Education & Numérique
50.6K views | +0 today
Follow
Education, outils numériques, TICE, littéracies numériques. Digital Literacies.
Curated by Terheck
Your new post is loading...
Your new post is loading...

Click a Tag = Custom Magazine

Current selected tag: 'Cybersecurity'. Clear
Rescooped by Terheck from Schools + Libraries + Museums + STEAM + Digital Media Literacy + Cyber Arts + Connected to Fiber Networks
Scoop.it!

Yes, Online Privacy Really Is Possible | Slate.com

Yes, Online Privacy Really Is Possible | Slate.com | Education & Numérique | Scoop.it

A few short weeks ago, we were conducting a security training for a group of journalists in Palestine. The journalists were deeply aware of the potential threats facing them—and by not one, but three governments—but didn’t have the first idea of how to mitigate against those threats. “It’s too confusing!” claimed one, while another said it was futile.

 

Unfortunately, these reactions are all too typical. We’ve heard from a variety of populations all over the world. Despite all of the awareness-raising around surveillance that has taken place over the last year, many individuals feel disempowered, helpless to fight back.

 

Efforts such as the February 11 initiative the Day We Fight Back aim to empower individuals to lobby their representatives for better regulation of mass surveillance. But legislation and policy are only part of the solution.

 

In order to successfully protect our privacy, we must take an approach that looks at the whole picture: our behavior, the potential risks we face in disclosing data, and the person or entity posing those risks, whether a government or company. And in order to successfully fight off the feeling of futility, we must understand the threats we face.

 

In a recent piece for Slate, Cyrus Nemati hems and haws over the complexities of creating a private online existence, ultimately choosing to give up on Internet privacy and embrace the convenience of sharing. While working at an organization that advocates for digital rights, Nemati found himself anxious about his personal privacy and took steps that made browsing “a chore”; later, after getting married and wanting access to social tools, he claims he “learned … to love a less private Internet.”

 

The truth is that most of us simply can’t protect ourselves from every threat 100 percent of the time, and trying to do so is a recipe for existential dread. But once we understand our threat model—what we want to keep private and whom we want to protect it from—we can start to make decisions about how we live our lives online. You’ll find yourself empowered, not depressed.

 

Threat modeling is an approach undertaken by the security community. It looks at the specific circumstances of the individual and the potential threats facing him or her and makes a diagnosis (and a prescription) on that basis. Threat modeling looks at what a person has to protect (her assets), who she has to protect those assets from (her threat), the likelihood that she will need to protect them, her willingness to do so, and the potential consequences of not taking precautions.

 

A teacher in suburban California doesn’t have the same set of online privacy concerns than a journalist in Palestine. And the kinds of steps the teacher might take to protect his personal photos from nosey students and their parents are quite different from the precautions the journalist might take to protect her anonymous sources from being identified by the government.

 

Some us don’t want our Internet browsing habits tracked by companies like Google and Facebook. Some of us don’t want the NSA reading our emails. But without enumerating our threats and our assets, it’s easy to choose tools that are inappropriate or unnecessary to the task at hand.

 

The schoolteacher probably doesn’t need to PGP-encrypt his email or run every privacy-enhancing app and plugin, like Nemati did in his privacy hipster phase. The journalist might find that taking the time to use PGP gives her peace of mind.

 

Click headline to read more--

 


Via Chuck Sherwood, Former Senior Associate, TeleDimensions, Inc
No comment yet.
Scooped by Terheck
Scoop.it!

Making the Mobile Web Safer with HTTPS Everywhere

Making the Mobile Web Safer with HTTPS Everywhere | Education & Numérique | Scoop.it
EFF is bringing the security and privacy of HTTPS Everywhere to an important new frontier: your Android phone. As of today, you can install HTTPS Everywhere on Firefox for Android (until now, it could only protect desktop browsers). With HTTPS Everywhere installed, Firefox for Android encrypts thousands of connections from your browser that would otherwise be insecure.
No comment yet.
Scooped by Terheck
Scoop.it!

Des applications de smartphones « mises sur écoute » par la NSA

Des applications de smartphones « mises sur écoute » par la NSA | Education & Numérique | Scoop.it
De nouveaux documents montrent que les agences de surveillance américaine et britannique compilaient des informations personnelles sur les utilisateurs.
No comment yet.
Scooped by Terheck
Scoop.it!

