Ciberseguridad + Inteligencia
16.8K views | +0 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | Ciberseguridad + Inteligencia | Scoop.it

Brian KREBS @briankrebs (Twitter)

 

A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.

 

I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.

 

Learn more:

 

https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 


Via Gust MEES
more...
Gust MEES's curator insight, August 16, 2015 12:22 PM

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy | Ciberseguridad + Inteligencia | Scoop.it
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
more...
Gust MEES's curator insight, January 30, 2015 3:32 PM
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches

Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches | Ciberseguridad + Inteligencia | Scoop.it
In this lesson, students will learn about the extent of cyberattacks just in the past year and the risks they pose for companies, governments and individuals.

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Video

 

 

https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

https://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from Cyberbullying, it's not a game! It's your Life!!!
Scoop.it!

European Conference about CyberBullying

European Conference about CyberBullying | Ciberseguridad + Inteligencia | Scoop.it
28 May 2013, Madrid European Conference on Cyberbullying Register here Cyberbullying has become a growing concern across the EU. Although there is no consensus on the extent of the phenomenon, the ...

Via Gust MEES
more...
Gust MEES's curator insight, April 13, 2013 10:46 AM

 

Check it out!!!

 

Rescooped by Elisa Vivancos from Cyberbullying, it's not a game! It's your Life!!!
Scoop.it!

Teen Anti Cyber Bully Campaign Goes Viral

Teen Anti Cyber Bully Campaign Goes Viral | Ciberseguridad + Inteligencia | Scoop.it

OSSEO, MN-- Seventeen-year-old Kevin Curwick, an Osseo High School football team captain, is using Twitter to fight cyber bullies and compliment his classmates, but much to his surprise, now people across the world are returning the favor.

 

"A nice word can go a long ways," he said. "We are a society looking for the positive."

 

Curwick has heard from people from Iowa to Connecticut, and from Australia to England ever since he came forward behind the anonymous Twitter account, @OsseoNiceThings.

 

He created the "nice" Twitter account to lift spirits of classmates that had been bullied on another Twitter page, but remained anonymous when tweeting things like "great artist but even better friend", "Osseo's rawest rapper", and "puts others before herself."

 

Read more:

http://www.digtriad.com/news/local/story.aspx?storyid=241026

 


Via Gust MEES
more...
Stephanie Nicole's curator insight, November 23, 2014 7:48 PM

"A nice word can go a long way," 17-year old Kevin Curwick says after he creates am annonymous Twitter account that contains compliments to all the other kids in his high school.

 

It is encouraging to see that a student is the one stepping up to prevent bullying from happening at his school. It only takes one person to initiate something for everyone to join in on. It is more beneficial coming from a classmate because others can relate to him more. The Twitter is easy for the Osseo High School students to access because the account targets them directly. 

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Simda botnet taken down in global operation

Simda botnet taken down in global operation | Ciberseguridad + Inteligencia | Scoop.it

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.

 

In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.

 

The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.

 

Learn more: 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, April 13, 2015 8:17 AM

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.

Via Gust MEES
more...
Lynnette Van Dyke's curator insight, April 1, 2016 8:41 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Lynnette Van Dyke's curator insight, April 1, 2016 8:42 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Stewart-Marshall's curator insight, April 2, 2016 1:52 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Rescooped by Elisa Vivancos from Cyberbullying, it's not a game! It's your Life!!!
Scoop.it!

Proposed Law Takes Aim At Cyberbullying

Proposed Law Takes Aim At Cyberbullying | Ciberseguridad + Inteligencia | Scoop.it
A proposed federal law in Canada could make certain types of cyberbullying as illegal as distributing child pornography.

Via Gust MEES
more...
Gust MEES's curator insight, April 23, 2013 3:08 PM

 

Check also:

 

http://www.scoop.it/t/cyberbullying-it-s-not-a-game-it-s-your-life

 

Nadine Zebib's curator insight, May 31, 2013 10:51 PM

Rehtaeh Parson's story is tragic, but hopefully her story has helped take one small step towards ending cyber bullying. An image of her was passed around after she was raped by four men, and she was bullied so much that she felt the need to end her own life. It is stories like Rehteah's that get attention, although the attention came too late for her. Hopefully now, a life can be saved, justice can be found for some, and cyber bullying and trolling can be put to a stop.

thando mhlongo's curator insight, May 29, 2015 10:05 AM

finally!!! laws that prevents cyber bullying

Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

Generation Tech: The Good, Bad, and Scary

Generation Tech: The Good, Bad, and Scary | Ciberseguridad + Inteligencia | Scoop.it
What parents should understand about technology...

 

Raising children in a technology-infused world is more than understanding the ins and outs of Facebook, Twitter, and computer games – or about the digital habits of teens. It’s about understanding the relationship of technology, popular culture, and child development. Taylor brings these deeper insights to readers in an easy-to-read, well-written format that is sure to benefit children.

 

The key for every parent is to facilitate a healthy, balanced relationship with technology – being aware of its pitfalls and helping children integrate media into their lives in positive ways. This is the message of Taylor’s book – and is well worth the read!

 

Read more, a MUST:

http://www.psychologytoday.com/blog/the-moment-youth/201211/generation-tech-the-good-bad-and-scary

 


Via Gust MEES
more...
No comment yet.