Ciberseguridad + Inteligencia
16.7K views | +0 today
Follow
 
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
onto Ciberseguridad + Inteligencia
Scoop.it!

'Two million' monitor web in China

'Two million' monitor web in China | Ciberseguridad + Inteligencia | Scoop.it
More than two million people in China are employed by the government to monitor web activity, state media say, providing a rare glimpse into how the state tries to control the internet.

Via Gust MEES
more...
Gust MEES's curator insight, October 5, 2013 6:51 AM

 

They are "strictly to gather and analyse public opinions on microblog sites and compile reports for decision-makers", it said. It also added details about how some of these monitors work.


Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

El doxxing o el nuevo peligro que amenaza a las democracias . Noticias de Alma, Corazón, Vida

El doxxing o el nuevo peligro que amenaza a las democracias . Noticias de Alma, Corazón, Vida | Ciberseguridad + Inteligencia | Scoop.it
Ciberseguridad: El doxxing o el nuevo peligro que amenaza a las democracias . Noticias de Alma, Corazón, Vida. ¿Cuáles son los nuevos riesgos para los Estados y los sistemas electorales? ¿Quién está detrás de estos ataques? Intentamos poner algo de luz a estas y otras cuestiones
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

'Big data', una oportunidad para mejorar la ciberseguridad

'Big data', una oportunidad para mejorar la ciberseguridad | Ciberseguridad + Inteligencia | Scoop.it
Las herramientas de analítica de 'big data' están en primera línea de defensa para construir modelos que ayuden predecir el comportamiento y lo
Elisa Vivancos's insight:
Watson
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Shodan, la alternativa a Google más peligrosa

Shodan, la alternativa a Google más peligrosa | Ciberseguridad + Inteligencia | Scoop.it
En un mundo hiperconectado y unido por el Internet de las Cosas. Shodan se trata de un buscador no exento de peligros en el que puedes encontrar cualquier
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Las mejores herramientas de Hacking para este 2017

Las mejores herramientas de Hacking para este 2017 | Ciberseguridad + Inteligencia | Scoop.it
Recopilamos las mejores herramientas Hacking para poder auditar y mejorar la seguridad de nuestros equipos y redes este nuevo 2017.
more...
No comment yet.
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

Beyond Bitcoin: 4 surprising uses for Blockchain

Beyond Bitcoin: 4 surprising uses for Blockchain | Ciberseguridad + Inteligencia | Scoop.it
Blockchain, the technology originally designed to run Bitcoin, could be used to make the world a better place. Here's how.
Via TechinBiz
more...
Jean-Marie Grange's curator insight, January 9, 10:25 AM
Useful applications of Blockchain technology. I think the music industry has a very good opportunity to better distribute revenues using Blockchain
rodrick rajive lal's curator insight, January 10, 4:17 AM
Think of it, Blockchain and Bitcoins might be the next big thing after demonetization of hard currency and the building up of a cashless economy!
 
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

Where Cybercriminals Go To Buy Your Stolen Data

Where Cybercriminals Go To Buy Your Stolen Data | Ciberseguridad + Inteligencia | Scoop.it
What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more?
Via TechinBiz
more...
Imrana Rana's comment, December 19, 2016 10:27 PM
http://serialkeypro.com/vuescan-professional-edition-9-3-07-key/
prgnewshawaii's curator insight, December 20, 2016 11:05 PM

There's a vast underworld that exists on the so-called "Dark Web", where criminals, terrorists, and extremists of all political and religious persuasions swap and sell the data taken from you and your business.  This criminal empire goes unnoticed by most of us.  Take cyber security very seriously.  It could save your life and your business.  A most alarming report.


Russell Roberts


Hawaii Intelligence Digest


https://hawaiiintelligencedigest.com

Rescooped by Elisa Vivancos from JANUA - Identity Management & Open Source
Scoop.it!

Top 5 Digital Identity Predictions for 2017

“ IT and Information Security | Comment | Analysis | Interviews”
Via Pascal Flamand
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Sécurité: Comment expliquer la #Blockchain #Crypto

#Sécurité: Comment expliquer la #Blockchain #Crypto | Ciberseguridad + Inteligencia | Scoop.it
“Voici comment expliquer la blockchain et le principe des cryptomonnaie en une infographie. Découvert via cet article http://imgur.com/wRfw1Ui…;”
Via Frederic GOUTH
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Application Threat Modeling vs Operational Threat Modeling

Application Threat Modeling vs Operational Threat Modeling | Ciberseguridad + Inteligencia | Scoop.it
Read latest post Application Threat Modeling vs Operational Threat Modeling to gain a better understanding of why both threat model types are needed.
more...
No comment yet.
Rescooped by Elisa Vivancos from Security News You Should Know
Scoop.it!

Hacking Password-Protected Computers via the USB Port - Schneier on Security

Hacking Password-Protected Computers via the USB Port - Schneier on Security | Ciberseguridad + Inteligencia | Scoop.it
PoisonTap USB Stick is a clever put together Raspberry Pi with a whole string of small vulnerability out together
Via Christian Peper
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Probabilistic Pentesting

Probabilistic Pentesting | Ciberseguridad + Inteligencia | Scoop.it
Pentesting tools like Metasploit, Burp, ExploitPack, BeEF, etc. are used by security practitioners to identify possible vulnerability points and to assess comp…
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

8 Maps of the Internet of Things

8 Maps of the Internet of Things | Ciberseguridad + Inteligencia | Scoop.it
Here are seven IoT maps that we have written about on Iot Central. 
Interactive Map of IoT Organizations
IoT and IIOT Cybersecurity Market Map
The Ind…
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Detecting Cyber Crime With Artificial Intelligence - Enterprise Security & Risk Management 2016

Detecting Cyber Crime With Artificial Intelligence - Enterprise Security & Risk Management 2016 | Ciberseguridad + Inteligencia | Scoop.it
Author: Cyberseer.Net Security professionals face a difficult task in keeping enterprise networks safe. Cyber-attacks continue to grow as criminals find new ways to infiltrate and …
more...
No comment yet.
Rescooped by Elisa Vivancos from CyberSecurity
Scoop.it!

