Ciberseguridad + Inteligencia
16.1K views | +2 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.

Via Gust MEES
more...
Lynnette Van Dyke's curator insight, April 1, 8:41 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Lynnette Van Dyke's curator insight, April 1, 8:42 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Stewart-Marshall's curator insight, April 2, 1:52 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Use Android? You’re Probably Giving Google All Your Wifi Passwords

Use Android? You’re Probably Giving Google All Your Wifi Passwords | Ciberseguridad + Inteligencia | Scoop.it

And the passwords are in plaintext, too. When you format an Android phone and set it up on first run, after you login to your Google account and restore your backup, it immediately connects to wifi using a saved password. There’s no sort of password hash that your Android phone could send your router to authenticate besides the password itself.

 

 

Oh, and Google is part of NSA’s Prism program. If an NSA analyst, or likely someone from CIA or even FBI (Prism is a “team sport”), asks Google for information about you, your house’s and office’s wifi passwords are likely included in that data. Without a warrant.


Via Gust MEES
more...
Rescooped by Elisa Vivancos from Informática Forense
Scoop.it!

La NSA pirateó protocolos de seguridad en la Red para sus labores de espionaje

La NSA pirateó protocolos de seguridad en la Red para sus labores de espionaje | Ciberseguridad + Inteligencia | Scoop.it

Nuevos documentos detallan que la NSA corrompió estándares de seguridad (SSL, VPN...) y robó claves de encriptación.

 

.


Via Javier Pagès López
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist | Ciberseguridad + Inteligencia | Scoop.it
It's the weekend, but I trust you have enough mental clarity to follow something simple: you have no digital privacy, full stop.

Odd that the first functional argument against the ...

Via Gust MEES
more...
Gust MEES's curator insight, June 16, 2013 5:29 PM

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Privacy