Ciberseguridad + Inteligencia
16.0K views | +0 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy | Ciberseguridad + Inteligencia | Scoop.it
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
more...
Gust MEES's curator insight, January 30, 2015 3:32 PM
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

'Two million' monitor web in China

'Two million' monitor web in China | Ciberseguridad + Inteligencia | Scoop.it
More than two million people in China are employed by the government to monitor web activity, state media say, providing a rare glimpse into how the state tries to control the internet.

Via Gust MEES
more...
Gust MEES's curator insight, October 5, 2013 6:51 AM

 

They are "strictly to gather and analyse public opinions on microblog sites and compile reports for decision-makers", it said. It also added details about how some of these monitors work.


Rescooped by Elisa Vivancos from Your Privacy & Security Online
Scoop.it!

Are You Safe Online?

Are You Safe Online? | Ciberseguridad + Inteligencia | Scoop.it

As more people engage in various online activities, threats become more prevalent and sophisticated. Protect yourself with Internet Security Software: http://www.trendmicro.com/us/home/products/titanium/internet-security/index.html


Via Trend Micro, Kathy Szczesny
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Use Android? You’re Probably Giving Google All Your Wifi Passwords

Use Android? You’re Probably Giving Google All Your Wifi Passwords | Ciberseguridad + Inteligencia | Scoop.it

And the passwords are in plaintext, too. When you format an Android phone and set it up on first run, after you login to your Google account and restore your backup, it immediately connects to wifi using a saved password. There’s no sort of password hash that your Android phone could send your router to authenticate besides the password itself.

 

 

Oh, and Google is part of NSA’s Prism program. If an NSA analyst, or likely someone from CIA or even FBI (Prism is a “team sport”), asks Google for information about you, your house’s and office’s wifi passwords are likely included in that data. Without a warrant.


Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Oppose PRISM-like programs today or lose you privacy tomorrow

Oppose PRISM-like programs today or lose you privacy tomorrow | Ciberseguridad + Inteligencia | Scoop.it

The revelation by a whistleblower has shocked US citizens and those outside of the US to the core of their privacy beliefs. Many ask: “How can our governments do something like this and intrude into our privacy?”. However, experts have expected this type of activity for years.

There is a saying that the power drives those holding it to want more power. Same is true with the governments and their information hunger, which despite being smoke screened in the name of anti-terrorism activities, presents great danger to unsuspecting citizens. Just because they can, does not mean they should.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

‘Spring Clean’ your Facebook account in 3 steps

‘Spring Clean’ your Facebook account in 3 steps | Ciberseguridad + Inteligencia | Scoop.it

You’ve probably been using for Facebook for years.

Thus your profile has all kinds of likes and apps you probably don’t remember adding.

 

That’s why spring is the perfect time to look at your page and try to make it new again.

 

Here are 3 easy steps that will improve your privacy and your Facebook experience.

 


Via Gust MEES
more...
Gust MEES's curator insight, April 15, 2013 11:50 AM

 

Check it out, a MUST!!!

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Privacy

 

http://www.scoop.it/t/social-media-and-its-influence?tag=Privacy

 

 

Randi Thompson's curator insight, April 15, 2013 6:55 PM

It's time to do some spring cleaning with your Facebook account....

DMT Software's curator insight, April 16, 2013 2:33 PM

Not bad advice for any season.

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | Ciberseguridad + Inteligencia | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.


Via Gust MEES
more...
Gust MEES's curator insight, January 22, 2013 11:52 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:54 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 11:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

Risk Calculator | Facebook

Risk Calculator | Facebook | Ciberseguridad + Inteligencia | Scoop.it

RSA, The Security Division of EMC, Bedford

 

What's YOUR Identity Risk Score? Take the TEST: ONLINE IDENTITY RISK CALCULATOR


Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.

Via Gust MEES
more...
Lynnette Van Dyke's curator insight, April 1, 8:41 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Lynnette Van Dyke's curator insight, April 1, 8:42 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Stewart-Marshall's curator insight, April 2, 1:52 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Rescooped by Elisa Vivancos from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Safe Profile Beta on Facebook

Safe Profile Beta on Facebook | Ciberseguridad + Inteligencia | Scoop.it
Too many settings, pages, and updates in Facebook? Safe Profile informs you about the most important safety and privacy issues, all in one place. Do Facebook’s privacy options change too often to keep up?

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Ciberseguridad + Inteligencia | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | Ciberseguridad + Inteligencia | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 


Via Gust MEES
more...
Gust MEES's curator insight, June 19, 2013 12:03 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 12:06 PM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

How Companies Track You on the Web [Infographic]

How Companies Track You on the Web [Infographic] | Ciberseguridad + Inteligencia | Scoop.it

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

How much data privacy can you expect to have?

How much data privacy can you expect to have? | Ciberseguridad + Inteligencia | Scoop.it
Experts say that the social media technology and the ability for companies to harness our personal information is moving faster than the laws in place to protect our privacy.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Le Parlement européen veut créer une Cnil européenne

Le Parlement européen veut créer une Cnil européenne | Ciberseguridad + Inteligencia | Scoop.it
L'Union Européenne veut créer un cadre juridique supranational pour la protection des données personnelles des européens.

Via Gust MEES
Elisa Vivancos's insight:

Privacy matters!

 

more...
Gust MEES's curator insight, January 8, 2013 6:46 PM

Privacy matters!

 

Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple resumes User Tracking with iOS 6. Here's how to disable it

Apple resumes User Tracking with iOS 6. Here's how to disable it | Ciberseguridad + Inteligencia | Scoop.it
Apple was eager to promote the many new features in iOS6, but avoided mention of one: IFA - or identifier for advertisers - the company's newest device tracking technology.

 

Read more, a MUST:

http://knolinfos.visibli.com/share/DBFsX6

 


Via Gust MEES
more...
No comment yet.