Latest Social Media News
112.9K views | +0 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

Hackers launch huge DDoS attack using WordPress websites | ITProPortal.com

Hackers launch huge DDoS attack using WordPress websites | ITProPortal.com | Latest Social Media News | Scoop.it
It’s being reported that hackers have seized control of a number of WordPress sites and are launching DDoS attacks against various websites.

Via Gust MEES
Gust MEES's curator insight, September 27, 2013 4:43 PM

 

73.2% of the most popular WordPress installations are vulnerable to vulnerabilities which can be detected using free automated tools.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress

  
Gust MEES's curator insight, September 27, 2013 4:47 PM

 

73.2% of the most popular WordPress installations are vulnerable to vulnerabilities which can be detected using free automated tools.

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=WordPress

  

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Another iOS 7 lockscreen hole opens up - call anywhere in the world for free!

Another iOS 7 lockscreen hole opens up - call anywhere in the world for free! | Latest Social Media News | Scoop.it
Another iOS 7 lockscreen bypass has surfaced: this one lets you call anywhere in the world for free.

OK, not really "for free" - someone has to pay, and that's the owner, who probably assumed th...

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Security flaws found in Apple's iOS7

Security flaws found in Apple's iOS7 | Latest Social Media News | Scoop.it
Two security vulnerabilities have been discovered in Apple's new mobile operating system, less than 24 hours after launch.

Via Gust MEES
Gust MEES's curator insight, September 20, 2013 9:56 AM

 

In iOS7 this can be done even when the phone is locked with a passcode, as the voice-activated assistant Siri can be instructed to carry out the task.

 

The other flaw is potentially even more serious - allowing users' email and social networking accounts to be hijacked even when the user has locked and password-protected their phone.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 20, 2013 10:00 AM

 

In iOS7 this can be done even when the phone is locked with a passcode, as the voice-activated assistant Siri can be instructed to carry out the task.

 

The other flaw is potentially even more serious - allowing users' email and social networking accounts to be hijacked even when the user has locked and password-protected their phone.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Adobe issues patches for critical Flash, Reader and Shockwave flaws

Adobe issues patches for critical Flash, Reader and Shockwave flaws | Latest Social Media News | Scoop.it
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs.

 

Users of Google Chrome and Internet Explorer 10 on Windows 8 will automatically receive updates for the Flash Player plug-in bundled with those browsers through their respective update mechanisms.

 

Users of Adobe Reader or Acrobat XI for Windows and Mac OS X are advised to upgrade to Adobe Reader XI (11.0.04) or Adobe Acrobat XI (11.0.04), respectively. Adobe Reader and Acrobat X for Windows and Mac have also been updated to version 10.1.8.

 


Via Gust MEES
Gust MEES's curator insight, September 11, 2013 10:31 AM

 

Users of Adobe Reader or Acrobat XI for Windows and Mac OS X are advised to upgrade to Adobe Reader XI (11.0.04) or Adobe Acrobat XI (11.0.04), respectively. Adobe Reader and Acrobat X for Windows and Mac have also been updated to version 10.1.8.


Terheck's curator insight, September 11, 2013 10:50 AM

Links for downloads :

Flash player : https://www.adobe.com/products/flashplayer/distribution3.html

Shockwave player : http://get.adobe.com/fr/shockwave/

Adobe AIR : http://get.adobe.com/fr/air/

mindlesspeduncle's curator insight, September 12, 2013 2:03 PM

great

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Malicious Websites-2013-Threat [Infographic]


Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Joomla Patches Zero Day Targeting EMEA Banks

Joomla Patches Zero Day Targeting EMEA Banks | Latest Social Media News | Scoop.it
Content management system Joomla patched a zero-day vulnerability that allowed attackers to upload malicious code that led victims to the Blackhole exploit kit.

 

A nasty Joomla vulnerability was recently patched, but not before attackers used a zero day exploit to take over tens of thousands of sites and redirect victims to the Blackhole exploit kit, according to security company Versafe.

