Aspectos Legales ...
Follow
Find tag "seguridad informática"
4.3K views | +0 today
Aspectos Legales de las Tecnologías de Información
Noticias y artículos sobre derecho y tecnologías de información. Puedes llegar rápidamente mediante el link: http://noticias.alti.mx
Your new post is loading...
Your new post is loading...
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies

Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry. Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.

Joel Gómez Treviño (@JoelGomezMX)'s insight:

Gravísima esta intrusión cibernética perpetrada por hackers Chinos en contra de computadoras estadounidenses. No es la primera vez que sucede y es claro que este fenómeno motiva el mejoramiento de la ciberseguridad no solo de Estados Unidos, sino de todos los países.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Securing electronic data within physical spaces #AndroidVault

Securing electronic data within physical spaces #AndroidVault | Aspectos Legales de las Tecnologías de Información | Scoop.it

A group of researchers at Virginia Tech have developed software for the Android OS that can enforce policies on mobile devices based on what room they're in. It can even make sure that sensitive data doesn't walk out the door with them by wiping it from a phone's memory. The technology, which has gotten the attention of Google's federal government group and several defense systems integrators, could eventually be used to protect patient data on doctors' tablets and sensitive military and intelligence information.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

Cinco consejos de un exhacker para aumentar la seguridad informática

Cinco consejos de un exhacker para aumentar la seguridad informática | Aspectos Legales de las Tecnologías de Información | Scoop.it

Kevin Mitnick, un hacker convicto y reformado, ofreció hoy en el certamen tecnológico Campus Party Ecuador cinco consejos al usuario común para elevar su seguridad informática, aunque alertó de que sus excolegas no cejan en buscar el punto débil de cualquier sistema. En una rueda de prensa, Mitnick apuntó primero a las aplicaciones ordinarias como un elemento vulnerable, porque la mayoría de los usuarios no las actualizan, o son sacadas al mercado con demasiada velocidad y sin probarlas suficientemente.

more...
No comment yet.
Scooped by Joel Gómez Treviño (@JoelGomezMX)
Scoop.it!

SANS: 20 Critical Security Controls

SANS: 20 Critical Security Controls | Aspectos Legales de las Tecnologías de Información | Scoop.it

Twenty critical security controls for effective cyber defense and audit guidelines courtesy of the SANS Institute. The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through.

more...
No comment yet.