Ciberseguridad + ...
Follow
Find
14.8K views | +0 today
 
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
onto Ciberseguridad + Inteligencia
Scoop.it!

Use Android? You’re Probably Giving Google All Your Wifi Passwords

Use Android? You’re Probably Giving Google All Your Wifi Passwords | Ciberseguridad + Inteligencia | Scoop.it

And the passwords are in plaintext, too. When you format an Android phone and set it up on first run, after you login to your Google account and restore your backup, it immediately connects to wifi using a saved password. There’s no sort of password hash that your Android phone could send your router to authenticate besides the password itself.

 

 

Oh, and Google is part of NSA’s Prism program. If an NSA analyst, or likely someone from CIA or even FBI (Prism is a “team sport”), asks Google for information about you, your house’s and office’s wifi passwords are likely included in that data. Without a warrant.


Via Gust MEES
more...
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

Authentication Trends: The promise of of cognitive fingerprinting

Authentication Trends: The promise of of cognitive fingerprinting | Ciberseguridad + Inteligencia | Scoop.it
Cognitive fingerprinting, the measure of how users behave when interacting with a device and their writing styles, is emerging as a possible new ...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog

Nuevos criterios de calificación de contenidos audiovisuales | CNMC blog | Ciberseguridad + Inteligencia | Scoop.it
La CNMC (Comisión Nacional de Mercados y Competencia) ha aprobado unos nuevos criterios de calificación de contenidos audiovisuales. Se han identificado si
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Finding The ROI Of Threat Intelligence: 5 Steps

Finding The ROI Of Threat Intelligence: 5 Steps | Ciberseguridad + Inteligencia | Scoop.it
Advice from a former SOC manager on how to leverage threat intel without increasing the bottom line.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Diferencias del EJIS respecto al ENI y al ENS

Diferencias del EJIS respecto al ENI y al ENS | Ciberseguridad + Inteligencia | Scoop.it

Recientemente el CTEAJE (Comité Técnico Estatal de la Administración Judicial Electrónica) ha publicado las bases del Esquema Judicial de Interoperabilidad y Seguridad de 6 de julio de 2015. El EJI...

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Microsoft to make enterprise security tools available

Microsoft to make enterprise security tools available | Ciberseguridad + Inteligencia | Scoop.it
Microsoft will be making two services generally available as part of the company's push to improve the security of businesses' data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tech giants take action on ad click fraud

Tech giants take action on ad click fraud | Ciberseguridad + Inteligencia | Scoop.it
Some of the biggest digital companies have banded together to take action on the rising tide of ad click fraud.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Milano: Hacking Team Malware Detection Utility - Rook Security

Milano: Hacking Team Malware Detection Utility - Rook Security | Ciberseguridad + Inteligencia | Scoop.it
When news broke last week of the high profile Hacking Team Breach, Rook Security mobilized its Rapid Response Team to develop new technology to quickly conduct analysis of the exceptionally large, 400 GB, data sets.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

​Google, Yahoo, Facebook Collaborate to Blacklist Bad Bots

​Google, Yahoo, Facebook Collaborate to Blacklist Bad Bots | Ciberseguridad + Inteligencia | Scoop.it
Google, Yahoo, Facebook and Trustworthy Accountability Group Collaborate to Blacklist Bad Bots and Click Fraud.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

News - Hey Industries, do not be afraid of collaborate in IIoT - News | IOT Solutions World Congress Barcelona 2015

News - Hey Industries, do not be afraid of collaborate in IIoT - News | IOT Solutions World Congress Barcelona 2015 | Ciberseguridad + Inteligencia | Scoop.it
News about Barcelona IOT Solutions World Congress 2015 related to congress and the sector.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Security Firms See Dollars In Taming IoT Insecurity

Security Firms See Dollars In Taming IoT Insecurity | Ciberseguridad + Inteligencia | Scoop.it
In-brief: Security firms Trustwave and IOActive both announced services promising to help aspiring IoT product firms secure their products, more evidence that the Internet of Things is producing se...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Las startups de ciberseguridad, respaldadas por Symantec y Frost Data Capital

