Search results for: Malware

Viruses and malware: are we protecting ourselves adequately?

Attacks, Virus informatiques, logiciels malveillants, malware, cyberattaque, Hervé Debar, Télécom SudParis, Malware, Cybersecurity

Cybersecurity incidents are increasingly gaining public attention. They are frequently mentioned in the media and discussed by specialists, such as Guillame Poupard, Director General of the French Information Security Agency. This attests to the fact that these digital incidents have an increasingly significant impact on our daily lives. Questions therefore …

+

Zero-click attacks: spying in the smartphone era

zero-click attacks

Zero-click attacks exploit security breaches in smartphones in order to hack into a target’s device without the target having to do anything. They are now a threat to everyone, from governments to medium-sized companies. “Zero-click attacks are not a new phenomenon”, says Hervé Debar, a researcher in cybersecurity at Télécom …

+

Bitcoin crash: cybercrime and over-consumption of electricity, the hidden face of cryptocurrency

Donia Trabelsi, Institut Mines-Télécom Business School ; Michel Berne, Institut Mines-Télécom Business School et Sondes Mbarek, Institut Mines-Télécom Business School Wednesday 19 May will be remembered as the day of a major cryptocurrency crash: -20% for  dogecoin, -19% for ethereum, -22% for definity, the supposedly-infinite blockchain that was recently launched with …

+

Something phishy is going on!

phishing

Cyberattacks have been on the rise since the month of March 2020. Hervé Debar, an information systems security researcher at Télécom SudParis, talked to us about the relationship between cyberattacks – such as phishing and zoom-bombing  – and the Covid-19 health crisis.   For some, the crisis brought about by …

+

Cybersecurity: high costs for companies

cost of cyber-attacks

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay The world of cybersecurity has changed drastically over the past 20 years. In the 1980s, information systems security was a rather confidential field with a focus on technical excellence. The notion of financial gain was more or less absent from attackers’ …

+

Cybersecurity: new times, new challenges

cybersecurity

Editorial. Who am I? A white man, almost 30. I wear hoodies and hack websites belonging to prestigious organizations like the CIA from my parents’ basement. Above all, I am thick-skinned. Have you guessed? I am, of course, a stereotypical hacker! Movies and TV series continue to propagate this false …

+

Cyberdefense seeks to regain control

cyberdefense

Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done, things are not as imbalanced as they might seem, and research is providing …

+

Hardware attacks, a lingering threat for connected objects

hardware attacks

Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly exploiting interaction with a system’s electronic components. These sneak attacks are particularly effective against …

+

24 words for understanding cybersecurity

Cyberattacks, 25 termes, cybersécurité, Hervé Debar

Starting with Algorithm and ending with Virus, this list features terms like Phishing and Firewall… As the symposium entitled “Are we entering a new era of cybersecurity?” is getting underway at IMT, here are 24 words to help you understand the concepts, technologies and systems used to protect people, materials …

+

Passwords: security, vulnerability and constraints

passwords

Hervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, …

+