Editor Check Point provides its forecasts of computer attacks and vulnerabilities most likely to hit businesses in 2014. Social engineering objects connected: quick overview of the top ten threats.
[...] The human remains a weak link in the security.
1. Social engineering
2. Internal threats
3. Campaigns targeted malware
6. Attacks against the interests and state infrastructure
7. Wars against websites
8. Theft of customer data
9. Piracy social media
10. Attacks against smart homes
By Marie Jung pro.01net.com
Guests: former DGSE agent Pierre Martinet and Jean-Emmanuel private Derny
Podcast Every last Monday of the month from 19h to 20h, follow the live broadcast of StreetPress. This week, the pros Intelligence Pierre Martinet and Jean-Emmanuel Derry put our phones on listening to talk of espionage made in France.
Jean-Emmanuel Derny: In France you can become a detective after training bac +3 level, but it can be done in one or two years. Basically there are a number of course hours imposed, it is equivalent to a professional license. But there are only three organizations in France that make this profession. If the profession is also open to former Judicial Officers and Military Police.
TUNE THE ISSUE HERE
Johan Weisz for streetpress.com
Federation of Enterprises in Belgium introduced Thursday its "Belgian cyber security guide." A free 72-page guide designed to help employers and employees to better protect their data in a world gone decidedly digital.
As explained Olivier Bogaert, "the approach to the digital, this must become a reflex", "at least when one is confronted with the problem, we remember how we must act."
Only downside, the guide is in English yet. But it will be translated into French and Dutch in the first quarter of next year.
C. Biourge for rtbf.be
Mind Mapping is undoubtedly one of the important tools of economic intelligence, so when we received a very good job of reading sheet incorporating a mind map done by a student, Mr Paul NOEL, IDRAC, School of Business and Management in Lyon under the direction for Economic Intelligence of Mr Laurent DELHALLE, we wanted to share it with his consent.
A mapping of the book " Economic Intelligence manual . "
This is also an opportunity to grasp a concrete example of Mind Mapping, and why not to try it ...
To get started:
XMind is an open source creation "concept map" software, flow charts, maps, plans and other drawings. Very easy to use, the application allows you to edit every part of your chart (link, primary and secondary inserts, etc..), Add images and links, insert text, integrate markers (like emoticons) to indicate the priority for example, annotate your box, etc..
By Paul NOEL, IDRAC Lyon.
Regional Club of Best Practices in Business Intelligence met November 13, 2013, in closing Personals Regional Innovation.
It is co-organized by the CCI Normandy and the Gendarmerie Nationale.
Topic: "Communication and Influence" through several feedback and testimonials of communication professionals and the legal world.
Madame Claude Revel, Interministerial Delegate Business Intelligence exchanges closed the meeting.
By: Animation: Stéphane SALZMANN - Journalist
Video Production: http://www.produlive.com (R-Life)
Audio capture: CCI Evreux
The National Assembly on Tuesday discussed the extension of the cyber. A text that plans to expand the plans except for access to user data (phone, internet).
Already discussed discreetly in the Senate in October, the military program law (LPM) came under discussion in the National Assembly on Tuesday.
By Caroline Piquet for bfmtv.com
According to information from the Dutch media NRC, NSA placed world-wide malware on some 50,000 computer networks. As of 2012, a document reveals a card on the state of the infection. NSA has managed to infiltrate networks in cities like Geneva, Athens, Rome, Caracas, Bogota, Mexico City, Havana, Bangkok, New Delhi, Sofia, Paris, Berlin, Frankfurt, Milan and it is only a short list.
Jérôme Gianoli for ginjfo.com
Or referred villainous or political espionage: a hacker "ethic" is reached by Mediapart (subscriber link) to get into the mailboxes of six MEPs and eight of their employees for the sole purpose of getting a "political message". The information website says with a simple low-end laptop with a wi-fi card installed near the Parliament in Strasbourg, man is able to recover passwords of the 14 European leaders selected chance.
By writing bigbrowser.blog.lemonde.fr
Big Data is characterized by three "V": the huge volume of data, their variety and their speed. Should we be afraid? That allow you to make new statistical methods and computer technologies?
With the mathematician Stéphane TUFFERY on the theme of the exploitation of multiple data.
Watch the video of Space Science in the area of U (Université Rennes 2)
By Stephane Tuffery for cursus.edu
Companies using virtual currency Bitcoin United States might choose to emigrate abroad if the authorities claimed too "unfriendly" towards them, warned before the U.S. Senate one of their promoters Launched in 2009, the bitcoin can be redeemed online, on servers called "minor bitcoins" - against real or used money to buy goods and services over the internet. It is regulated by any government.
This summer, Germany acknowledged as the bitcoin currency, which allows it to tax transactions in that currency. There are approximately 1.5 billion equivalent bitcoins in circulation worldwide. The president of the commission, Senator Thomas Carper hoped we could take advantage of "economic benefits" of virtual currencies, while "getting rid of their criminal behavior."
By writing lesechos.fr