 

Most of the attacks were against financial institutions in Europe, the Middle East and Asia and stemmed from an initial attack against 100 Joomla-hosted websites.


Via Gust MEES
Gust MEES's curator insight, August 14, 2013 5:19 PM

 

Joomla vulnerabilities have been a particular problem; 57 percent of the attacks Versafe has seen this year have come from sites hosted on the platform, up from 41 percent last year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Joomla

 

Gust MEES's curator insight, August 14, 2013 5:22 PM

 

Joomla vulnerabilities have been a particular problem; 57 percent of the attacks Versafe has seen this year have come from sites hosted on the platform, up from 41 percent last year.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Joomla

 

Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)

BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN) | Latest Social Media News | Scoop.it
bgp-ranking - BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).

Via Gust MEES
Gust MEES's curator insight, August 6, 2013 9:16 AM

 

BGP Ranking is used by CIRCL (Computer Incident Response Center Luxembourg):

 

http://bgpranking.circl.lu/

 

Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Free first aid kit for computer viruses

Free first aid kit for computer viruses | Latest Social Media News | Scoop.it
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malw...

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | Latest Social Media News | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 


Via Gust MEES
Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Once more into the breach: How hackers compromise websites like Apple's | Macworld

Once more into the breach: How hackers compromise websites like Apple's | Macworld | Latest Social Media News | Scoop.it
These days, it seems that websites are hacked with alarming frequency. While even companies of Apple's sophistication and size aren't immune from successful attacks, it's not quite time to start wearing your tin foil hat--yet.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Apple's Development Center Breached by Hackers

Apple's Development Center Breached by Hackers | Latest Social Media News | Scoop.it
Apple's Dev Center went down on Thursday causing issues for developers around the world. The system remained down for three days and is still currently unavailable.

 

This brings up an interesting question regarding single points of failure in the mobile application distribution system. When one component goes down, or is breached in this case it affects the entire ecosystem.

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

What is the point of hacking one person’s phone when there are entire app store infrastructures to target?


Via Gust MEES
Gust MEES's curator insight, July 21, 2013 8:20 PM

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 21, 2013 8:22 PM

 

===> We hear a lot about mobile apps and devices being hacked, however as I have stated before that is small potatoes when compared to the treasure trove of the back-end systems that power mobile applications and services. <===

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Vivalist's curator insight, July 22, 2013 4:28 AM

going up the network, identify the bottle neck and get at it - pretty simple, but they probably had to sweat a little to do it.

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Attackers embedding backdoors into image files

Attackers embedding backdoors into image files | Latest Social Media News | Scoop.it
Sucuri researchers find hackers are using a known, but unusual, way to maintain access to an already compromised server by hiding backdoors inside the headers of legitimate image files

Via Gust MEES
Gust MEES's curator insight, July 18, 2013 5:33 PM

 

Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Gust MEES's curator insight, July 18, 2013 5:37 PM

 

Watch log files for command instances, such as file creation and modification. However, the key point is to stay on top of updates, especially for platforms such as WordPress and Joomla, which are popular targets for attackers and constantly updated in order to address security concerns.

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Barrage of Cyberattacks Challenges Campus Culture

Barrage of Cyberattacks Challenges Campus Culture | Latest Social Media News | Scoop.it
The hacking attempts, many thought to be from China, are forcing universities to spend more to prevent and detect intrusions.

 

===> Bill Mellon of the University of Wisconsin said the school has seen as many as 100,000 hacking attempts a day from China. <===

 


Via Gust MEES
Gust MEES's curator insight, July 16, 2013 6:00 PM

 

===> Bill Mellon of the University of Wisconsin said the school has seen as many as 100,000 hacking attempts a day from China. <===

 AND YOU THINK that there isn't STILL a MUST for Learning and Teaching about Cyber-Security, seriously!!!??? 

