Ciberseguridad + Inteligencia
16.1K views | +0 today
Follow
 
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Rule 41: Bitcoiners, Torrenters, And TOR Users — FBI Can Catch You With A Single Warrant

Rule 41: Bitcoiners, Torrenters, And TOR Users — FBI Can Catch You With A Single Warrant | Ciberseguridad + Inteligencia | Scoop.it
Fossbytes is a technology news and tutorial website that covers security and hacker news, open source, Windows 10, Ubuntu, and programming languages.
Via Roger Smith
more...
Roger Smith's curator insight, June 11, 11:29 PM

And who in political power will think this is a good idea.  Probably the ill informed, un educated members of congress.   


I hate cybercrime, but using a law to spy on their own public is criminal. 

Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Ciberseguridad + Inteligencia | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
Via Roger Smith
more...
Roger Smith's curator insight, June 3, 12:42 AM

Business security is no longer about building a wall to keep the bad guys out it is more about understanding where the next attack will come from with risk analisys and education.

F24 Group's curator insight, June 4, 1:00 PM

Este es un tema que va a quedarse un largo tiempo entre nosotros porque está claro que las personas somos el punto más vulnerable en ciberseguridad. Los responsables de Continuidad o de Seguridad IT, que han sensibilizado sobre las buenas prácticas que no pongan en riesgo a la empresa, ahora deben entrenar a los empleados frente a técnicas de "ingeniería social" y comportamiento. ¡Vaya reto!

Ken Feltman's curator insight, June 6, 8:37 AM

As people learn about the vulnerabilities of social media sites, usage of unsafe sites will decline. That will force people to change their surfing lifestyle and create winners and losers among social media sites - rewarding those sites that are best at keeping the cyber criminals at bay.


Investment advisors are already trying to figure out which social media sites to advise investors to dump and which to add to portfolios. You may get an early warning about which social media sites to avoid by following stock prices.

Rescooped by Elisa Vivancos from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

On the Limits of Information # Flow #Techniques for #Malware  #Analysis and Containment

On the Limits of Information # Flow #Techniques for #Malware  #Analysis and Containment | Ciberseguridad + Inteligencia | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Infografía - Reglamento de protección de datos - Consilium

Infografía - Reglamento de protección de datos - Consilium | Ciberseguridad + Inteligencia | Scoop.it
“La UE está elaborando un nuevo reglamento que actualiza y moderniza la protección de datos personales.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

¿Por qué me vigilan si no soy nadie? – Marta Peirano

¿Por qué me vigilan si no soy nadie? – Marta Peirano | Ciberseguridad + Inteligencia | Scoop.it
“El pasado 8 de marzo se emitió la entrevista realizada a Edward Snowden, @Snowden por Ana Pastor, en el programa El Objetivo. Intento seguir las entrevistas que realiza Ed Snowden ya que las considero interesante escuchar a una de las pocas personas que ha puesto en jaque al gobierno de los EEUU. Ayer, por fin, hice…”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat | Ciberseguridad + Inteligencia | Scoop.it
“Selon une récente enquête, Matthew Edman, un expert en cyber-sécurité et ancien employé du projet Tor, aurait aidé le FBI pour le développement de Torsploit, un malware qui a permis de pirater et de démasquer les utilisateurs de Tor, notamment lors des opérations Torpedo et Silk Road.”
Via Frederic GOUTH
more...
No comment yet.
Rescooped by Elisa Vivancos from Securitysplaining For Consumers
Scoop.it!

Anti-virus products, security devices affected by 7-Zip flaws

Anti-virus products, security devices affected by 7-Zip flaws | Ciberseguridad + Inteligencia | Scoop.it
Researchers have uncovered two vulnerabilities in 7-Zip that leave various security devices and anti-virus products vulnerable to attack.
Via Jon Campbell
more...
No comment yet.
Rescooped by Elisa Vivancos from Identidad Digital
Scoop.it!

Has your sleeping baby been indexed by this search engine?

Has your sleeping baby been indexed by this search engine? | Ciberseguridad + Inteligencia | Scoop.it
Shodan calls itself the world's first search engine for internet-connected devices. The top 3 searches: "webcam", "cams" and "netcam".

Via Emilio
more...
Scooped by Elisa Vivancos
Scoop.it!

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología | Ciberseguridad + Inteligencia | Scoop.it

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

New York Prepares Cybersecurity Guidance for Banks

New York Prepares Cybersecurity Guidance for Banks | Ciberseguridad + Inteligencia | Scoop.it
New guidance for cyber-resilience, vendor management and breach notification are expected for New York state banks in early 2016. And the tone set by these guidelines may have a ripple effect, influencing the actions of federal banking regulators.
more...
No comment yet.
Rescooped by Elisa Vivancos from Protection Données Personnelles - Big Data
Scoop.it!

