Ciberseguridad + Inteligencia
15.9K views | +0 today
Follow
 
Scooped by Elisa Vivancos
onto Ciberseguridad + Inteligencia
Scoop.it!

Ciberdelincuentes apuntarán a la pérdida de privacidad y a los “secuestros” virtuales

Ciberdelincuentes apuntarán a la pérdida de privacidad y a los “secuestros” virtuales | Ciberseguridad + Inteligencia | Scoop.it
“La cantidad de códigos maliciosos diseñados para Android continúa creciendo rápidamente. También pronostican ataques a televisores inteligentes”
more...
No comment yet.
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave | Ciberseguridad + Inteligencia | Scoop.it
“Empresas y administraciones públicas deben tener esta figura regulada.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea | Ciberseguridad + Inteligencia | Scoop.it
“Estamos celebrando el Día de Internet, por ello compartimos contigo, estos recursos para trabajar el tema de la protección de la privacidad al navegar en la red. Explóralos! a) Desde la Agencia Española de Protección de DatosSitio Web: Tú decides en internet Un proyecto dirigido a conciencia”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Security: The Art of Searching for #OpenSource Intelligence #OSINT by @irfaanshakeel

#Security: The Art of Searching for #OpenSource Intelligence #OSINT by @irfaanshakeel | Ciberseguridad + Inteligencia | Scoop.it
“Irfan Shakeel”
Via Frederic GOUTH
more...
No comment yet.
Rescooped by Elisa Vivancos from Toungues Tied: NLP, Hypnosis and Mind Control
Scoop.it!

5 Social Engineering Attacks to Watch Out For

5 Social Engineering Attacks to Watch Out For | Ciberseguridad + Inteligencia | Scoop.it
“ Social engineers exploit the one weakness that is found in each and every organization: human psychology.”
Via JW
more...
No comment yet.
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

IoT Raises new Legal Challenges for Business

IoT Raises new Legal Challenges for Business | Ciberseguridad + Inteligencia | Scoop.it

Privacy, security, and data ownership issues surrounding Internet of Things devices are creating a host of new legal questions and problems. Here's what's happening now, and what you need to know.


Via TechinBiz
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | Ciberseguridad + Inteligencia | Scoop.it
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet

 


Via Gust MEES
more...
Gust MEES's curator insight, January 1, 5:13 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Umberto Orefice's curator insight, January 2, 11:09 AM

Good to know..

Dennis Swender's curator insight, March 13, 10:07 AM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Scooped by Elisa Vivancos
Scoop.it!

This is the Doomsday plan for America if cyber attacks hit the grid

This is the Doomsday plan for America if cyber attacks hit the grid | Ciberseguridad + Inteligencia | Scoop.it

Dubbed Rapid Attack Detection, Isolation and Characterization (RADICS), the initiative's goal is to develop automated systems to deal with a loss of power.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Could cyberattack on Turkey be a Russian retaliation?

Could cyberattack on Turkey be a Russian retaliation? | Ciberseguridad + Inteligencia | Scoop.it
At least 400,000 websites, including government institutions, were brought
down by hackers this week
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Pokerising Cybersecurity

Pokerising Cybersecurity | Ciberseguridad + Inteligencia | Scoop.it
Cybersecurity spending is like roulette - too much left to chance. Is it time to re-inject the intelligence and level the risk playing field, by changing the game?
more...
No comment yet.
Rescooped by Elisa Vivancos from Identidad Digital
Scoop.it!

Social experiment: 200 USB flash drives left in public locations

Social experiment: 200 USB flash drives left in public locations | Ciberseguridad + Inteligencia | Scoop.it
Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks...

Via Emilio
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Lanzada la primera beta de Tor Messenger, cliente de mensajería de escritorio de Tor

“Horas atrás, desde la web del proyecto Tor se ha anunciado la disponibilidad de la primera beta de Tor Messenger, su cliente de mensajería multi-redes y multi-plataforma, basado en el cliente de mensajería desarrollado por la comunidad de Mozilla,...”
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Blind, servicio de mensajería móvil que ofrece comunicaciones anónimas empresariales

“Blind es un servicio de mensajería móvil orientado a posibilitar las comunicaciones anónimas entre compañeros de trabajo, permitiendo la comunicación entre los compañeros de una misma empresa y también entre los compañeros pertenecientes a...”
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Infografía - Reglamento de protección de datos - Consilium

Infografía - Reglamento de protección de datos - Consilium | Ciberseguridad + Inteligencia | Scoop.it
“La UE está elaborando un nuevo reglamento que actualiza y moderniza la protección de datos personales.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