Application Threat Modeling vs Operational Threat Modeling

Application Threat Modeling vs Operational Threat Modeling | Ciberseguridad + Inteligencia | Scoop.it
Read latest post Application Threat Modeling vs Operational Threat Modeling to gain a better understanding of why both threat model types are needed.
Via JC Soto
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

La peligrosa química de la web

La peligrosa química de la web | Ciberseguridad + Inteligencia | Scoop.it
Mi columna de esta semana en El Español se titula Mezclas peligrosas, y hace referencia a la compleja química d
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Por qué el contador inteligente de la luz es una bomba de (ciber)relojería en tu casa. Noticias de Tecnología

Por qué el contador inteligente de la luz es una bomba de (ciber)relojería en tu casa. Noticias de Tecnología | Ciberseguridad + Inteligencia | Scoop.it
“ Factura de la luz: Por qué el contador inteligente de la luz es una bomba de (ciber)relojería en tu casa. Noticias de Tecnología. Un experto en seguridad israelí alerta de que la mayoría de contadores digitales son susceptibles de sufrir ciberataques para causar sobrecargas eléctricas o manipular el consumo”
Via A3Sec
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Este ransomware desbloquea archivos gratis si lees sobre ciberseguridad

Este ransomware desbloquea archivos gratis si lees sobre ciberseguridad | Ciberseguridad + Inteligencia | Scoop.it
Quién lo diría, el ransomware también puede ser útil. Este software malicioso que cifra los archivos y pide un rescate por ellos (monetario, habitualmente), está evolucionando a pasos agigantados. Hace unas semanas conocíamos un curioso nuevo tipo de ransomware que además de solicitar que se pagara un precio por la clave para descifrar los archivosRead More
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking

OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking | Ciberseguridad + Inteligencia | Scoop.it
Mobile app developers need to be aware of improper OAuth 2.0 implementations that have put one billion mobile apps at risk to takeover.
more...
No comment yet.
Rescooped by Elisa Vivancos from Information Technology & Social Media News
Scoop.it!

Gartner's Top 10 Strategic Technology Trends for 2017 - Smarter With Gartner

Gartner's Top 10 Strategic Technology Trends for 2017 - Smarter With Gartner | Ciberseguridad + Inteligencia | Scoop.it
“Artificial intelligence, machine learning, and smart things promise an intelligent future.”
Via Jesús Hernández
more...
No comment yet.
Rescooped by Elisa Vivancos from Innovation Evolution
Scoop.it!

How blockchain can change the future of IoT

How blockchain can change the future of IoT | Ciberseguridad + Inteligencia | Scoop.it
“The Internet of Things (IoT) is a fast-growing industry destined to transform homes, cities, farms, factories, and practically everything else by making them smart and more efficient. According to Gartner, by 2020, there will be more than 20 billion connected things across the globe, powering a market that will be worth north of $3 trillion.”
Via Oliver Durrer
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Security Vendor: Attacks Will Bury the Internet by 2020 | Light Reading

Security Vendor: Attacks Will Bury the Internet by 2020 | Light Reading | Ciberseguridad + Inteligencia | Scoop.it
Maintaining a persistent Internet connection will be an invitation to disaster, says a security vendor's founder.
Via Roger Smith
more...
Roger Smith's curator insight, November 19, 2016 10:14 PM

Amazing, I wrote an article on just such an assumption in 2011 only now are we seeing a problem.

Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Sécurité: #Crawler : le logiciel qui prédit les #hackings à venir

#Sécurité: #Crawler : le logiciel qui prédit les #hackings à venir | Ciberseguridad + Inteligencia | Scoop.it
“Des experts informatiques américains ont intégré un analyseur big data, de genre machine e-learning, dans les forums des hackers afin d’en apprendre davantage de leurs activités. Anticiper une attaque grâce à une machine e-learning Las d’être toujours surpris et obligés de travailler en urgence lors des attaques informatiques, les Américains ont cherché un moyen de... Lire la suite”
Via Frederic GOUTH
more...
No comment yet.
Rescooped by Elisa Vivancos from Information Governance & eDiscovery Snapshot
Scoop.it!

How to get ready for GDPR

How to get ready for GDPR | Ciberseguridad + Inteligencia | Scoop.it
Changes to data protection rules will have major implications for your business

Via Mindseye
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Globalización, conectividad, información: Complejidad Tecnológica II - Gestión Complejidad

Globalización, conectividad, información: Complejidad Tecnológica II - Gestión Complejidad | Ciberseguridad + Inteligencia | Scoop.it
La globalización, conectividad e información, introducen elementos de complejidad en las organizaciones. Una breve reflexión de los efectos de la tecnología en
more...
Svintab's curator insight, November 10, 2016 2:35 AM
Todos estamos conectados