Crime: between internet and reality

Cybercrime is gaining ground in the real world with same approaches being used by cybercriminals and traditional  criminals as well. We also note that more and more cases of crime involving the use of digital media, “says the French security information Club ( CLUSIF ) in its 2013 Panorama. According to Eric Freyssinet, Head of

Read More...

Ransomware is becoming fashionable

Ransomware is a trendy tool used by cybercriminals: this malicious software, once infiltrated in your computer, encrypts some part of your computer hard drive and requests in exchange a ransom to regain access to your stolen data. These cybercriminal programs keep on spreading even though they have been in use for long. In the second

Read More...

The Pirate Bay looking for more innovation

After launching the Pirate Browser, The Pirate Bay wishes to introduce another original way to bypass censorship on the web as well as server failures. In 2013, we already talked about the Pirate Browser web browser, introduced by The Pirate Bay. According to Torrent Freak, this dedicated to those who face various forms of web

Read More...

The NSA is working on a quantum computer

The NSA is aiming at creating a “quantum computer” that can decipher any encrypted data, according to the Washington Post, referring to some documents disclosed by the former Edward Snowden consultant. As part of a US$ 80 million research program, called “Penetrating Hard Targets “, the NSA has launched some research to develop a machine

Read More...

How the NSA elite team operates

Sneak into the TAO, the elite division of the NSA whose equipment sounds like James Bond’s one ! So far, the NSA had led to much media news with the PRISM case, a scandal involving major Internet players, via its massive online data espionage of people “suspected to be dangerous.” But the NSA has much

Read More...

Beware of hackers during holiday season!

More and more internet users are online shoppers, especially during the holiday season. This is a a great opportunity for cybercriminals who are always looking for ways to scam Internet users and smartphone users. Below are some of the tricks used by hackers. No Christmas break for cybercriminals! Indeed, they specifically use this time to

Read More...

Cybersecurity to be more complex in 2014

Cybersecurity is going to get much more complicated next year. The global IT nonprofit association ISACA believes that IT and cybersecurity professionals shall face accelerated change and complexity in cybersecurity, data privacy and big data in 2014. “The pace of change expected in 2014 will put incredible pressure on technology professionals in the workplace with a

Read More...

France: the CNIL stands against cookies

The National Commission on Informatics and Liberties ( CNIL) confirms that websites and advertising agencies should get the webuser’s approval before storing cookies on computers . This is a further step towards a less intrusive internet navigation. The CNIL has issued a “recommendation” that limits the use of cookies, this sort of invisible software that

Read More...

Africa is a paradise for cybercriminals

According to a Symantec study, it is in Africa that cybercrime is most severe. As analysed by Security Affairs, this study shows that it through using smartphones that computer viruses and malware spread the most. “A study conducted in Africa in 2012 showed that the development of smartphones involves the increased use of social networks

Read More...

NSA would also monitor online games

According to a new document released by Edward Snowden, the former NSA agent, and published on ProPublica website, online games such as World of Warcraft and Second Life are being monitored, since 2008, by American and British intelligence agencies. Indeed, according to the document, terrorist and criminal organizations would be using online games to communicate

Read More...