Informática Forense
31.9K views | +0 today
Follow
Informática Forense
Todo sobre las evidencias informáticas, lucha contra la ciberdelincuencia, seguridad informática, etc.
Your new post is loading...
Your new post is loading...
Scooped by Javier Pagès López
Scoop.it!

Adiós al GPS: la nueva tecnología de posicionamiento en la que ya trabaja EEUU

Adiós al GPS: la nueva tecnología de posicionamiento en la que ya trabaja EEUU | Informática Forense | Scoop.it
El problema es que las señales del GPS pueden ser interferidas, haciendo imposible que el receptor las escuche, o bien reemplazadas ('spoofing'), sustituyéndolas por otras falsas. Además los elementos del sistema (satélites, estaciones de control de tierra y receptores) pueden ser sometidos a ataques de tipo cibernético. Y no se trata de problemas imaginarios: potenciales enemigos de EEUU cuentan con equipos diseñados específicamente para evitar el uso del GPS en una zona o para engañar a sus usuarios. Esos equipos (como el ruso  R-330ZH Zhitel) funcionan, y están en el mercado internacional de armas al alcance de muchos países.

Así, por ejemplo, Corea del Norte ha realizado varios intentos desde 2010 de perturbar el sistema GPS en Corea del Sur mediante interferencia, que en alguna ocasión ha obligado a vehículos civiles (barcos, aviones) a regresar a otros sistemas de navegación alternativos de modo puntual. Según algunas alegaciones, Irán empleó la técnica del ‘spoofing’ de señales GPS (demostrada en una prueba de concepto por estudiantes estadounidenses en 2013) para capturar un avión espía sin piloto RQ-170 Sentinel sobre su territorio en 2011, aunque fuentes estadounidenses negaron esta posibilidad aclarando que Sentinel usa un sistema de navegación mixto GPS-Inercial que le permite volar sin las señales de los satélites de geolocalización. Las estaciones de control desde tierra de la flota espacial también han sido sometidas a ciberataques.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Phishers Abuse Hosting Temporary URLs

Phishers Abuse Hosting Temporary URLs | Informática Forense | Scoop.it
Temporary URLs given by hosting companies can come with security issues that can allow phishers to infect websites on shared server space.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Nueva sentencia contra la banca: ellos son los responsables si hackean tu cuenta. Noticias de Tecnología

Nueva sentencia contra la banca: ellos son los responsables si hackean tu cuenta. Noticias de Tecnología | Informática Forense | Scoop.it
El Juzgado de Primera Instancia Número 48 de Madrid ha condenado a uno de los principales bancos españoles a indemnizar a un usuario víctima de un 'malware' que logró sustraer de su cuenta 55.275 euros. Según la sentencia, a la que ha tenido acceso Teknautas, el dinero fue robado gracias a un virus informático conocido como Citadel que estaba instalado en el ordenador del cliente. La responsabilidad, sin embargo, y siempre según el juez, es del banco y no del usuario, ya que este último no cometió ninguna negligencia grave y, en todo caso, le corresponde a la entidad bancaria asegurarse de que el dispositivo desde el que se accede a la cuenta no está infectado.
more...
No comment yet.
Rescooped by Javier Pagès López from Cyber Security & Digital Forensics
Scoop.it!

The current state of #Quantum  #Cryptography, #QKD,  and the future of Information  #Security.

The current state of #Quantum  #Cryptography, #QKD,  and the future of Information  #Security. | Informática Forense | Scoop.it
..

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Apple Patents Technology to remotely disable your iPhone Camera at Concerts

Apple Patents Technology to remotely disable your iPhone Camera at Concerts | Informática Forense | Scoop.it
Apple Patents Technology to remotely disable iPhone Camera at Live Concerts
more...
No comment yet.
Rescooped by Javier Pagès López from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Drones – A hacker’s playground

Drones – A hacker’s playground | Informática Forense | Scoop.it
Unmanned Aerial Vehicles (UAVs) offer new perspectives, both from a civilian and a military standpoint; yet, they present vulnerabilities having the potential to lead to disastrous consequences regarding public safety if exploited successfully, as evidenced by recent hacks. These repercussions can be prevented by implementing best practices, continuously assessing the technologies used and most importantly…

Via Constantin Ionel Milos / Milos Constantin
more...
Ken Feltman's curator insight, June 28, 11:45 AM
Drones and hackers: A deadly combination?
Scooped by Javier Pagès López
Scoop.it!

