Ciberseguridad + ...
Follow
Find
14.8K views | +2 today
 
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
onto Ciberseguridad + Inteligencia
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Ciberseguridad + Inteligencia | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.

Via Gust MEES
more...
Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

Authentication Trends: The promise of of cognitive fingerprinting

Authentication Trends: The promise of of cognitive fingerprinting | Ciberseguridad + Inteligencia | Scoop.it
Cognitive fingerprinting, the measure of how users behave when interacting with a device and their writing styles, is emerging as a possible new ...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Somos datos: privacidad y límites del big data | Ignasi Alcalde

Somos datos: privacidad y límites del big data | Ignasi Alcalde | Ciberseguridad + Inteligencia | Scoop.it
Hoy en día no somos sólo consumidores de datos, somos productores de grandes cantidades de datos de nuestra vida
more...
No comment yet.
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Disaster Recovery and the Big Data Application -- Recovery Options

Big data implementations that produce value drive lower costs and higher profits. Hence, at some point you must implement a disaster recovery plan.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Llega Windows 10. Analizamos sus medidas de seguridad | Blog del laboratorio - Ontinet.com

Llega Windows 10. Analizamos sus medidas de seguridad | Blog del laboratorio - Ontinet.com | Ciberseguridad + Inteligencia | Scoop.it
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Applying threat intelligence and what is the Dark Web?

Applying threat intelligence and what is the Dark Web? | Ciberseguridad + Inteligencia | Scoop.it
In this edition of The Irari Report, Ira Winkler and Araceli Treu Gomes interview Kurt Stammberger of Norse Corporation about both what has come to be know as the Dark Web and Threat Intelligence. This is among the most comprehensive discussions of threat intelligence available to practitioners.
Elisa Vivancos's insight:

video

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

New Research Finds Cyber Exploits Can Be Anticipated With an Accuracy of 83%

New Research Finds Cyber Exploits Can Be Anticipated With an Accuracy of 83% | Ciberseguridad + Inteligencia | Scoop.it
In a new research study, Recorded Future found that cyber exploits can be anticipated with an accuracy of 83% using open vulnerability data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

No building access card? No problem if you have new Def Con tools

No building access card? No problem if you have new Def Con tools | Ciberseguridad + Inteligencia | Scoop.it
RFID card access systems are used by most companies to let people into their buildings. But over the last few years, researchers have shown how these systems can be easily bypassed.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog | Ciberseguridad + Inteligencia | Scoop.it
La CNMC (Comisión Nacional de Mercados y Competencia) ha aprobado unos nuevos criterios de calificación de contenidos audiovisuales. Se han identificado si
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Finding The ROI Of Threat Intelligence: 5 Steps

Finding The ROI Of Threat Intelligence: 5 Steps | Ciberseguridad + Inteligencia | Scoop.it
Advice from a former SOC manager on how to leverage threat intel without increasing the bottom line.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Diferencias del EJIS respecto al ENI y al ENS

Diferencias del EJIS respecto al ENI y al ENS | Ciberseguridad + Inteligencia | Scoop.it

Recientemente el CTEAJE (Comité Técnico Estatal de la Administración Judicial Electrónica) ha publicado las bases del Esquema Judicial de Interoperabilidad y Seguridad de 6 de julio de 2015. El EJI...

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Microsoft to make enterprise security tools available

Microsoft to make enterprise security tools available | Ciberseguridad + Inteligencia | Scoop.it
Microsoft will be making two services generally available as part of the company's push to improve the security of businesses' data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tech giants take action on ad click fraud

Tech giants take action on ad click fraud | Ciberseguridad + Inteligencia | Scoop.it
Some of the biggest digital companies have banded together to take action on the rising tide of ad click fraud.
more...
No comment yet.
Rescooped by Elisa Vivancos from Informática Forense
Scoop.it!

