iLeak

https://i1.wp.com/www.telegraph.co.uk/content/dam/technology/2018/02/08/TELEMMGLPICT000147735659_trans_NvBQzQNjv4BqIkUhv7k5mil0w0oeVCztIhVrDwi3LvLa62XQyE1Z5U4.jpeg?resize=900%2C120Secret iPhone code published online in ‘biggest ever’ leak

A secret part of Apple’s iPhone software has been posted online in a leak that could potentially allow hackers to find security holes in the smartphone.

Although the release does not immediately put iPhone owners at risk, security experts said the leak enables hackers to analyse Apple’s code, replicate and manipulate it for malicious purposes and that users could be vulnerable in the future.

On Wednesday night, an anonymous user published part of the « source code » – the computing instructions that underpin the iOS software – on GitHub, a website for computer programmers to share code.

BBC server hacked by Russian cyber criminal

A general view of the BBC headquarters in London

9:57AM GMT 30 Dec 2013

A Russian hacker secretly infiltrated a computer server at the BBC and tried to convince other cyber criminals to pay him for access to the system, according to reports. The BBC’s security team responded to the issue on Saturday and believes it has secured the site, a person familiar with the incident told Reuters. It is not known whether the hackers stole data or caused any damage to the system. The BBC declined to discuss the incident, claiming that it does not comment on security issues. The server in question was an FTP server, which would typically be used to manage the transfer of large data files over the Internet.

Cybersécurité : le gouvernement veut mettre les télécoms à contribution pour détecter les attaques

Cybersécurité : le gouvernement veut mettre les télécoms à contribution pour détecter les attaques

Un livre blanc « cyber » pour adapter la posture française aux menaces informatiques a également été présenté.

Le Monde | • Mis à jour le | Par Martin Untersinger

 

EUROPOL : Belgian Federal Police releases free decryption keys for the Cryakl ransomware


EUROPOL News : Belgian Federal Police releases free decryption keys for the Cryakl ransomware

09 February 2018
Press Release

This News/Press release is about Cybercrime

View all crime areas

The Belgian Federal Police is releasing free decryption keys for the Cryakl ransomware today, after working in close cooperation with Kaspersky Lab. The keys were obtained during an ongoing investigation; by sharing the keys with No More Ransom the Belgian Federal Police becomes a new associated partner of the project – the second law enforcement agency after the Dutch National Police.

In the last few years ransomware has eclipsed most other cyber threats, with global campaigns indiscriminately affecting organisations across multiple industries in both the public and private sector, as well as consumers. One of the most effective ways to fight ransomware is to prevent it. This is exactly why No More Ransom was launched more than a year ago.

Today sees yet another successful example of how cooperation between law enforcement and internet security companies can lead to great results. When the Belgian Federal Computer Crime Unit (FCCU) discovered that Belgian citizens had been victims of the Cryakl ransomware, they were able to locate a command and control centre in one of Belgium’s neighbouring countries. Led by the federal prosecutor’s office, the Belgian authorities seized this and other servers while forensic analysis worked to retrieve the decryption keys. Kaspersky Lab provided technical expertise to the Belgian federal prosecutor and has now added these keys to the No More Ransom portal on behalf of the Belgian federal police. This will allow victims to regain access to their encrypted files without having to pay to the criminals.

The Belgian authorities are currently continuing the investigation. However, with cybersecurity and the best interests of the Cryakl ransomware victims at heart, the seized decryption keys have already been uploaded onto the No More Ransom portal.

52 decryption tools available

Since the launch of the No More Ransom portal in July 2016 almost 1.6 million people from more than 180 countries have accessed the website, available in 29 languages with Estonian as the most recent addition.

There are now 52 free decryption tools on www.nomoreransom.org, which can be used to decrypt 84 ransomware families. CryptXXX, CrySIS and Dharma are the most detected infections. More than 35 000 people have managed to retrieve their files for free, which has prevented criminals from profiting from more than EUR 10 million.

The number of partners working together on No More Ransom has risen to more than 120, including more than 75 internet security companies and other private partners. The Cypriot and Estonian police are the most recent law enforcements agencies to join. KPN, Telenor and The College of Professionals in Information and Computing (CPIC) have joined as new private sector partners.

Find more information and prevention tips on www.nomoreransom.org.


Le signal de Snowden

Parce qu’on a tout à cacher et que nous avons besoin d’une vie privée, d’intimité, pour rester sain d’esprit et demeurer digne, passons à Signal, l’application qui respecte la sphère privée :

https://sgnl.link/1KpeYmF

« Patricia, mon petit…. Je ne voudrai pas paraître vieux jeu et encore moins grabataire, l’homme de la data parfois rude reste toujours courtois, mais la vérité m’oblige à te le dire… ton face de bouc commence à nous les pomper menu ! » librement inspiré des Tontons flingueurs.

CNIL : Guide & Gestion des risques pour le RGPD

Le règlement européen européen dispose dans son article 32 que : « le responsable du traitement et le sous-traitant mettent en œuvre les mesures techniques et organisationnelles appropriées afin de garantir un niveau de sécurité adapté au risque« .

Or, il est parfois difficile, lorsque l’on n’est pas familier avec les méthodes de gestion des risques, de mettre en œuvre une telle démarche et de s’assurer que le minimum a bien été fait.

La CNIL publie un guide pouvant être utilisé dans le cadre d’une gestion des risques.

Il est constituée des quatre étapes suivantes :

  1. Recenser les traitements de données à caractère personnel ;
  2. Apprécier les risques engendrés par chaque traitement ;
  3. Mettre en œuvre et vérifier les mesures prévues ;
  4. Faire réaliser des audits de sécurité périodiques.