Ciberseguridad + Inteligencia
16.7K views | +0 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

IoT attacks: 10 things you need to know | #CyberSecurity #Infographic #InternetOfThings #CyberAttacks #ICT

IoT attacks: 10 things you need to know | #CyberSecurity #Infographic #InternetOfThings #CyberAttacks #ICT | Ciberseguridad + Inteligencia | Scoop.it
IoT attacks are on the rise. As the technology becomes more relevant to our lives, we take a look at what the state of play is.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Cyberattacks

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Amnesia

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Amnesia&tag=BrickerBot

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | Ciberseguridad + Inteligencia | Scoop.it
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet

 


Via Gust MEES
more...
Gust MEES's curator insight, January 1, 2016 5:13 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Umberto Orefice's curator insight, January 2, 2016 11:09 AM

Good to know..

Dennis Swender's curator insight, March 13, 2016 10:07 AM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Simda botnet taken down in global operation

Simda botnet taken down in global operation | Ciberseguridad + Inteligencia | Scoop.it

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.

 

In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.

 

The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.

 

Learn more: 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, April 13, 2015 8:17 AM

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Attackers use reflection techniques for larger DDoS attacks

Attackers use reflection techniques for larger DDoS attacks | Ciberseguridad + Inteligencia | Scoop.it
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in fa...

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

Malware Alert: Please Update Your Expired Dropbox Password

Malware Alert: Please Update Your Expired Dropbox Password | Ciberseguridad + Inteligencia | Scoop.it

Dropbox users are advised to be on the lookout for emails entitled “Please update your Expired Dropbox Password.”

 

Experts warn that cybercriminals are sending out such

 

===> scam notifications in an effort to distribute malware. <===

 


Via Gust MEES
more...
Estelblau's curator insight, October 4, 2013 12:45 PM

Thanks for the advice @knolinfos!

Randi Thompson's curator insight, October 4, 2013 5:47 PM

If you use Dropbox and are getting these notifications, they are hackers!   

Philip Verghese 'Ariel's curator insight, October 6, 2013 8:32 AM

Dropbox users are advised to be on the lookout for emails entitled “Please update your Expired Dropbox Password.”

 

Experts warn that cybercriminals are sending out such

 

===> scam notifications in an effort to distribute malware. <===

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Do these 3 essential security tasks for your family today

Do these 3 essential security tasks for your family today | Ciberseguridad + Inteligencia | Scoop.it
You're probably your family's 24/7 IT support desk, switching the printer off and on again, locating the missing internet...

Make your life easier and your family safer - kick off National Cybe...

Via Gust MEES
more...
Gust MEES's curator insight, October 1, 2013 12:06 PM

 

 

 

BTW: it's ALSO "European Cyber-Security Month".

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

The hashtags for Twitter are:

 

#NCSAM

#ECSM

#CyberSecMonth

 

Gust MEES's curator insight, October 1, 2013 12:11 PM

 

BTW: it's ALSO "European Cyber-Security Month".

 

Learn more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

The hashtags for Twitter are:

 

#NCSAM

#ECSM

#CyberSecMonth

 

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Aged, vulnerable Java, Flash abound, Websense finds

Aged, vulnerable Java, Flash abound, Websense finds | Ciberseguridad + Inteligencia | Scoop.it
Businesses are still ignoring the threat posed by out-of-date versions of Java, with barely one in five running the latest version during August, security firm Websense has reported.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

ISC Diary | Macs need to patch too!

ISC Diary | Macs need to patch too! | Ciberseguridad + Inteligencia | Scoop.it

Macs need to patch too!, Author: Swa Frantzen

 

E.g. a Trojan was recently discoverd that targets Macs with unpatched java flaws. See the Intego writeup.


Not only that.  Microsft Office, Adobe Flash, shockwave, reader or acrobat all need to get update too.


Via Gust MEES
more...
Gust MEES's curator insight, September 10, 2013 6:00 PM

 

E.g. a Trojan was recently discoverd that targets Macs with unpatched java flaws. See the Intego writeup.


Not only that.  Microsft Office, Adobe Flash, shockwave, reader or acrobat all need to get update too.


Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Huge Botnet Found Using Tor Network for Communications

Huge Botnet Found Using Tor Network for Communications | Ciberseguridad + Inteligencia | Scoop.it
In the wake of the revelations surrounding the NSA's domestic surveillance and intelligence-gathering operations, security experts said there would likely be a natural uptick in the usage of privac...

Via Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | Ciberseguridad + Inteligencia | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Ciberseguridad + Inteligencia | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Club Nintendo site hacked, customer data exposed

Club Nintendo site hacked, customer data exposed | Ciberseguridad + Inteligencia | Scoop.it
Game console maker's Web site with 4 million members in Japan was breached and personal data such as e-mail addresses exposed, but the company did not confirm if the information had been misused.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist | Ciberseguridad + Inteligencia | Scoop.it
It's the weekend, but I trust you have enough mental clarity to follow something simple: you have no digital privacy, full stop.

Odd that the first functional argument against the ...

Via Gust MEES
more...
Gust MEES's curator insight, June 16, 2013 5:29 PM

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Privacy

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

QUICK TIP: Make sure your internet connection is clean | #Router #CyberSecurity

QUICK TIP: Make sure your internet connection is clean | #Router #CyberSecurity | Ciberseguridad + Inteligencia | Scoop.it
This has got to be the quickest Quick Tip of all. Literally. With just one click, it’s too easy not to do.

You know your computer can be infected. But did you know your router can, too? And because most people just aren’t aware of it, if your router is compromised, it could stay that way a long time without you ever knowing.

