Catégorie : Non classé

14/02/2017 Liens utiles
   Non classé  
  GPG https://www.nextinpact.com/news/102201-clefs-gpg-comment-stocker-et-utiliser-via-clef-usb-openpgp-card.htm Empreinte utilisateur http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf  https://www.nextinpact.com/news/103290-des-chercheurs-creent-empreinte-pour-pister-internaute-via-plusieurs-navigateurs.htm  Fortinet NSE https://training.fortinet.com/course/index.php Dangers à venir http://webfoundation.org/2017/03/web-turns-28-letter/#VersionFR Bots http://www.marketwired.com/press-release/distil-networks-releases-fourth-annual-bad-bot-report-revealing-bad-bots-most-prevalent-2203427.htm Bonnes pratiques https://securityintelligence.com/mitigating-malware-modern-mobile-world/   Prospective Les menaces 2015-2020 selon Intel Règles simples http://www.ssi.gouv.fr/uploads/2015/03/guide_cgpme_bonnes_pratiques.pdf http://www.zdnet.fr/actualites/les-12-regles-essentielles-de-securite-pour-les-pme-39826498.htm https://www.theguardian.com/intel-better-it-decisions/2016/sep/30/how-safe-are-you-from-hackers Attaques http://www.silicon.fr/attaque-flip-feng-shui-vm-cloud-poreuses-156463.html Articles non classés http://www.internetsociety.org/sites/default/files/BPSecurity_Resilience-FR_0.pdf http://www.net-security.org/dl/insecure/INSECURE-Mag-48.pdf http://www.ssi.gouv.fr/administration/bonnes-pratiques/ http://www.internetsociety.org/sites/default/files/BPSecurity_Resilience-FR_0.pdf http://www.latribune.fr/technos-medias/internet/la-cybercriminalite-est-la-nouvelle-menace-du-xxie-siecle-485152.html http://www.journaldunet.com/solutions/securite/hacking.shtml https://fr.news.yahoo.com/confessions-d-voleur-d-identit%C3%A9-%C3%A0-lire-absolument-071324194.html https://www.facebook.com/notes/php/installing-and-securinghardening-lamp-latest-version-apache-24-php-56-mysql-56-i/10152909782215681 http://www.cert-ist.com/fra/ressources/Publications_ArticlesBulletins/Environnement_Microsoft/ApiHooking/ http://www.indexel.net/dossier/securite.html http://www.zdnet.fr/actualites/externaliser-la-securite-les-solutions-saas-evoluent-au-dela-des-fonctions-de-base-39750682.htm http://www.gsdays.fr/ http://heideri.ch/jso/#charset http://www.secuobs.com/ http://blog.whatwg.org/whats-next-in-html-episode-2-sandbox http://www.veracode.com/blog/2010/05/html5-security-in-a-nutshell/ http://www.pcworld.com/businesscenter/article/203794/html5_raises_new_security_issues.html APT http://blog.crysys.hu/2014/11/new-anti-apt-tools-are-no-silver-bullets-an-independent-test-of-apt-attack-detection-appliances/ http://www.01net.com/editorial/519753/telechargement-cinq-logiciels-pour-presenter-ses-photos/ http://pro.01net.com/editorial/514994/qubes-le-linux-blinde-base-sur-xen/ […]