Digital CitizenShip | E-Learning-Inclusivo (Mashup) | Scoop.it

That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand.

.

Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up. Or even worse a combination of all the above; plus a malware or trojan laden url embedded in it.

.

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.

.

Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Via Gust MEES
Gust MEES's curator insight, March 8, 2015 3:21 PM

Face it. The Internet is a hostile place for your reputation and your brand; whether that is personal, corporate or government. The control and management of your cyber security, reputation management; and social media appearance start and end with you.


Learn more:


https://gustmees.wordpress.com/2014/03/29/practice-learning-to-learn/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/03/design-the-learning-of-your-learners-students-ideas/


https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/



Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Connected homes could pose major security concerns to early adopters | Privacy | CyberSecurity

Connected homes could pose major security concerns to early adopters | Privacy | CyberSecurity | E-Learning-Inclusivo (Mashup) | Scoop.it

Following Edward Snowden's leaks unveiling NSA and GCHQ surveillance, privacy has become a hot topic - and the IoT could pose great challenges...


Learn more:



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO



Via Gust MEES
Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

SID2015: Safer Internet Day 2015-Participation | Learning basics of CyberSecurity | eSkills

SID2015: Safer Internet Day 2015-Participation | Learning basics of CyberSecurity | eSkills | E-Learning-Inclusivo (Mashup) | Scoop.it

Safer Internet Day 2015 - Save the date! Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online...


Learn more:


https://gustmees.wordpress.com


https://gustmeesen.wordpress.com/


https://gustmeesfr.wordpress.com/


https://gustmeesfr.wordpress.com/



Via Gust MEES
Gust MEES's curator insight, January 7, 2015 10:26 AM

Safer Internet Day 2015 - Save the date! Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online...


Learn more:


https://gustmees.wordpress.com


https://gustmeesen.wordpress.com/


https://gustmeesfr.wordpress.com/


https://gustmeesde.wordpress.com/



Mony Chávez's curator insight, January 8, 2015 1:35 PM

Súper importante, considerarlo a cualquier edad.

Wron Ga's curator insight, January 18, 2015 1:41 PM

Kolejny post który temat opiera sie na biezpiecznym internecie, twórzmy go razem i zabiezpieczajmy przed skażonymi treściami i niedozwolonymi dla tych najmlodzsych

Rescooped by juandoming from 21st Century Learning and Teaching
Scoop.it!

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip

Sicherheitslücken schließen. Diese Tools sollten Sie aktualisieren | CyberSecurity | eSkills | eLeaderShip | E-Learning-Inclusivo (Mashup) | Scoop.it

Software sollte generell immer auf dem neuesten Stand sein. Manche Programme sind aber besonders gefährdet – Virenbefall und Hacker-Angriffe drohen. Aktualisieren Sie sie schnellstmöglich!


Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Via Gust MEES