Unless, of course, you use our free Router Checker. No need to download anything. Just visit the page and click to start the check.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 


Via Gust MEES
more...
Gust MEES's curator insight, September 3, 2016 7:05 AM
This has got to be the quickest Quick Tip of all. Literally. With just one click, it’s too easy not to do.

You know your computer can be infected. But did you know your router can, too? And because most people just aren’t aware of it, if your router is compromised, it could stay that way a long time without you ever knowing.

Unless, of course, you use our free Router Checker. No need to download anything. Just visit the page and click to start the check.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | Ciberseguridad + Inteligencia | Scoop.it

Brian KREBS @briankrebs (Twitter)

 

A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.

 

I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.

 

Learn more:

 

https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 


Via Gust MEES
more...
Gust MEES's curator insight, August 16, 2015 12:22 PM

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.

Via Gust MEES
more...
Lynnette Van Dyke's curator insight, April 1, 2016 8:41 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Lynnette Van Dyke's curator insight, April 1, 2016 8:42 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Stewart-Marshall's curator insight, April 2, 2016 1:52 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Belkin WeMo flaws could allow remote control of home electronics | Internet Of Things

Belkin WeMo flaws could allow remote control of home electronics | Internet Of Things | Ciberseguridad + Inteligencia | Scoop.it
Researchers at IOActive discovered the vulnerabilities in Belkins WeMo home automation devices.

 

Belkin's website advertises four WeMo home automation devices, which allow users to manage a number of home electronics, including light switches, heaters, fans, lamps or stereos. After downloading WeMo apps compatible with Android and iPhones, users are able to remotely control or monitor devices while out of the house.

 

The WeMo Insight Switch, for instance, sends information to users about energy usage of home devices, like A/C units, TVs and washing machines.

 

“The vulnerabilities found within the Belkin WeMo devices expose users to several potentially costly threats, from home fires with possible tragic consequences to the simple waste of electricity,” the Tuesday release from IOActive said.

 

The firm also added that other attacks, impacting users' computers and mobile devices, could be scaled via the WeMo flaws.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Researchers sinkhole half a million ZeroAccess bots

Researchers sinkhole half a million ZeroAccess bots | Ciberseguridad + Inteligencia | Scoop.it
In a race against time and ZeroAccess developers and botmasters, Symantec researchers managed to sinkhole a large chunk of the infamous P2P-...

Via Gust MEES
more...
Gust MEES's curator insight, October 1, 2013 12:51 PM

 

"A key feature of the ZeroAccess botnet is its use of a peer-to-peer C&C communications architecture, which gives the botnet a high degree of availability and redundancy," the researchers explained in a blog post. 


Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Infosecurity - Apple iOS 7: A Security Overview

Infosecurity - Apple iOS 7: A Security Overview | Ciberseguridad + Inteligencia | Scoop.it
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

How to beat fingerprint scanners [VIDEO]

How to beat fingerprint scanners [VIDEO] | Ciberseguridad + Inteligencia | Scoop.it
With the launch of the iPhone 5S, more people will be using fingerprint sensors as part of their daily security than ever before.

But just how can fingerprint locks be defeated, and how easy is it? The guys at MythBusters have found out.

Via Gust MEES
more...
Gust MEES's curator insight, September 12, 2013 12:24 AM

 

So easy...

 

John Lasschuit ®™'s curator insight, September 18, 2013 7:53 AM

So fingerprints offer even worse protection then the good old pincode. But yes, it's easier....

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

The ugly state of password security in the cloud

The ugly state of password security in the cloud | Ciberseguridad + Inteligencia | Scoop.it
I reviewed more than 130 cloud and SaaS services and the results were a bit unexpected.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: Q&A on Information Security Workforce

Infographic: Q&A on Information Security Workforce | Ciberseguridad + Inteligencia | Scoop.it
(ISC)2 conducted a worldwide survey in the last quarter of 2012 called 2013 Global Information Security Workforce Study. Our newest infographic presents some of the study’s highlights in an easy-to-read question & answer format.

Via Praetorian Guard, Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | Ciberseguridad + Inteligencia | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

New Report Suggests the Cost of Cybercrime is Nearly Unknowable | MIT Technology Review

New Report Suggests the Cost of Cybercrime is Nearly Unknowable | MIT Technology Review | Ciberseguridad + Inteligencia | Scoop.it
A new report gives a wide range for what cybercrime and espionage actually cost the United States and the world.

 

A new report basically says figuring out the cost of cybercrime and espionage is nearly impossible. It says U.S. losses might be as low as $20 billion or as high as $140 billion.

 

“A very crude extrapolation would be to take this ($20 billion to $140 billion) range for the U.S., which accounts for a little more than a fifth of global economic activity, and come up with a range of $100 billion to $500 billion for global losses,” says the report, by the security company McAfee and a Washington think-tank, the Center for Strategic and International Studies.

 

But that range is essentially a wild guess.


Via Gust MEES
more...
Gust MEES's curator insight, July 23, 2013 4:08 PM

 

A new report basically says figuring out the cost of cybercrime and espionage is nearly impossible. It says U.S. losses might be as low as $20 billion or as high as $140 billion.

 

“A very crude extrapolation would be to take this ($20 billion to $140 billion) range for the U.S., which accounts for a little more than a fifth of global economic activity, and come up with a range of $100 billion to $500 billion for global losses,” says the report, by the security company McAfee and a Washington think-tank, the Center for Strategic and International Studies.

 

But that range is essentially a wild guess.

 

Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Ciberseguridad + Inteligencia | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.

Via Gust MEES
more...
Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security