industryterm:online security

  • 5 Online #security Measures to Survive as an #ebusiness
    https://hackernoon.com/5-online-security-measures-to-survive-as-an-ebusiness-a4aa1ca7d9c8?sourc

    Cybersecurity is a broad term that encompasses all the technologies geared toward protecting networks and computers, along with the software and data kept on them. While more and more data today can be accessed via the internet, online security has become the major issue for businesses.The risks associated with online security are constantly and quickly increasing. The number of internet users steadily grows as well as the amount of information stored online. At the same time, hacking techniques evolve, including numerous social engineering tactics. As a result, online security issues are likely to become more prevalent, particularly in the business sphere.Menlo Security annual research suggests that 42% of Alexa top 100,000 websites are compromised. So what do you need to know to (...)

    #security-measures #cybersecurity #iot

  • The WIRED Guide to Digital Security | WIRED
    https://www.wired.com/2017/12/digital-security-guide

    Voici une petiite collection d’articles qui nous informent sur des méthodes de résister aux tentatives de surveillance et espionnage. Petit guide du parano débutant.

    In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

    The Motherboard Guide to Not Getting Hacked - Motherboard
    https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide

    Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications
    https://ssd.eff.org

    Smartphone Security 101: Key Steps From PINs to Permissions | WIRED
    https://www.wired.com/story/smartphone-security-101

    How to Encrypt All of the Things, From Chats to Calls and More | WIRED
    https://www.wired.com/story/encrypt-all-of-the-things

    How to Sweep For Bugs and Hidden Cameras | WIRED
    https://www.wired.com/story/how-to-sweep-for-bugs

    What To Do If You’ve Been Doxed | WIRED
    https://www.wired.com/story/what-do-to-if-you-are-being-doxed

    Cybersecurity Campaign Playbook | Belfer Center for Science and International Affairs
    https://www.belfercenter.org/CyberPlaybook

    #surveillance #résistance #espionnage

  • Test your Online Security & Privacy | Malware Help. Org
    http://www.malwarehelp.org/test-your-online-security-privacy.html

    Online Anti-virus Scanners
    Online Anti-malware Scanners
    Online Anti-malware Scanners (Single file)
    Online Firewall and Port Scanners
    Online Anti-spam and Email Security Scanners
    Online Browser Security and Privacy Scanners
    Online Anonymity, Proxy, IP, Whois and DNS Scanners
    Online Popup Blocker Tests, Wi-Fi, Java and Miscellaneous Security Scanners
    OT: Online Bandwidth and Connection speed Tests

    Website Security Check Tools
    Free Anonymous Proxies

  • Details Emerge on Global Bank Heists by Hackers - The New York Times
    http://www.nytimes.com/2016/05/14/business/dealbook/details-emerge-on-global-bank-heists-by-hackers.html

    Computer security researchers briefed on the investigation into one of the attacks, on the Bangladesh Bank, raised several theories about the crime, including the possibility that groups from Pakistan and North Korea may have been spying on the bank. Other analysts investigating the attacks said there were striking similarities between the “multiple bespoke tools” used by the hackers in both the banking cases and the attack on Sony Pictures in 2014.

    The latest breach detailed by Swift in a letter to its users on Friday occurred at a commercial bank that appeared, according to a leading online security firm BAE Systems on Friday, to be located in Vietnam.
    […]
    Also on Friday, two forensics investigators at BAE Systems outlined evidence that suggested similarities between the Bangladesh heist and a 2014 attack against Sony Pictures that law enforcement and intelligence agencies in the United States have traced to North Korea. That year, Sony released the farcical movie “The Interview,” which poked fun at North Korea.

    The investigators pointed to specialized, identical tools — including identical encryption keys, file names and a highly unusual data deletion technique — that were used in the attack on Sony Pictures, the Bangladesh central bank and the Vietnamese bank.

    However, people briefed on the actual investigation at the Bangladesh bank, who would speak only on the condition that they not be named, said that while the same tools were present inside Bangladesh’s systems, suggesting any link between that heist and the North Korean hackers would be premature.

  • Barack Obama : Protecting U.S. Innovation From Cyberthreats - WSJ
    http://www.wsj.com/articles/protecting-u-s-innovation-from-cyberthreats-1455012003

    More than any other nation, America is defined by the spirit of innovation, and our dominance in the digital world gives us a competitive advantage in the global economy. However, our advantage is threatened by foreign governments, criminals and lone actors who are targeting our computer networks, stealing trade secrets from American companies and violating the privacy of the American people.
    ...
    That’s why, today, I’m announcing our new Cybersecurity National Action Plan, backed by my proposal to increase federal cybersecurity funding by more than a third, to over $19 billion. This plan will address both short-term and long-term threats, with the goal of providing every American a basic level of online security.
    ...
    First, I’m proposing a $3 billion fund to kick-start an overhaul of federal computer systems.
    ...
    Second, we’re stepping up our efforts to build a corps of cyber professionals across government to push best practices at every level.
    ...
    Third, we’re strengthening our partnerships with the private sector to deter, detect and disrupt threats, including to the nation’s critical infrastructure.
    ...
    Fourth, we’re doing more to help empower Americans to protect themselves online. In partnership with industry, we’re launching a new national awareness campaign to raise awareness of cyberthreats and encourage more Americans to move beyond passwords—adding an extra layer of security like a fingerprint or codes sent to your cellphone.
    ...
    Finally, because government doesn’t have all the answers to these complex challenges, we’re establishing a bipartisan Commission on Enhancing National Cybersecurity to focus on long-term solutions. Working together, my administration and congressional leaders will appoint top business, strategic and technology thinkers from outside government to provide specific recommendations for bolstering cybersecurity awareness and protections across the public and private sectors over the next decade.

    A ne pas oublier :
    Le directeur du renseignement américain reconnaît s’intéresser aux objets connectés
    http://seenthis.net/messages/459751

    #USA #sécurité #internet

  • Hacked: 11 Signs Your Online Security Is Being Compromised
    http://www.maketecheasier.com/signs-for-compromised-online-security

    “There could be any number of explanations as to why a certain program is running painfully slow, or why your computer has started acting differently. While it could be your processor’s fault, or maybe your system doesn’t have an adequate amount of RAM inside, you can’t rule out the possibility that your online security has been compromised, and you are being hacked. Which is obviously more alarming. Below you will find about 11 symptoms, which if you ever come across, should make you consider the possibility of having been hacked.”

    #tool

  • #NSA Leaks Could Inspire a Global Boom in Intrusive #Surveillance | MIT Technology Review
    http://www.technologyreview.com/view/521561/nsa-leaks-could-inspire-a-global-boom-in-intrusive-surveillance

    Reports of the National Security agency’s surveillance programs (...) will prove inspirational [to governments and security services in developing economies,] according to a report (...) from the University of Toronto’s Citizen Lab, which studies online security and privacy.

    (...)

    Ron Deibert, director of Citizen Lab, (...) says that many companies already face “complex” and “frustrating” requests from “newly emerging markets” for data on their users. He believes that the NSA revelations will cause those to become even more common, with unwelcome results.

    (...)

    India, the United Arab Emirates, and Saudi Arabia, for example, have already demanded that BlackBerry add interception technology to its services, notes Deibert. He says that insisting that companies add such “backdoors” to their services introduces serious security risks, because they could be discovered and abused by others.