Ni fuentes desconocidas, ni depuración USB, ni root/jailbreak, por favor

Ni fuentes desconocidas, ni depuración USB, ni root/jailbreak, por favor | Informática Forense | Scoop.it
I➨ ¿De verdad necesitas ser root? Seguramente si lo piensas no sea así, y con ello evitas muchos problemas de seguridad.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Informe AEPD 2015 - Las telecos, las más sancionadas por violación de la protección de datos

Informe AEPD 2015 - Las telecos, las más sancionadas por violación de la protección de datos | Informática Forense | Scoop.it
El sector de las telecomunicaciones, el más castigado, acaparó sanciones por siete millones de euros —equivalentes al 51% del total—, aunque en términos relativos el importe descendió en un 34%. Le siguieron las entidades financieras —el volumen de sanciones fue el que más creció, hasta un 18%y se situó por encima de los tres millones de euros— y las empresas de suministro y comercialización de agua y energía.
more...
No comment yet.
Rescooped by Javier Pagès López from Cyber Defence
Scoop.it!

WW3 Scenario: NATO Vows 'Conventional' Retaliation Against Russia's Cyber Warfare

WW3 Scenario: NATO Vows 'Conventional' Retaliation Against Russia's Cyber Warfare | Informática Forense | Scoop.it
NATO Secretary General Jens Stoltenberg warned that a major cyber attack could prompt the alliance for a more severe response. The warning came following reports that Russia is trying to probe into the online arena, leaving traces here and there while raising suspicions on cyber warfare. Could Russia be testing NATO’s cyber security capacity for …

Via Vicente Pastor
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Prepare a su pyme para responder a los ataques informáticos

Prepare a su pyme para responder a los ataques informáticos | Informática Forense | Scoop.it
Un ciberataque puede presentarse de manera inocente, bajo la forma de un correo del director, los proveedores o el banco.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Hack the Pentagon: Hackers find over 100 Bugs in U.S. Defense Systems

Hack the Pentagon: Hackers find over 100 Bugs in U.S. Defense Systems | Informática Forense | Scoop.it

Hack the Pentagon: Hackers find over 100 Bugs in Defense Systems


The "Hack the Pentagon" bug bounty program by the United States Department of Defense (DoD) has been successful with more than 100 vulnerabilities uncovered by white hat hackers in Pentagon infrastructure. In March, the Defense Department launched what it calls "the first cyber Bug Bounty Program in the history of the federal government," inviting hackers to take up the challenge of finding bugs in its networks and public faced websites that are registered under DoD.


Around 1,400 whitehat (ethical) hackers participated in the Hack the Pentagon program and were awarded up to $15,000 for disclosures of the most destructive vulnerabilities in DoDs networks, Defense Secretary Ashton Carter said at a technology forum on Friday.

more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Advocate General: Dynamic IP address can be personal data - EDRi

Advocate General: Dynamic IP address can be personal data - EDRi | Informática Forense | Scoop.it

On 12 May Manuel Campos Sánchez-Bordona, Advocate General (AG) of the European Court of Justice (CJEU), gave his opinion in the Case Patrick Breyer against the Federal Republic of Germany, C-582/14.

Patrick Breyer sued the German government for violating his right to data protection by storing the data about him visiting websites of the German government longer than necessary. The government’s websites use so-called “logs” that keep record of which particular dynamic IP address was having access to the service. Breyer claims that the storage of this data constitutes a processing of personal data, which is protected under the Data Protection Directive 95/46/EC. According to the Directive, such processing of personal data is generally unlawful, unless it is justified, for example by a previously given consent. The Republic of Germany, however, stated that the logs to its website are essential for its functioning, as they are important for preventing abuse and prosecuting network attacks. In the ongoing procedure, the German Federal Court of Justice (BGH) eventually forwarded two questions to the CJEU, asking for preliminary ruling.


Patrick Breyer stated in reaction to the opinion that nobody has a right to record everything we do and say online. Generation Internet has a right to access information online just as unmonitored and without inhibition as our parents read the paper, listened to the radio or browsed books.


