FBI prepares an interactive malware analysis system

The federal agency shall launch this year its “Malware Investigator”, an interactive malware analysis system. It shall allow companies and individuals to better cope with cyber-attacks. James Comey, who has been recently appointed as the new FBI director, announced that the agency was working on a system analyzing malicious software that would be implemented by

Read More...

How to fix Apple last but not least security flaw

On February 21st, Apple unveiled a huge security hole in its mobile devices software. So if you have used an open WiFi connection in a cafe, a hotel or an airport … someone could sneak into the electronic exchanges you had with your iPhone or iPad and then access to some information which you though

Read More...

Cybersecurity: 10 threats to monitor in 2014

The overall cost of cyberattacks for businesses in 2013 is estimated to € 300 billion. Here are the 10 key trends in cybersecurity and cybercrime that rose in 2013 and should be closely monitored in 2014. – Governements’ art of espionage A U.S. IT security publisher report in 2013 has lifted the veil on cyber-espionage

Read More...

Cybercrime, a difficult threat to assess

Cyber​​attacks are increasing, via internet scams are becoming more sophisticated as criminals are refining their attacks like true professionals : Cybercrime has never been so heavy and menacing , while specialists are struggling to determine its extent. “Cybercrime statistics are not operating. Sometimes you multiply these numbers by ten, because people are not aware of

Read More...

Crime: between internet and reality

Cybercrime is gaining ground in the real world with same approaches being used by cybercriminals and traditional  criminals as well. We also note that more and more cases of crime involving the use of digital media, “says the French security information Club ( CLUSIF ) in its 2013 Panorama. According to Eric Freyssinet, Head of

Read More...

Ransomware is becoming fashionable

Ransomware is a trendy tool used by cybercriminals: this malicious software, once infiltrated in your computer, encrypts some part of your computer hard drive and requests in exchange a ransom to regain access to your stolen data. These cybercriminal programs keep on spreading even though they have been in use for long. In the second

Read More...

The Pirate Bay looking for more innovation

After launching the Pirate Browser, The Pirate Bay wishes to introduce another original way to bypass censorship on the web as well as server failures. In 2013, we already talked about the Pirate Browser web browser, introduced by The Pirate Bay. According to Torrent Freak, this dedicated to those who face various forms of web

Read More...

Beware of hackers during holiday season!

More and more internet users are online shoppers, especially during the holiday season. This is a a great opportunity for cybercriminals who are always looking for ways to scam Internet users and smartphone users. Below are some of the tricks used by hackers. No Christmas break for cybercriminals! Indeed, they specifically use this time to

Read More...

Cybersecurity to be more complex in 2014

Cybersecurity is going to get much more complicated next year. The global IT nonprofit association ISACA believes that IT and cybersecurity professionals shall face accelerated change and complexity in cybersecurity, data privacy and big data in 2014. “The pace of change expected in 2014 will put incredible pressure on technology professionals in the workplace with a

Read More...

Cybercensorship ranks top in Iran

In the Kerman province located in the southeast part of Iran, the Revolutionary Guards have again blocked some new websites. The official news agency ISNA said: “In a technical large-scale operation of intelligence services (IRGC) in the Kerman province, nine Internet websites which were against to the regime of the Islamic Republic have been blocked.”

Read More...