¿Por qué me vigilan si no soy nadie? – Marta Peirano

¿Por qué me vigilan si no soy nadie? – Marta Peirano | Ciberseguridad + Inteligencia | Scoop.it
“El pasado 8 de marzo se emitió la entrevista realizada a Edward Snowden, @Snowden por Ana Pastor, en el programa El Objetivo. Intento seguir las entrevistas que realiza Ed Snowden ya que las considero interesante escuchar a una de las pocas personas que ha puesto en jaque al gobierno de los EEUU. Ayer, por fin, hice…”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat | Ciberseguridad + Inteligencia | Scoop.it
“Selon une récente enquête, Matthew Edman, un expert en cyber-sécurité et ancien employé du projet Tor, aurait aidé le FBI pour le développement de Torsploit, un malware qui a permis de pirater et de démasquer les utilisateurs de Tor, notamment lors des opérations Torpedo et Silk Road.”
Via Frederic GOUTH
more...
No comment yet.
Rescooped by Elisa Vivancos from Securitysplaining For Consumers
Scoop.it!

Anti-virus products, security devices affected by 7-Zip flaws

Anti-virus products, security devices affected by 7-Zip flaws | Ciberseguridad + Inteligencia | Scoop.it
Researchers have uncovered two vulnerabilities in 7-Zip that leave various security devices and anti-virus products vulnerable to attack.
Via Jon Campbell
more...
No comment yet.
Rescooped by Elisa Vivancos from Identidad Digital
Scoop.it!

Has your sleeping baby been indexed by this search engine?

Has your sleeping baby been indexed by this search engine? | Ciberseguridad + Inteligencia | Scoop.it
Shodan calls itself the world's first search engine for internet-connected devices. The top 3 searches: "webcam", "cams" and "netcam".

Via Emilio
more...
Scooped by Elisa Vivancos
Scoop.it!

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología | Ciberseguridad + Inteligencia | Scoop.it

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

New York Prepares Cybersecurity Guidance for Banks

New York Prepares Cybersecurity Guidance for Banks | Ciberseguridad + Inteligencia | Scoop.it
New guidance for cyber-resilience, vendor management and breach notification are expected for New York state banks in early 2016. And the tone set by these guidelines may have a ripple effect, influencing the actions of federal banking regulators.
more...
No comment yet.
Rescooped by Elisa Vivancos from Protection Données Personnelles - Big Data
Scoop.it!

Gmail Will Soon Warn Users When Emails Arrive Over Unencrypted Connections

Gmail Will Soon Warn Users When Emails Arrive Over Unencrypted Connections | Ciberseguridad + Inteligencia | Scoop.it
“ Soon, you may see a warning in Gmail that tells you that an email has arrived over an unencrypted connection.”
Via Loic Lecomte
more...
No comment yet.
Rescooped by Elisa Vivancos from Innovation, Big Data, Open Data, Internet of Things, Smart Homes & Cities, 3D printing
Scoop.it!

Why IoT Security Is So Critical | TechCrunch

Why IoT Security Is So Critical | TechCrunch | Ciberseguridad + Inteligencia | Scoop.it
“Twenty years ago, if you told me my phone could be used to steal the password to my email account or to take a copy of my fingerprint data, I would’ve..”
Via Celine Sportisse
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Crear DNS SinkHoling

Crear DNS SinkHoling | Ciberseguridad + Inteligencia | Scoop.it
“DNS SinkHoling o DNS-based blackhole list (DNSBL) es un técnica mediante la cual podemos prevenir el acceso a sitios maliciosos devolviendo IPs falsas o nulas como respuesta a peticiones DNS intentando resolver dominios conocidos con malware.”
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Forget Self-Destructing Messages, Buzz’s New App Offers Self-Destructing Connections

Forget Self-Destructing Messages, Buzz’s New App Offers Self-Destructing Connections | Ciberseguridad + Inteligencia | Scoop.it
“ Today, there are a variety of apps to choose from if you just want to privately chat with friends or even place phone calls without having to give out your real phone number – for example, Google Voice, Burner, kik, Viber, Whatsapp and others are...”
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Don’t count on STARTTLS to automatically encrypt your sensitive e-mails

Don’t count on STARTTLS to automatically encrypt your sensitive e-mails | Ciberseguridad + Inteligencia | Scoop.it
“(credit: Yzmo) Researchers have some good and bad news about the availability of secure e-mail.”
more...
No comment yet.