The European Court of Justice did not yet set a date for the final decision.

Javier Pagès López's insight:
El argumento del demandante es muy interesante y lleno de sensatez:

"Nadie tiene el derecho de grabar todo lo que hacemos o vemos online. La generación de Internet tiene el derecho a acceder a la información online de una forma tan descontrolada y desinhibida como sus padres leen los papeles, escuchan la radio o buscan en los libros".
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Apple’s ‘Differential Privacy’ Is About Collecting Your Data—But Not ​Your Data

Apple’s ‘Differential Privacy’ Is About Collecting Your Data—But Not ​Your Data | Informática Forense | Scoop.it
Differential privacy, translated from Apple-speak, is the statistical science of trying to learn as much as possible about a group while learning as little as possible about any individual in it. With differential privacy, Apple can collect and store its users’ data in a format that lets it glean useful notions about what people do, say, like and want. But it can’t extract anything about a single, specific one of those people that might represent a privacy violation. And neither, in theory, could hackers or intelligence agencies.

“With a large dataset that consists of records of individuals, you might like to run a machine learning algorithm to derive statistical insights from the database as a whole, but you want to prevent some outside observer or attacker from learning anything specific about some [individual] in the data set,” says Aaron Roth, a University of Pennsylvania computer science professor whom Apple’s Federighi named in his keynote as having “written the book” on differential privacy. (That book, co-written with Microsoft researcher Cynthia Dwork, is the Algorithmic Foundations of Differential Privacy [PDF].) “Differential privacy lets you gain insights from large datasets, but with a mathematical proof that no one can learn about a single individual.”
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

US bulk electric system vulnerable to cyber-attacks – report

US bulk electric system vulnerable to cyber-attacks – report | Informática Forense | Scoop.it
A new survey on cybersecurity revealed that 50% of utilities in North America are not compliant with NERC standards regarding substation maintenance.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Website Hacked Trend Report 2016 - Q1

Website Hacked Trend Report 2016 - Q1 | Informática Forense | Scoop.it

This report is based on data collected and analyzed by the Sucuri Remediation Group (RG), which includes the Incident Response Team (IRT) and the Malware Research Team (MRT). It analyzes over 11k infected websites and shares statistics associated with: Affected open-source CMS applications Details on the WordPress platform Malware families and their effects.


Download the report:

https://sucuri.net/website-security/Reports/Sucuri-Website-Hacked-Report-2016Q1.pdf

more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Todos somos Anonymous. Blogs de Tribuna

Todos somos Anonymous. Blogs de Tribuna | Informática Forense | Scoop.it
Si algo he aprendido en los años que llevo ejerciendo la defensa en casos de ciberdelitos es que los abogados no somos nada sin un buen perito informático. Los dictámenes periciales elaborados por la policía, pese a su excelente calidad técnica en la mayoría de los casos, no dejan de ser pruebas elaboradas por investigadores que dan soporte a la acusación, y a mi juicio no tienen el carácter de prueba pericial independiente.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

This Android Hacking Group is making $500,000 per day

This Android Hacking Group is making $500,000 per day | Informática Forense | Scoop.it
A Chinese Android Hacking Group is making $500,000 per day using Hummer Android Malware
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

World’s Biggest Data Breaches & Hacks — Information is Beautiful

World’s Biggest Data Breaches & Hacks — Information is Beautiful | Informática Forense | Scoop.it
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.
more...
No comment yet.
Rescooped by Javier Pagès López from Cyber Security & Digital Forensics
Scoop.it!

The Threat is Real: Ransomware goes viral

The Threat is Real: Ransomware goes viral | Informática Forense | Scoop.it
The ransomware epidemic is a very real problem. This threat is one that your users and enterprise need to be aware of in order to combat effectively. Let's prevent your organizatio

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Los 5 puntos de acceso Wi-Fi que debemos evitar este verano

Los 5 puntos de acceso Wi-Fi que debemos evitar este verano | Informática Forense | Scoop.it
Indicamos los 5 puntos de acceso Wi-Fi que más frecuentemente vemos en verano y que debemos evitar para preservar nuestra seguridad y privacidad.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

HPE Cyber Risk Report 2016

HPE Cyber Risk Report 2016 | Informática Forense | Scoop.it

The 96-page Hewlett Packard Enterprise (HPE) Cyber Risk Report 2016 offers a broad view of the current threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal: Provide security information that leads to a better understanding of the threat landscape, and deliver resources you can use to minimize security risk.


