Welcome!

Microservices Expo Authors: Elizabeth White, Pat Romanski, Liz McMillan, Harry Trott, Mamoon Yunus

News Feed Item

Kaspersky Lab : L’après-Noël : sécuriser ses échanges de cadeaux et l’achats de produits « d’occasion »

1 Français sur 2 est prêt à revendre sur Internet un ou plusieurs cadeaux reçus pour Noël (livres, DVD, smartphones et tablettes sont les principaux présents revendus sur la toile), selon une étude menée par OpinionWay pour PriceMinister1.
Depuis quelques années déjà, cette tendance connait un véritable succès. Selon une étude menée par TNS Sofres pour eBay2, le pic de revente cette année est attendu le 7 janvier 2013.
Dans cette frénésie d’achats et de reventes, il est d’autant plus essentiel de ne pas oublier les bons réflexes pour éviter les principaux pièges tels que le « phishing ». En effet, en période de fêtes, le vol de données et l’usurpation d’identité sont monnaie courante.

En outre, selon une récente enquête réalisée pour Kaspersky Lab3, aussi incroyable que cela puisse paraître, un participant sur trois (33%) conserve ses coordonnées bancaires sur son ordinateur domestique.

Pourtant :

  • 62% des utilisateurs considèrent la fuite de données financières comme la menace la plus dangereuse.
  • 47 % estiment que le vol d’informations bancaires lors d’achat en ligne est le problème le plus préoccupant lorsque l’on se rend sur internet.
  • 57 % des Français estiment qu’ils ne sont pas suffisamment outillés pour faire face aux menaces de sécurité sur internet.

Ainsi, les experts des laboratoires Kaspersky Lab conseillent fortement, lors des achats en ligne, de :

  • Ne pas céder trop vite à la tentation. Si une affaire paraît trop bonne pour être vraie, c’est qu’elle ne l’est sans doute pas.
  • Vérifier la présence du cadenas et de la mention https dans la barre d’adresse d’un site pour une transaction sécurisée.
  • Mettre à jour régulièrement ses logiciels afin de se protéger contre les cybermenaces déjà identifiées.
  • Créer des mots de passe complexes et des réponses aux questions de « sécurité » « hors du commun » afin de protéger ses données et ses boites mails. Le complément de sécurité Kaspersky Password Manager automatise entièrement la saisie de mots de passe et d’autres informations personnelles sur des sites Web ou des applications Windows.
  • Choisir une solution complète incluant des modules de protection bancaire spécifique tel que le clavier virtuel. Cette solution permet ainsi de limiter le « keylogging », processus d’intrusion qui enregistre les frappes au clavier et l'apparition du caractère à l'écran.

Salle de presse virtuelle Kaspersky Lab
Kaspersky Lab a lancé une nouvelle salle de presse en ligne, Kaspersky Lab Newsroom Europe (http://newsroom.kaspersky.eu). Destinée à l’ensemble des journalistes européens, celle-ci est spécialement conçue pour répondre aux demandes des médias. Elle a pour objectif de faciliter la recherche d’informations sur l’entreprise et ses produits, de mettre à disposition des chiffres, des contenus éditoriaux, des images, des vidéos et des fichiers audio.

À propos de Kaspersky Lab
Kaspersky Lab est l’un des plus grands fournisseurs mondial de solutions de sécurité informatique. La société est classée parmi les 4 premiers fournisseurs de solutions de sécurité informatique pour les particuliers*.
Tout au long de ses 15 ans d’expérience, Kaspersky Lab a su rester un acteur innovant sur le marché de la sécurité informatique et fournit aujourd’hui des solutions de sécurité efficaces pour les particuliers, les PME et les grands comptes.
La société opère actuellement dans près de 200 pays et territoires, offrant une protection à plus de 300 millions d’utilisateurs à travers le monde.
Pour en savoir plus www.kaspersky.com.

* La société a été classée quatrième dans le classement IDC Worldwide Endpoint Security Revenue by Vendor, 2010. Ce classement a été publié dans le rapport d’IDC Worldwide IT Security Products 2011-2015 Prévisions et parts de marché des fournisseurs 2010 – décembre 2011. Le rapport classe les éditeurs de logiciels selon les revenus des ventes de solutions de sécurité en 2010.