Threatwatch : Data Map of World Data Breaches

Threatwatch : Data Map of World Data Breaches | Education & Numérique | Scoop.it

"ThreatWatch is a snapshot of the data breaches hitting organizations and individuals, globally, on a daily basis.

It is not an authoritative list, since many compromises are never reported or even discovered."

No comment yet.
Rescooped by Terheck from 21st Century Learning and Teaching
Scoop.it!

Objets connectés : la sécurité à peine une option ? Internet Of Things

Objets connectés : la sécurité à peine une option ? Internet Of Things | Education & Numérique | Scoop.it
D’ici 2020, Internet devrait accueillir 50 milliards d’objets connectés, dont des montres, des voitures ou même des brosses à dents. De quoi rêver une société connectée ?

Via Gust MEES
Scooped by Terheck
Scoop.it!

BEE SECURE, pour une sensibilisation à la sécurité sur internet.

BEE SECURE, pour une sensibilisation à la sécurité sur internet. | Education & Numérique | Scoop.it

"L’initiative BEE SECURE englobe les actions au niveau de la sensibilisation à une utilisation plus sécurisée des nouvelles technologies de l’information et communication."

Terheck's insight:

Un petit merci particulier à @knolinfos pour m'avoir fait découvrir ce site, et un grand Merci à vous tous qui, sur scoop.it, twitter..., partagez vos liens, vos connaissances et vos savoirs.

No comment yet.
Rescooped by Terheck from Great Infographics
Scoop.it!

Worlds Biggest Data Breaches - Infographic - Cryptophone Australia

Worlds Biggest Data Breaches - Infographic - Cryptophone Australia | Education & Numérique | Scoop.it
The team over at Information Is Beautiful have put together an amazing interactive infographic cataloging the worlds biggest data breaches to date.

Via John van den Brink
No comment yet.
Rescooped by Terheck from 21st Century Learning and Teaching
Scoop.it!

Passwords, Security and the Future of Authentication [#Infographic]

Passwords, Security and the Future of Authentication [#Infographic] | Education & Numérique | Scoop.it

Are passwords dead?

 

According to Wired's Mat Honan, they ought to be. Honan is the technology journalist who was hacked last year. In just a few minutes, his entire digital life, including photos of his young daughter, disappeared. If it can happen to a tech-savvy writer like Honan, it can happen to anyone.


Via Berend de Jonge, juandoming, Gust MEES
Rescooped by Terheck from Social Media and its influence
Scoop.it!

You Might Have Gotten An Email From Twitter About Your Account Being Compromised, It’s Real | TechCrunch

You Might Have Gotten An Email From Twitter About Your Account Being Compromised, It’s Real | TechCrunch | Education & Numérique | Scoop.it
Keep your eyes peeled Twitter users: Twitter is sending out emails to some of its users telling them it has reset their password and asking them to create a new one. If you can't log into your account that may be why.

 

 


Via Gust MEES
No comment yet.
Scooped by Terheck
Scoop.it!

La plus grande attaque DDoS à ce jour vient de toucher l'Europe et les Etats-Unis

La plus grande attaque DDoS à ce jour vient de toucher l'Europe et les Etats-Unis | Education & Numérique | Scoop.it
Une attaque par déni de service (DDoS) a frappé de multiples serveurs aux Etats-Unis et en Europe en début de semaine. Il s'agit de l'attaque informatique de ce type la plus grande recensée à ce jour. [...]
No comment yet.
Scooped by Terheck
Scoop.it!

DÉCONNEXION – Un blogueur condamné pour avoir trouvé des documents via Google

DÉCONNEXION – Un blogueur condamné pour avoir trouvé des documents via Google | Education & Numérique | Scoop.it

"Pour le blogueur, hacker et journaliste Olivier Laurelli, alias Bluetouff, le verdict est tombé, mercredi 5 février, et nul ne sait s'il faut plutôt en rire ou en pleurer. Pour avoir téléchargé des documents non protégés trouvés via Google, il a été condamné à 3 000 euros d'amende, pour "maintien frauduleux dans un système de traitement automatisé de données" et "vol" de documents, rapporte le site Numerama..."

