ICT Security-Sécurité PC et Internet
87.1K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Mozilla startet Security-Scanner für Webseiten | #CyberSecurity #EdTech 

Mozilla startet Security-Scanner für Webseiten | #CyberSecurity #EdTech  | ICT Security-Sécurité PC et Internet | Scoop.it
Mozilla hat das Sicherheitswerkzeug Observatory ins Netz gestellt. Damit können Seitenbetreiber die eigene Website auf Schwachstellen überprüfen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=OWASP

 

Gust MEES's insight:
Mozilla hat das Sicherheitswerkzeug Observatory ins Netz gestellt. Damit können Seitenbetreiber die eigene Website auf Schwachstellen überprüfen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=OWASP

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP terminates marketing agreement with RSA Conference. Board member cancels class out of protest.

OWASP terminates marketing agreement with RSA Conference. Board member cancels class out of protest. | ICT Security-Sécurité PC et Internet | Scoop.it
There's more fallout for the RSA Conference after its namesake's dealings with the NSA were brought to light.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RSA

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP BeNeLux 2012 - Invitation

OWASP BeNeLux 2012 - Invitation | ICT Security-Sécurité PC et Internet | Scoop.it
Quick Facts


Date : 29-30 Novembre
Location: Leuven (Belgium)
Price : Free
Places : Limited (First registered, First serve)

Agenda
The agenda is a sound mix between Application Security, Forensics, Risk Management and represents the current security landscape at large rather well: Building security into Applications in Enterprises, Managing Application Level Vulnerabilities, Source code review on a large scale. It also has 2 innovative talks on exploit mitigation and sandboxing javascript.

 

- Browser Security - John Wilander


- Sandboxing Javascript - Lieven Desmet


- Body Armor for Binaries - Asia Slowinska


- Forensics - Marc Hullegie and Kees Mastwijk


- Streamlining Application Vulnerability Management: Communication Between Development and Security Teams - Dan Cornell


- Code review for Large Companies - Ruediger Bachmann


- Making Security Invisible by Becoming the Developer’s Best Friends - Dinis Cruz


- OWASP Top 10 vs Drupal - Erwin Geirnaert


- Panel Discussion about the legal aspects of penetration testing

 

Learn more:

http://blog.zoller.lu/2012/11/owasp-benelux-2012-invitation.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Case Study: Securing Web Applications

Case Study: Securing Web Applications | ICT Security-Sécurité PC et Internet | Scoop.it
In this “Case Study” column, Alan shares some takeaways based on involvement in remediation engagements as a basis for understanding the reasons behind the continued trend in vulnerable web applications.
No comment yet.
Scooped by Gust MEES
Scoop.it!

BeNeLux OWASP Day 2011 - OWASP

BeNeLux OWASP Day 2011 - OWASP | ICT Security-Sécurité PC et Internet | Scoop.it

BeNeLux OWASP Day 2011

 

Venue is the University of Luxembourg (Grand Duchy of Luxembourg)
Training and conference location, together with hotel information, can be found here.
Training and first list of conference speakers are announced!

No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP veröffentlicht Handbuch zum Schutz gegen automatisierte Angriffe | CyberSecurity

OWASP veröffentlicht Handbuch zum Schutz gegen automatisierte Angriffe | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Als Hilfe für das Absichern von Webanwendungen hat die Non-Profit-Organisation OWASP ein Handbuch für Entwickler herausgebracht, das bislang wenig beachtete Angriffe beschreibt.


Sollte man mal genauer ansehen!

Gust MEES's insight:

Als Hilfe für das Absichern von Webanwendungen hat die Non-Profit-Organisation OWASP ein Handbuch für Entwickler herausgebracht, das bislang wenig beachtete Angriffe beschreibt.


Sollte man mal genauer ansehen!


No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP AppSec Research / AppSecEU 2013 | Web Application Security Conference

OWASP AppSec Research / AppSecEU 2013 | Web Application Security Conference | ICT Security-Sécurité PC et Internet | Scoop.it

OWASP AppSec Research

 

- Cutting-edge topics presented by renowned security professionals from industry and academia.

 

- Trainings and speeches on a variety of security topics including: - web security, mobile security, cloud security, vulnerability analysis, defense and much more

 

- Premier gathering place for executives from Fortune Global 500 companies and technology thought leaders

 

- Group sessions, panel discussions, workshops and learning opportunities for developers, business owners and security experts

 

- Learn and network for four days, while taking in a panoramic view of one of Germany’s most beautiful cities at a top Hamburg landmark

 

Gust MEES's insight:

 

OWASP AppSec Research

 

- Cutting-edge topics presented by renowned security professionals from industry and academia.

 

- Trainings and speeches on a variety of security topics including: - web security, mobile security, cloud security, vulnerability analysis, defense and much more

 

- Premier gathering place for executives from Fortune Global 500 companies and technology thought leaders

 

- Group sessions, panel discussions, workshops and learning opportunities for developers, business owners and security experts

 

- Learn and network for four days, while taking in a panoramic view of one of Germany’s most beautiful cities at a top Hamburg landmark

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Dangers of Jailbreaking and Rooting Mobile Devices

Dangers of Jailbreaking and Rooting Mobile Devices | ICT Security-Sécurité PC et Internet | Scoop.it

What is "jailbreaking" and "rooting"?

iOS: Jailbreaking is the process of modifying iOS system kernels to allow file system read and write access. Most jailbreaking tools (and exploits) remove the limitations and security features built by the manufacturer Apple (the "jail") through the use of custom kernels, which make unauthorized modifications to the operating system. Almost all jailbreaking tools allow users to run code not approved and signed by Apple. This allows users to install additional applications, extensions and patches without the control of Apple’s App Store.

 

Android: Rooting is the process of gaining administrative or privileged access for the Android OS. As the Android OS is based on the Linux Kernel, rooting a device is analogous to gaining access to administrative, root user-equivalent, permissions on Linux. Unlike iOS, rooting is (usually) not required to run applications outside from the Android Market. Some carriers control this through operating system settings or device firmware. Rooting also enables the user to completely remove and replace the device's operating system.

 

Read more:

http://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Dangers_of_Jailbreaking_and_Rooting_Mobile_Devices

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Securing Mobile Data Communications | Blog Central

Securing Mobile Data Communications | Blog Central | ICT Security-Sécurité PC et Internet | Scoop.it

Wireless communication is inherently insecure. My consulting experience has confirmed that some organizations understand this fact when connecting to wireless networks with their laptops. However, their awareness falters when connecting their mobile devices to the same networks.

 

According to a Echoworx study, 44% of the surveyed audience at London’s Infosecurity Europe 2011 conference transmitted sensitive information unencrypted to the Internet via their mobile devices.

No comment yet.
Scooped by Gust MEES
Scoop.it!

OWASP Top 10 Mobile Risks

Appsec USAMinneapolis, MNSeptember 23, 2011OWASP Top 10 Mobile RisksJack Mannino, nVisium SecurityMike Zusman, Carve Systems...
No comment yet.