Gmail Will Soon Warn Users When Emails Arrive Over Unencrypted Connections

Gmail Will Soon Warn Users When Emails Arrive Over Unencrypted Connections | Ciberseguridad + Inteligencia | Scoop.it
“ Soon, you may see a warning in Gmail that tells you that an email has arrived over an unencrypted connection.”
Via Loic Lecomte
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

10 Sea-Changing IT Security Trends Of The Last 10 Years

10 Sea-Changing IT Security Trends Of The Last 10 Years | Ciberseguridad + Inteligencia | Scoop.it
A look at ten trends that have shaped and changed the way security departments -- and enterprise businesses -- approach their cyber strategies over the last decade.
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Should cyber insurance become compulsory for UK businesses?

Here's why the threat of cyber attacks has paved the way for certain measures to be taken against them. Cyber attacks affecting businesses are on the rise.
Via Roger Smith
more...
Roger Smith's curator insight, June 6, 12:56 AM

Unless you resolve the issues of business protection and manage the risks associated with the digital world cyber insurance is an unneccasary cost with no chance of recovering the investment.


busness security has to com from addressing the risks and mitigating them, then take out insurance.

Scooped by Elisa Vivancos
Scoop.it!

The Snowden Effect: Privacy Is Good For Business

The Snowden Effect: Privacy Is Good For Business | Ciberseguridad + Inteligencia | Scoop.it
Tech companies didn't look so good when Edward Snowden revealed they were helping governments spy on average people. But the revelations have worked in the industry's favor.
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Ciberseguridad + Inteligencia | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
Via Roger Smith
more...
Roger Smith's curator insight, June 3, 12:42 AM

Business security is no longer about building a wall to keep the bad guys out it is more about understanding where the next attack will come from with risk analisys and education.

F24 Group's curator insight, June 4, 1:00 PM

Este es un tema que va a quedarse un largo tiempo entre nosotros porque está claro que las personas somos el punto más vulnerable en ciberseguridad. Los responsables de Continuidad o de Seguridad IT, que han sensibilizado sobre las buenas prácticas que no pongan en riesgo a la empresa, ahora deben entrenar a los empleados frente a técnicas de "ingeniería social" y comportamiento. ¡Vaya reto!

Ken Feltman's curator insight, June 6, 8:37 AM

As people learn about the vulnerabilities of social media sites, usage of unsafe sites will decline. That will force people to change their surfing lifestyle and create winners and losers among social media sites - rewarding those sites that are best at keeping the cyber criminals at bay.


Investment advisors are already trying to figure out which social media sites to advise investors to dump and which to add to portfolios. You may get an early warning about which social media sites to avoid by following stock prices.

Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave | Ciberseguridad + Inteligencia | Scoop.it
“Empresas y administraciones públicas deben tener esta figura regulada.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea | Ciberseguridad + Inteligencia | Scoop.it
“Estamos celebrando el Día de Internet, por ello compartimos contigo, estos recursos para trabajar el tema de la protección de la privacidad al navegar en la red. Explóralos! a) Desde la Agencia Española de Protección de DatosSitio Web: Tú decides en internet Un proyecto dirigido a conciencia”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Security: The Art of Searching for #OpenSource Intelligence #OSINT by @irfaanshakeel

#Security: The Art of Searching for #OpenSource Intelligence #OSINT by @irfaanshakeel | Ciberseguridad + Inteligencia | Scoop.it
“Irfan Shakeel”
Via Frederic GOUTH
more...
No comment yet.
Rescooped by Elisa Vivancos from Toungues Tied: NLP, Hypnosis and Mind Control
Scoop.it!

5 Social Engineering Attacks to Watch Out For

5 Social Engineering Attacks to Watch Out For | Ciberseguridad + Inteligencia | Scoop.it
“ Social engineers exploit the one weakness that is found in each and every organization: human psychology.”
Via JW
more...
No comment yet.
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

IoT Raises new Legal Challenges for Business

IoT Raises new Legal Challenges for Business | Ciberseguridad + Inteligencia | Scoop.it

Privacy, security, and data ownership issues surrounding Internet of Things devices are creating a host of new legal questions and problems. Here's what's happening now, and what you need to know.


Via TechinBiz
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | Ciberseguridad + Inteligencia | Scoop.it
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet

 


Via Gust MEES
more...
Gust MEES's curator insight, January 1, 5:13 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Umberto Orefice's curator insight, January 2, 11:09 AM

Good to know..

Dennis Swender's curator insight, March 13, 10:07 AM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Scooped by Elisa Vivancos
Scoop.it!

This is the Doomsday plan for America if cyber attacks hit the grid

This is the Doomsday plan for America if cyber attacks hit the grid | Ciberseguridad + Inteligencia | Scoop.it

Dubbed Rapid Attack Detection, Isolation and Characterization (RADICS), the initiative's goal is to develop automated systems to deal with a loss of power.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Could cyberattack on Turkey be a Russian retaliation?

Could cyberattack on Turkey be a Russian retaliation? | Ciberseguridad + Inteligencia | Scoop.it
At least 400,000 websites, including government institutions, were brought
down by hackers this week
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Pokerising Cybersecurity

Pokerising Cybersecurity | Ciberseguridad + Inteligencia | Scoop.it
Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?
more...
No comment yet.