21st Century Learning and Teaching
586.8K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Malware', 'eLeaderShip'. Clear
Scooped by Gust MEES
Scoop.it!

New Rombertik malware attacks hard drives, wipes MBR if detected | ICT | eSkills | CyberSecurity

New Rombertik malware attacks hard drives, wipes MBR if detected | ICT | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
The game of cat-and-mouse between malware authors and security white hats may have entered a new phase this week, thanks to an aggressive new malware system that doesn’t just attempt to obfuscate its own operation — it aggressively scans for clues that others are monitoring its actions. If it detects that it’s operating within a Virtual Machine, the malware, dubbed Rombertik, will go nuclear and attempt to overwrite the master boot record of the local hard drive.

Cisco’s threat response team has detailed the operation of Rombertik, and the malware’s obfuscation and attack vectors are unique. Once installed, it’s a fairly standard data sniffer that grabs indiscriminately from the information available on an infected PC. What sets Rombertik apart is the way it checks to see if it’s running in a VM-provided sandbox, and the actions it takes if it finds itself in such a mode.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Rombertik


Gust MEES's insight:

The game of cat-and-mouse between malware authors and security white hats may have entered a new phase this week, thanks to an aggressive new malware system that doesn’t just attempt to obfuscate its own operation — it aggressively scans for clues that others are monitoring its actions. If it detects that it’s operating within a Virtual Machine, the malware, dubbed Rombertik, will go nuclear and attempt to overwrite the master boot record of the local hard drive.


Cisco’s threat response team has detailed the operation of Rombertik, and the malware’s obfuscation and attack vectors are unique. Once installed, it’s a fairly standard data sniffer that grabs indiscriminately from the information available on an infected PC. What sets Rombertik apart is the way it checks to see if it’s running in a VM-provided sandbox, and the actions it takes if it finds itself in such a mode.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Rombertik


No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware-Fakten Deutschland- und weltweit | CyberSecurity | Digital CitizenShip | eSkills

Malware-Fakten Deutschland- und weltweit | CyberSecurity | Digital CitizenShip | eSkills | 21st Century Learning and Teaching | Scoop.it
Das Vergleichsportal Netzsieger.de hat Infografiken mit Malware-Fakten veröffentlicht. Demnach ist jeder dritte Computer weltweit mit Malware infiziert. In Deutschland sieht es nicht viel besser aus.


Mehr erfahren:


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


https://gustmeesde.wordpress.com/2014/12/26/programme-die-auf-jeden-neuen-pc-und-smartphones-gehoren/


Gust MEES's insight:
Das Vergleichsportal Netzsieger.de hat Infografiken mit Malware-Fakten veröffentlicht. Demnach ist jeder dritte Computer weltweit mit Malware infiziert. In Deutschland sieht es nicht viel besser aus.


Mehr erfahren:


https://gustmeesde.wordpress.com/2014/12/13/mobile-security-smartphones-sind-auch-mini-computer/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


https://gustmeesde.wordpress.com/2014/12/26/programme-die-auf-jeden-neuen-pc-und-smartphones-gehoren/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Destroying your hard drive is the only way to stop this super-advanced malware

Destroying your hard drive is the only way to stop this super-advanced malware | 21st Century Learning and Teaching | Scoop.it

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

Gust MEES's insight:

The Equation Group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said.


A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia, utilizing a startlingly advanced form of malware that is impossible to remove once it's infected your PC.

Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency

.

The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN


http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Free Website Malware and Security Online Scanner | Sucuri Security | CyberSecurity

Free Website Malware and Security Online Scanner | Sucuri Security | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Web site security monitoring and malware removal


Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.


Learn more:


http://www.scoop.it/t/ict-security-tools




Gust MEES's insight:
Web site security monitoring and malware removal


Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.


Learn more:


http://www.scoop.it/t/ict-security-tools



No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple : les Macs sont de vraies passoires à malwares | CyberSecurity | Awareness | eSkills

Apple : les Macs sont de vraies passoires à malwares | CyberSecurity | Awareness | eSkills | 21st Century Learning and Teaching | Scoop.it
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Gust MEES's insight:
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Gust MEES's curator insight, April 27, 2015 8:35 AM
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

100k+ WordPress websites compromised by SoakSoak malware | CyberSecurity

100k+ WordPress websites compromised by SoakSoak malware | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware.

The discovery was made on Sunday, when Google blacklisted over compromised 11,000 domains. After poking around a bit, the researchers discovered that most of the affected hosts are running WordPress.



Sucuri researchers are urging site administrators to check whether their sites have been compromised with this or other malware via their free website malware and security scanner.


Gust MEES's insight:

Sucuri Security researchers are warning about a massive compromise of WordPress sites sporting malicious JavaScript leading visitors to malware.

The discovery was made on Sunday, when Google blacklisted over compromised 11,000 domains. After poking around a bit, the researchers discovered that most of the affected hosts are running WordPress.



Sucuri researchers are urging site administrators to check whether their sites have been compromised with this or other malware via their free website malware and security scanner.


No comment yet.