Numérique Responsable

3709 bookmarks
Newest
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
·ted.com·
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
minimaxir/big-list-of-naughty-strings
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
·smashingmagazine.us1.list-manage.com·
minimaxir/big-list-of-naughty-strings
Standblog
Standblog
Tristan Nitot sur la technologie, l'Internet et les libertés numériques
·standblog.org·
Standblog
article-mobile.html
article-mobile.html
Conception numérique responsable. Il est temps de prendre en compte les dimensions sociale et environnementale dès la conception des services numériques.
·greenit.fr·
article-mobile.html
CSO Online | Salted Hash
CSO Online | Salted Hash
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and advice abut security careers and leadership.
·csoonline.com·
CSO Online | Salted Hash