Terheck's insight:

Cela ressemble à une fiction, un hoax, mais non, c'est la réalité.

No comment yet.
Scooped by Terheck
Scoop.it!

Edward Snowden accuse la NSA d'espionnage industriel

Edward Snowden accuse la NSA d'espionnage industriel | Education & Numérique | Scoop.it
Dans un entretien télévisé à une chaîne allemande, il affirme que l'agence américaine utilise parfois des informations « qui n'ont rien à voir avec la sécurité nationale » à des fins économiques.
No comment yet.
Rescooped by Terheck from D&IM (Document & Information Manager) - CDO (Chief Digital Officer) - Gouvernance numérique
Scoop.it!

Cisco : Les vulnérabilités et menaces informatiques atteignent un niveau record depuis 2000 - Global Security Mag Online

"Le Rapport Annuel sur la Sécurité 2014 de Cisco, publié aujourd’hui, révèle que le nombre total de vulnérabilités et de menaces a atteint un niveau record depuis le début de leur recensement en mai 2000. En octobre 2013, le nombre total d’alertes cumulées a augmenté de 14 % en glissement annuel par rapport à 2012 (...)"


Via Jean-Pierre Blanger
No comment yet.
Rescooped by Terheck from ICT Security-Sécurité PC et Internet
Scoop.it!

How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks

How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks | Education & Numérique | Scoop.it
It's not as bad as you thought - it's much worse

Via Gust MEES
Rescooped by Terheck from ICT Security-Sécurité PC et Internet
Scoop.it!

Adobe issues patches for critical Flash, Reader and Shockwave flaws

Adobe issues patches for critical Flash, Reader and Shockwave flaws | Education & Numérique | Scoop.it
Adobe released security updates for Flash Player, Adobe Reader and Shockwave Player on Tuesday to address critical vulnerabilities that could allow attackers to take control of systems running vulnerable versions of those programs.

 

Users of Google Chrome and Internet Explorer 10 on Windows 8 will automatically receive updates for the Flash Player plug-in bundled with those browsers through their respective update mechanisms.

 

Users of Adobe Reader or Acrobat XI for Windows and Mac OS X are advised to upgrade to Adobe Reader XI (11.0.04) or Adobe Acrobat XI (11.0.04), respectively. Adobe Reader and Acrobat X for Windows and Mac have also been updated to version 10.1.8.

 


Via Gust MEES
Terheck's insight:

Links for downloads :

Flash player : https://www.adobe.com/products/flashplayer/distribution3.html

Shockwave player : http://get.adobe.com/fr/shockwave/

Adobe AIR : http://get.adobe.com/fr/air/

Gust MEES's curator insight, September 11, 2013 10:31 AM

 

Users of Adobe Reader or Acrobat XI for Windows and Mac OS X are advised to upgrade to Adobe Reader XI (11.0.04) or Adobe Acrobat XI (11.0.04), respectively. Adobe Reader and Acrobat X for Windows and Mac have also been updated to version 10.1.8.


mindlesspeduncle's curator insight, September 12, 2013 2:03 PM

great

Scooped by Terheck
Scoop.it!

The Surprising Holes The IT Security "Kill Chain" Is Neglecting

The Surprising Holes The IT Security "Kill Chain" Is Neglecting | Education & Numérique | Scoop.it
Security exploits don't have expiration dates - why you can't count on a multi-vendor, multi-layer "kill chain" to protect your company.
No comment yet.
Scooped by Terheck
Scoop.it!

Could These 6 Pending Regulations Destroy The Internet In 2013?

Could These 6 Pending Regulations Destroy The Internet In 2013? | Education & Numérique | Scoop.it
The fallout from major national and international regulations expected in 2013 threaten to change the very nature of the Internet.
No comment yet.
Scooped by Terheck
Scoop.it!

Rogers’ “Cybersecurity” Bill Is Broad Enough to Use Against WikiLeaks and The Pirate Bay | Electronic Frontier Foundation

Rogers’ “Cybersecurity” Bill Is Broad Enough to Use Against WikiLeaks and The Pirate Bay | Electronic Frontier Foundation | Education & Numérique | Scoop.it

Congress is doing it again: they’re proposing overbroad regulations that could have dire consequences for our Internet ecology.

No comment yet.