Las startups de ciberseguridad, respaldadas por Symantec y Frost Data Capital | Ciberseguridad + Inteligencia | Scoop.it
Las compañías apoyarán cada año el lanzamiento y crecimiento de hasta 10 startups de seguridad y análisis sobre el Internet de las Cosas.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

A HIP way of securing a wide range of endpoints

A HIP way of securing a wide range of endpoints | Ciberseguridad + Inteligencia | Scoop.it
The host identity protocol is emerging as an alternative way to secure a range of physical endpoints beyond laptops and smartphones.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Desconectarte de la red no sirve para nada: 5 ataques de ciberespionaje que no necesitan conexión a Internet

Desconectarte de la red no sirve para nada: 5 ataques de ciberespionaje que no necesitan conexión a Internet | Ciberseguridad + Inteligencia | Scoop.it
El gesto de desconectar el cable de red del ordenador o deshabilitar la Wi-Fi se asocia a una seguridad absoluta. Si no hay internet, no hay peligro, ¿no? Pues ya podemos empezar a disociar estos c...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet

Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet | Ciberseguridad + Inteligencia | Scoop.it
Tu privacidad en jaque:sensores, datos 'inteligentes' y 'la nube' en internet
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Managing third parties with enterprise IAM

Managing third parties with enterprise IAM | Ciberseguridad + Inteligencia | Scoop.it
In this enterprise IAM video, Michael Cobb discusses identity and access management of non-employees and how to control third parties that are less security-minded.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Securosis Blog | Building a Threat Intelligence Program [New Series]

Security practitioners have been falling behind their adversaries, who launch new attacks using new techniques daily. Furthermore, defenders remain hindered by the broken negative security model of looking for attacks they have never seen before (well done, compliance mandates), and so consistently missing these attacks. If your organization hasn’t seen the attack or updated your controls and monitors to look for these new patterns… oh, well.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

'Zero Days', el documental : hackplayers

'Zero Days', el documental : hackplayers | Ciberseguridad + Inteligencia | Scoop.it
Computer security, ethical hacking and more
Elisa Vivancos's insight:

video en youtube

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Free tools to find out if your computer is infected with Hacking Team malware

Free tools to find out if your computer is infected with Hacking Team malware | Ciberseguridad + Inteligencia | Scoop.it
Rook Security offers Milano, a free tool to scan your PC for any possible Hacking Team malware infection. Facebook offers osquery to detect Hacking Team’s Remote Control System on OS X. Lookout has mobile covered and can detect surveillance malware on Android and iOS platforms.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Hackers demo Jeep security hack

Hackers demo Jeep security hack | Ciberseguridad + Inteligencia | Scoop.it
Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Researchers Enlist Machine Learning In Malware Detection

Researchers Enlist Machine Learning In Malware Detection | Ciberseguridad + Inteligencia | Scoop.it
No sandbox required for schooling software to speedily spot malware, researchers will demonstrate at Black Hat USA.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

"Hackers" demuestran que pueden tomar el control de vehículos "inteligentes". Noticias de agencia, eldia.es

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

CrowdStrike | Next-Generation Endpoint Protection

CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, & services focused on preventing damage from targeted attacks.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Microsoft abrirá en León la primera aceleradora de empresas de ciberseguridad

León, 17 jul (EFE).- Microsoft ubicará en el parque tecnológico de León su octava aceleradora de empresas del mundo y la primera a nivel internacional dedicada
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Move to workforce mobility demands vigilance

Move to workforce mobility demands vigilance | Ciberseguridad + Inteligencia | Scoop.it
Once you’ve made the decision to go mobile, the next step is to approach workforce mobility in a way that meets employee access needs while securing corporate data.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

How IoT devices will change mobility management

How IoT devices will change mobility management | Ciberseguridad + Inteligencia | Scoop.it
In this podcast, we talk to Good Technology CTO Nicko van Someren about how new mobile technology such as IoT devices will change the dynamics of mobility in enterprises.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

¿Qué tan seguro se puede estar en la nube?

¿Qué tan seguro se puede estar en la nube? | Ciberseguridad + Inteligencia | Scoop.it
La seguridad en temas de cloud computing sigue generando debates en las mesas de TI y el acceso de los usuarios a la información que se deposita en estos nuevos sistemas de almacenaje parece ser el eje de la discordia.
more...
No comment yet.