Here are three important reasons you should read the 2016 report: 


- The game is changing. Think you’ve heard it all? Well, the cyber-risk landscape is continually changing. For example, in 2015, attacks shifted to the new perimeter – likely in your pocket. Today’s mobile devices and broad interconnectivity are attracting attackers and expanding the threat landscape.


- You are more vulnerable than you think. Applications and platforms that you might use every day are the biggest targets of exploits. In fact, there are now more than 10,000 new Android threats discovered every day – a 153 percent year-over-year increase. Meanwhile, malware attacks on the Apple iOS platform grew 235 percent in 2015.


- There’s more at stake than ever. 2015 was the Year of Collateral Damage. Numerous attacks affected people who never dreamed that they might be involved in a security breach. For example, background investigation records of current, former and prospective Federal employees and contractors were stolen from a database at the U.S. Office of Personnel Management (OPM), including names, addresses and Social Security numbers. Many of those victimized didn’t even know they were in the OPM database.


What can you do? Download the HPE Cyber Risk Report 2016 today, read it and share with peers, friends, customers, partners and others in your sphere of influence. Then, take steps to reduce your cyber risk today.

more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Condenan al 'Rey del Spam' a 30 meses de prisión por enviar 27 millones de correos en Facebook

Condenan al 'Rey del Spam' a 30 meses de prisión por enviar 27 millones de correos en Facebook | Informática Forense | Scoop.it
El autodenominado 'Rey del Spam', Sanford Wallace, ha sido condenado este lunes a dos años y medio de prisión en Estados Unidos.
more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

Un algoritmo para derrotar al Estado Islámico

Un algoritmo para derrotar al Estado Islámico | Informática Forense | Scoop.it

El pormenorizado examen de sus dinámicas, realizado durante los primeros seis meses del año pasado, ha alumbrado una ecuación matemática que explica su frenética actividad. El estudio -liderado por Neil Johnson, profesor de Física de la universidad estadounidense de Miami, y publicado esta semana en la revista Science- asegura haber hallado el algoritmo capaz, a partir de su comunicación virtual, de predecir los ataques de la organización yihadista en el mundo real y mejorar la lucha contra su esquiva telaraña que libran los servicios de inteligencia alrededor del planeta.


En este caso, el estudio sugiere a servicios de inteligencia y empresas informáticas que, en lugar de centrarse únicamente en grandes grupos o cuentas individuales, persigan a grupos pequeños y ágiles de unos 200 miembros que se hallan fuera del radar y eviten así la fusión de comunidades. "Tenemos la impresión de que los gobiernos están más enfocados en identificar acciones individuales y en grupos numerosos. Si queremos saber lo que está compartiendo el IS deberíamos centrarnos en cazar a los grupos más pequeños que tienen el tamaño que les permite sobrevivir", concluye.

more...
No comment yet.
Scooped by Javier Pagès López
Scoop.it!

US charges Chinese ex-IBM employee with Espionage

US charges Chinese ex-IBM employee with Espionage | Informática Forense | Scoop.it

Ex-IBM employee from China charged with Economic Espionage over stealing source code.


The United States federal authorities have boosted charges against a former IBM Corp. software developer in China for allegedly stealing valuable source code from his former employer in the US.


Chinese national Xu Jiaqiang, 30, was arrested by the FBI in December last year, when he was charged with just one count of theft of a trade secret. However, Jiaqiang has been charged with six counts: three counts of economic espionage and three counts of theft of a trade secret, as US prosecutors accused him of selling the stolen information to other companies, according to the Justice Department indictment

more...
No comment yet.
Rescooped by Javier Pagès López from Post-Sapiens, les êtres technologiques
Scoop.it!

DARPA Is Creating a New Internet, Based Around Search

DARPA Is Creating a New Internet, Based Around Search | Informática Forense | Scoop.it
The current Internet sees only 4 percent of the real Internet. The new Internet will see the other 96 percent.

Via Jean-Philippe BOCQUENET
more...
Ken Feltman's curator insight, June 15, 10:44 AM
A huge new world out there...