Pour plus d’informations concernant Kaspersky Lab : http://www.kaspersky.fr

Pour plus d’informations sur l’actualité virale : http://www.securelist.com

Suivez nous sur les réseaux sociaux !

Twitter Facebook YouTube Viadeo

1 Etude quantitative réalisée en ligne par l’Institut OpinionWay pour PriceMinister du 12 au 14 décembre 2012 sur 1054 répondants âgés de 18 ans et plus, représentatifs de la population française (sur des critères de sexe, d’âge, de CSP et de région UDA, source INSEE).

2 Etude en ligne TNS Sofres pour eBay France réalisée entre le 11 et le 15 octobre 2012 auprès d’un échantillon de 1030 personnes âgées de 16 à 64 ans, représentatif de la population française.

3 Enquête Harris Interactive pour le compte de Kaspersky Lab portant sur les tendances et risques en ligne pour les internautes, menée au total sur plus de 8000 personnes en Europe, USA et Russie en février et mars 2012.

© 2012 Kaspersky Lab. Les informations contenues dans ce document peuvent être modifiées sans préavis. Les seules garanties associées aux produits et services Kaspersky Lab figurent dans les clauses de garantie qui accompagnent lesdits produits et services. Le présent document ne peut être interprété en aucune façon comme constituant une garantie supplémentaire. Kaspersky Lab décline toute responsabilité liée à des erreurs ou omissions d’ordre technique ou éditorial pouvant exister dans ce document.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
@DevOpsSummit at Cloud Expo taking place Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center, Santa Clara, CA, is co-located with the 21st International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is ...
With Cloud Foundry you can easily deploy and use apps utilizing websocket technology, but not everybody realizes that scaling them out is not that trivial. In his session at 21st Cloud Expo, Roman Swoszowski, CTO and VP, Cloud Foundry Services, at Grape Up, will show you an example of how to deal with this issue. He will demonstrate a cloud-native Spring Boot app running in Cloud Foundry and communicating with clients over websocket protocol that can be easily scaled horizontally and coordinate...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
There are several reasons why businesses migrate their operations to the cloud. Scalability and price are among the most important factors determining this transition. Unlike legacy systems, cloud based businesses can scale on demand. The database and applications in the cloud are not rendered simply from one server located in your headquarters, but is instead distributed across several servers across the world. Such CDNs also bring about greater control in times of uncertainty. A database hack ...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
API Security is complex! Vendors like Forum Systems, IBM, CA and Axway have invested almost 2 decades of engineering effort and significant capital in building API Security stacks to lockdown APIs. The API Security stack diagram shown below is a building block for rapidly locking down APIs. The four fundamental pillars of API Security - SSL, Identity, Content Validation and deployment architecture - are discussed in detail below.
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
API Security has finally entered our security zeitgeist. OWASP Top 10 2017 - RC1 recognized API Security as a first class citizen by adding it as number 10, or A-10 on its list of web application vulnerabilities. We believe this is just the start. The attack surface area offered by API is orders or magnitude larger than any other attack surface area. Consider the fact the APIs expose cloud services, internal databases, application and even legacy mainframes over the internet. What could go wrong...
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically ab...
Web services have taken the development world by storm, especially in recent years as they've become more and more widely adopted. There are naturally many reasons for this, but first, let's understand what exactly a web service is. The World Wide Web Consortium (W3C) defines "web of services" as "message-based design frequently found on the Web and in enterprise software". Basically, a web service is a method of sending a message between two devices through a network. In practical terms, this ...
Docker is on a roll. In the last few years, this container management service has become immensely popular in development, especially given the great fit with agile-based projects and continuous delivery. In this article, I want to take a brief look at how you can use Docker to accelerate and streamline the software development lifecycle (SDLC) process.
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
We define Hybrid IT as a management approach in which organizations create a workload-centric and value-driven integrated technology stack that may include legacy infrastructure, web-scale architectures, private cloud implementations along with public cloud platforms ranging from Infrastructure-as-a-Service to Software-as-a-Service.
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
We have already established the importance of APIs in today’s digital world (read about it here). With APIs playing such an important role in keeping us connected, it’s necessary to maintain the API’s performance as well as availability. There are multiple aspects to consider when monitoring APIs, from integration to performance issues, therefore a general monitoring strategy that only accounts for up-time is not ideal.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...