Ciberseguridad + ...
Follow
Find
14.8K views | +2 today
 
Scooped by Elisa Vivancos
onto Ciberseguridad + Inteligencia
Scoop.it!

Talibanes se equivocan al enviar un correo electrónico y revelan su lista de 400 contactos

Qari Yousuf Ahmedi, un vocero del movimiento talibán, cometió uno de los típicos errores a la hora de redactar un correo electrónico: Poner el listado de los destinatarios del mensaje en el campo de ‘Con Copia’ (CC) en vez de ‘Con Copia Oculta’...
more...
No comment yet.
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

Authentication Trends: The promise of of cognitive fingerprinting

Authentication Trends: The promise of of cognitive fingerprinting | Ciberseguridad + Inteligencia | Scoop.it
Cognitive fingerprinting, the measure of how users behave when interacting with a device and their writing styles, is emerging as a possible new ...
more...
No comment yet.
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Disaster Recovery and the Big Data Application -- Recovery Options

Big data implementations that produce value drive lower costs and higher profits. Hence, at some point you must implement a disaster recovery plan.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Llega Windows 10. Analizamos sus medidas de seguridad | Blog del laboratorio - Ontinet.com

Llega Windows 10. Analizamos sus medidas de seguridad | Blog del laboratorio - Ontinet.com | Ciberseguridad + Inteligencia | Scoop.it
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Applying threat intelligence and what is the Dark Web?

Applying threat intelligence and what is the Dark Web? | Ciberseguridad + Inteligencia | Scoop.it
In this edition of The Irari Report, Ira Winkler and Araceli Treu Gomes interview Kurt Stammberger of Norse Corporation about both what has come to be know as the Dark Web and Threat Intelligence. This is among the most comprehensive discussions of threat intelligence available to practitioners.
Elisa Vivancos's insight:

video

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

New Research Finds Cyber Exploits Can Be Anticipated With an Accuracy of 83%

New Research Finds Cyber Exploits Can Be Anticipated With an Accuracy of 83% | Ciberseguridad + Inteligencia | Scoop.it
In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

No building access card? No problem if you have new Def Con tools

No building access card? No problem if you have new Def Con tools | Ciberseguridad + Inteligencia | Scoop.it
RFID card access systems are used by most companies to let people into their buildings. But over the last few years, researchers have shown how these systems can be easily bypassed.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog | Ciberseguridad + Inteligencia | Scoop.it
La CNMC (Comisión Nacional de Mercados y Competencia) ha aprobado unos nuevos criterios de calificación de contenidos audiovisuales. Se han identificado si
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Finding The ROI Of Threat Intelligence: 5 Steps

Finding The ROI Of Threat Intelligence: 5 Steps | Ciberseguridad + Inteligencia | Scoop.it
Advice from a former SOC manager on how to leverage threat intel without increasing the bottom line.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Diferencias del EJIS respecto al ENI y al ENS

Diferencias del EJIS respecto al ENI y al ENS | Ciberseguridad + Inteligencia | Scoop.it

Recientemente el CTEAJE (Comité Técnico Estatal de la Administración Judicial Electrónica) ha publicado las bases del Esquema Judicial de Interoperabilidad y Seguridad de 6 de julio de 2015. El EJI...

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Microsoft to make enterprise security tools available

Microsoft to make enterprise security tools available | Ciberseguridad + Inteligencia | Scoop.it
Microsoft will be making two services generally available as part of the company's push to improve the security of businesses' data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tech giants take action on ad click fraud

Tech giants take action on ad click fraud | Ciberseguridad + Inteligencia | Scoop.it
Some of the biggest digital companies have banded together to take action on the rising tide of ad click fraud.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Milano: Hacking Team Malware Detection Utility - Rook Security

Milano: Hacking Team Malware Detection Utility - Rook Security | Ciberseguridad + Inteligencia | Scoop.it
When news broke last week of the high profile Hacking Team Breach, Rook Security mobilized its Rapid Response Team to develop new technology to quickly conduct analysis of the exceptionally large, 400 GB, data sets.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Rackspace to host cloud security sharing centre | ZDNet

Rackspace to host cloud security sharing centre | ZDNet | Ciberseguridad + Inteligencia | Scoop.it
The Cloud Security Alliance wants the big names in the cloud industry to join forces to tackle security threats in the cloud space that would see providers sharing information before an attack hits another firm.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

World's Biggest Data Breaches & Hacks - Information Is Beautiful

World's Biggest Data Breaches & Hacks - Information Is Beautiful | Ciberseguridad + Inteligencia | Scoop.it
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

How the way you type can shatter anonymity—even on Tor

How the way you type can shatter anonymity—even on Tor | Ciberseguridad + Inteligencia | Scoop.it
Researchers perfect technique that profiles people based on unique keystroke traits.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Accuvant researchers to release open source RFID access tool

Accuvant researchers to release open source RFID access tool | Ciberseguridad + Inteligencia | Scoop.it
Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Mind Over Matter: The Importance of Intelligence in Your Threat Program

Mind Over Matter: The Importance of Intelligence in Your Threat Program | Ciberseguridad + Inteligencia | Scoop.it
An effective threat intelligence program is a fusion of data and human analysis and interpretation.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Australian Cyber Security Centre uses discredited data to quantify infosec threats

Australian Cyber Security Centre uses discredited data to quantify infosec threats | Ciberseguridad + Inteligencia | Scoop.it
The numbers are down, but Australia's Oz Cyber ForceTM says things are getting worse
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet | Ciberseguridad + Inteligencia | Scoop.it
Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Managing third parties with enterprise IAM

Managing third parties with enterprise IAM | Ciberseguridad + Inteligencia | Scoop.it
In this enterprise IAM video, Michael Cobb discusses identity and access management of non-employees and how to control third parties that are less security-minded.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Securosis Blog | Building a Threat Intelligence Program [New Series]

Security practitioners have been falling behind their adversaries, who launch new attacks using new techniques daily. Furthermore, defenders remain hindered by the broken negative security model of looking for attacks they have never seen before (well done, compliance mandates), and so consistently missing these attacks. If your organization hasn’t seen the attack or updated your controls and monitors to look for these new patterns… oh, well.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

'Zero Days', el documental : hackplayers

'Zero Days', el documental : hackplayers | Ciberseguridad + Inteligencia | Scoop.it
Computer security, ethical hacking and more
Elisa Vivancos's insight:

video en youtube

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Free tools to find out if your computer is infected with Hacking Team malware

Free tools to find out if your computer is infected with Hacking Team malware | Ciberseguridad + Inteligencia | Scoop.it
Rook Security offers Milano, a free tool to scan your PC for any possible Hacking Team malware infection. Facebook offers osquery to detect Hacking Team’s Remote Control System on OS X. Lookout has mobile covered and can detect surveillance malware on Android and iOS platforms.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Hackers demo Jeep security hack

Hackers demo Jeep security hack | Ciberseguridad + Inteligencia | Scoop.it
Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Researchers Enlist Machine Learning In Malware Detection

Researchers Enlist Machine Learning In Malware Detection | Ciberseguridad + Inteligencia | Scoop.it
No sandbox required for schooling software to speedily spot malware, researchers will demonstrate at Black Hat USA.
more...
No comment yet.