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple releases iOS 7.0.2 - swiftly squashing two lockscreen bugs

Apple releases iOS 7.0.2 - swiftly squashing two lockscreen bugs | Latest Social Media News | Scoop.it
Apple has quickly fixed two lockscreen bugs that it introduced with iOS 7.

Well done, Cupertino!

(To all hardcore Apple fans reading this: that's not irony. I really mean it.)

Via Gust MEES
Gust MEES's curator insight, September 26, 2013 6:38 PM

 

Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Shafali Anand's comment, September 27, 2013 9:31 PM
Glad they did. I've been worrying myself sick about the ugh-ly buttons...people say they grow on you...perhaps they do...like warts. You've got to live with you've got.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | Latest Social Media News | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 


Via Gust MEES
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Infosecurity - Apple iOS 7: A Security Overview

Infosecurity - Apple iOS 7: A Security Overview | Latest Social Media News | Scoop.it
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

The ugly state of password security in the cloud

The ugly state of password security in the cloud | Latest Social Media News | Scoop.it
I reviewed more than 130 cloud and SaaS services and the results were a bit unexpected.

Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | Latest Social Media News | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 


Via Gust MEES
Gust MEES's curator insight, August 16, 2013 8:37 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

#ICT: The Hand of Thief Linux banking Trojan being sold to criminals for $2000

#ICT: The Hand of Thief Linux banking Trojan being sold to criminals for $2000 | Latest Social Media News | Scoop.it
Yet another reason why Linux users shouldn't be complacent about their computer security, and run an anti-virus program.

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple to fix iPhones' vulnerability to boobytrapped chargers

Apple to fix iPhones' vulnerability to boobytrapped chargers | Latest Social Media News | Scoop.it
iPhones and iPads will be vulnerable until they get the iOS 7 update, which is scheduled for release later this year. Until then, you might want to avoid plugging into sleazy charging stations, tho...

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Researchers reveal how to hack an iPhone in 60 seconds

Researchers reveal how to hack an iPhone in 60 seconds | Latest Social Media News | Scoop.it
Three Georgia Tech hackers have disclosed how to hack iPhones and iPads with malware in under sixty seconds using a "malicious charger."

Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Latest Social Media News | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Apple's OS X FBI ransomware going global

Apple's OS X FBI ransomware going global | Latest Social Media News | Scoop.it
Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

 


Via Gust MEES
Gust MEES's curator insight, July 22, 2013 2:48 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Gust MEES's curator insight, July 22, 2013 2:53 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Gust MEES's curator insight, July 22, 2013 3:03 PM

 

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country's police force.

 

===> Not all countries currently have their own ‘theme’ but it is only a matter of time before the bad guys roll them out. <===

  

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=RANSOMWARE

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

FBI Warns of Mac OS X Ransomware

FBI Warns of Mac OS X Ransomware | Latest Social Media News | Scoop.it
The FBI has become aware of the recent news regarding the ransomware that’s designed to target Mac OS X users. The agency’s Internet Crime...

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Tumblr security lapse - iPhone and iPad users update your passwords now!

Tumblr security lapse - iPhone and iPad users update your passwords now! | Latest Social Media News | Scoop.it

Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".

 

It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.

 


Via Gust MEES
Gust MEES's curator insight, July 17, 2013 6:06 PM

 

Tumblr has released a "very important" update for their iPad and iPhone apps following what they describe as a "security lapse".

 

It appears that passwords were being sent over the internet unencrypted, making it easy for anyone with bad intentions and a little technical knowledge to harvest Tumblr users' login details.

 

Learn more:

 

https://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Passwords

 

 

midnight's curator insight, April 7, 2014 5:54 AM

This article contains information about the  security of the iphone and ipad users. This is very useful, because users wil be secured from any harm that could be done with their gadets. passwords were being sent over the internet unencrypted this could cause alot of problems because hackers would easily be able to access your password.

shirlyshabo's curator insight, April 22, 2014 8:03 AM

האם באמת יש דבר כזה  אתר מאובטח?????