Arqueólogos que excavan en la red

Arqueólogos que excavan en la red | Ciberseguridad + Inteligencia | Scoop.it

Si en un futuro muy cercano decides hacerte arqueólogo tendrás que tener muy claro si lo tuyo son las excavaciones milenarias o si tu vocación se orienta más a un concepto de esta labor relativo a las nuevas tecnologías: la arqueología digital.

Con una nomenclatura que evoca tiempos remotos, esta nueva profesión parece abocada al éxito si atendemos al hecho de que hasta al ciudadano de a pie le preocupa cada vez más la imagen que proyecta en internet. Y es que si se es en la medida en que se está en las redes sociales, la labor del arqueólogo digital se convertirá cada vez más en esencial en nuestra nueva sociedad.

"Cada vez más la vida pública ligada al trabajo se desarrolla 'on line'; ylo que haces hoy te puede hipotecar algo que puedes tener dentro de 10 años", afirma Javier Leiva, consultor experto en reputación digital.


Via Javier Pagès López
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Rackspace to host cloud security sharing centre | ZDNet

Rackspace to host cloud security sharing centre | ZDNet | Ciberseguridad + Inteligencia | Scoop.it
The Cloud Security Alliance wants the big names in the cloud industry to join forces to tackle security threats in the cloud space that would see providers sharing information before an attack hits another firm.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

World's Biggest Data Breaches & Hacks - Information Is Beautiful

World's Biggest Data Breaches & Hacks - Information Is Beautiful | Ciberseguridad + Inteligencia | Scoop.it
Data visualization of the world biggest data breaches, leaks and hacks. Constantly updated. Powered by VizSweet.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

How the way you type can shatter anonymity—even on Tor

How the way you type can shatter anonymity—even on Tor | Ciberseguridad + Inteligencia | Scoop.it
Researchers perfect technique that profiles people based on unique keystroke traits.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Accuvant researchers to release open source RFID access tool

Accuvant researchers to release open source RFID access tool | Ciberseguridad + Inteligencia | Scoop.it
Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Mind Over Matter: The Importance of Intelligence in Your Threat Program

Mind Over Matter: The Importance of Intelligence in Your Threat Program | Ciberseguridad + Inteligencia | Scoop.it
An effective threat intelligence program is a fusion of data and human analysis and interpretation.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Australian Cyber Security Centre uses discredited data to quantify infosec threats

Australian Cyber Security Centre uses discredited data to quantify infosec threats | Ciberseguridad + Inteligencia | Scoop.it
The numbers are down, but Australia's Oz Cyber ForceTM says things are getting worse
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet | Ciberseguridad + Inteligencia | Scoop.it
Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Managing third parties with enterprise IAM

Managing third parties with enterprise IAM | Ciberseguridad + Inteligencia | Scoop.it
In this enterprise IAM video, Michael Cobb discusses identity and access management of non-employees and how to control third parties that are less security-minded.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Securosis Blog | Building a Threat Intelligence Program [New Series]

Security practitioners have been falling behind their adversaries, who launch new attacks using new techniques daily. Furthermore, defenders remain hindered by the broken negative security model of looking for attacks they have never seen before (well done, compliance mandates), and so consistently missing these attacks. If your organization hasn’t seen the attack or updated your controls and monitors to look for these new patterns… oh, well.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

'Zero Days', el documental : hackplayers

'Zero Days', el documental : hackplayers | Ciberseguridad + Inteligencia | Scoop.it
Computer security, ethical hacking and more
Elisa Vivancos's insight:

video en youtube

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Free tools to find out if your computer is infected with Hacking Team malware

Free tools to find out if your computer is infected with Hacking Team malware | Ciberseguridad + Inteligencia | Scoop.it
Rook Security offers Milano, a free tool to scan your PC for any possible Hacking Team malware infection. Facebook offers osquery to detect Hacking Team’s Remote Control System on OS X. Lookout has mobile covered and can detect surveillance malware on Android and iOS platforms.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Hackers demo Jeep security hack

Hackers demo Jeep security hack | Ciberseguridad + Inteligencia | Scoop.it
Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle.
more...
No comment yet.