Piratage d'un serveur de l'AIEA

Posted by on Nov 28, 2012 in Sécurité

Piratage d'un serveur de l'AIEA

Tweet L’Agence internationale de l’énergie atomique (AIEA) a reconnu mardi que l’un de ses serveurs avait été piratée par un groupe de pirates informatiques et une  fuite de coordonnées de plus de 100 experts nucléaires à été divulgué. Un groupe de hackers appelé “Parastoo” a revendiqué la responsabilité du piratage. “Israel owns a practical nuclear arsenal, tied to a growing military body and is not a member of internationally respected...

Read More »

Windows 8 exposed to malware infections leading

Posted by on Nov 26, 2012 in Sécurité

Windows 8 exposed to malware infections leading

Tweet During this test, Windows 8 has been infected with malware 61 on 385 samples of the most common and most used by cybercriminals this year. The test sample consisted of malware families of malware detected most often during the last six months by the Reporting System for Real-Time Virus Bitdefender. Malware not detected by Windows Defender could, among other things, to install a backdoor to access the system, intercepting keystrokes, or steal credentials online games....

Read More »

Where not to hide your password?

Posted by on Nov 26, 2012 in Sécurité

Where not to hide your password?

Tweet When you have a small safe lacquer, it is often to choose good passwords, use the right tools to quantify and so on … And yet all can be played on a detail where we note that password. For example, when you call the Royal Air Force and in his office that receives the official photographer to capture the crown of the formidable Prince William with his military colleagues, we may forget to remove a sheet attached to the Wall on which is sensitive information...

Read More »

TOR Virtual Network Tunneling Tool 0.2.3.25

Posted by on Nov 23, 2012 in Logiciels

TOR Virtual Network Tunneling Tool 0.2.3.25

Tweet Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their...

Read More »

New rootkit on 64-bit Linux

Posted by on Nov 22, 2012 in Sécurité

New rootkit on 64-bit Linux

Tweet Server administrators attention! According to security experts Kaspersky, a new rootkit would have appeared on 64-bit Linux. This rootkit injects iframe or Javascript in web pages fiddling TCP packets. The iframe or javascript to be injected is not contained initially in the rootkit. The latter asks a third party server before injecting it into the server under attack. This rootkit is designed for large-scale attacks during which a maximum of users will be likely to...

Read More »