Ciberseguridad + Inteligencia
16.3K views | +2 today
Follow
 
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Survey: Digital Attacks Against Smart Cities Could Threaten Public Safety

Survey: Digital Attacks Against Smart Cities Could Threaten Public Safety | Ciberseguridad + Inteligencia | Scoop.it
Can a targeted digital attack against a smart city disrupt municipal services and threaten public safety? Tripwire's survey helps answer that question.
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

QUICK TIP: Make sure your internet connection is clean | #Router #CyberSecurity

QUICK TIP: Make sure your internet connection is clean | #Router #CyberSecurity | Ciberseguridad + Inteligencia | Scoop.it
This has got to be the quickest Quick Tip of all. Literally. With just one click, it’s too easy not to do.

You know your computer can be infected. But did you know your router can, too? And because most people just aren’t aware of it, if your router is compromised, it could stay that way a long time without you ever knowing.

Unless, of course, you use our free Router Checker. No need to download anything. Just visit the page and click to start the check.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 


Via Gust MEES
more...
Gust MEES's curator insight, September 3, 7:05 AM
This has got to be the quickest Quick Tip of all. Literally. With just one click, it’s too easy not to do.

You know your computer can be infected. But did you know your router can, too? And because most people just aren’t aware of it, if your router is compromised, it could stay that way a long time without you ever knowing.

Unless, of course, you use our free Router Checker. No need to download anything. Just visit the page and click to start the check.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 

Scooped by Elisa Vivancos
Scoop.it!

Facebook impide el uso de bloqueadores de anuncios en su página

Facebook impide el uso de bloqueadores de anuncios en su página | Ciberseguridad + Inteligencia | Scoop.it
La medida, que no se implementará en dispositivos móviles, busca también dar más control a los usuarios sobre la publicidad que aparece en la red social
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Israeli Cyber Weapon Dealers Figured Out How to Hack Every iPhone

Israeli Cyber Weapon Dealers Figured Out How to Hack Every iPhone | Ciberseguridad + Inteligencia | Scoop.it
NSO Group, a company that sells hacking services to governments so they can spy on journalists and dissidents, exploited gaping security holes in iPhone software, according to a report byLookout Security and Citizen Lab. But don’t worry: Apple just pushed a fix.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

98 cosas que Facebook sabe de ti (y que usa para mostrarte publicidad relevante)

98 cosas que Facebook sabe de ti (y que usa para mostrarte publicidad relevante) | Ciberseguridad + Inteligencia | Scoop.it
Facebook abre una nueva sección donde explica cómo funciona su plataforma de anuncios (y de dónde saca la información de su
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Inside ‘The Attack That Almost Broke the Internet’ — Krebs on Security

Inside ‘The Attack That Almost Broke the Internet’ — Krebs on Security | Ciberseguridad + Inteligencia | Scoop.it
Krijg een kijkje in de keuken bij een van de grootste aanvallen op het internet https://t.co/tE9ZJsbD1v
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

10 Sea-Changing IT Security Trends Of The Last 10 Years

10 Sea-Changing IT Security Trends Of The Last 10 Years | Ciberseguridad + Inteligencia | Scoop.it
A look at ten trends that have shaped and changed the way security departments -- and enterprise businesses -- approach their cyber strategies over the last decade.
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Should cyber insurance become compulsory for UK businesses?

Here's why the threat of cyber attacks has paved the way for certain measures to be taken against them. Cyber attacks affecting businesses are on the rise.
Via Roger Smith
more...
Roger Smith's curator insight, June 6, 12:56 AM

Unless you resolve the issues of business protection and manage the risks associated with the digital world cyber insurance is an unneccasary cost with no chance of recovering the investment.


busness security has to com from addressing the risks and mitigating them, then take out insurance.

Scooped by Elisa Vivancos
Scoop.it!

The Snowden Effect: Privacy Is Good For Business

The Snowden Effect: Privacy Is Good For Business | Ciberseguridad + Inteligencia | Scoop.it
Tech companies didn't look so good when Edward Snowden revealed they were helping governments spy on average people. But the revelations have worked in the industry's favor.
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Ciberseguridad + Inteligencia | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
Via Roger Smith
more...
Roger Smith's curator insight, June 3, 12:42 AM

Business security is no longer about building a wall to keep the bad guys out it is more about understanding where the next attack will come from with risk analisys and education.

F24 Group's curator insight, June 4, 1:00 PM

Este es un tema que va a quedarse un largo tiempo entre nosotros porque está claro que las personas somos el punto más vulnerable en ciberseguridad. Los responsables de Continuidad o de Seguridad IT, que han sensibilizado sobre las buenas prácticas que no pongan en riesgo a la empresa, ahora deben entrenar a los empleados frente a técnicas de "ingeniería social" y comportamiento. ¡Vaya reto!

Ken Feltman's curator insight, June 6, 8:37 AM

As people learn about the vulnerabilities of social media sites, usage of unsafe sites will decline. That will force people to change their surfing lifestyle and create winners and losers among social media sites - rewarding those sites that are best at keeping the cyber criminals at bay.


Investment advisors are already trying to figure out which social media sites to advise investors to dump and which to add to portfolios. You may get an early warning about which social media sites to avoid by following stock prices.

Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave | Ciberseguridad + Inteligencia | Scoop.it
“Empresas y administraciones públicas deben tener esta figura regulada.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea | Ciberseguridad + Inteligencia | Scoop.it
“Estamos celebrando el Día de Internet, por ello compartimos contigo, estos recursos para trabajar el tema de la protección de la privacidad al navegar en la red. Explóralos! a) Desde la Agencia Española de Protección de DatosSitio Web: Tú decides en internet Un proyecto dirigido a conciencia”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from Time to Learn
Scoop.it!

Windows Privacy Tweaker - Phrozen Software [Windows 10]

Windows Privacy Tweaker - Phrozen Software [Windows 10] | Ciberseguridad + Inteligencia | Scoop.it

Windows 10, Microsoft’s latest upgrade to its operating system, comes bundled with telemetry and tracking services that are enabled by default. While the company is insisting that it was 'not spying' but simply trying to enhance the program by understanding what users do, Windows 10 is constantly collecting users’ data, sharing Wi-Fi passwords to contacts (albeit with encryption), and collects data and usage patterns exhibited by every user of Windows 10.


Via Frédéric DEBAILLEUL
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

EEUU podría recopilar datos de tus Redes Sociales de turistas

EEUU podría recopilar datos de tus Redes Sociales de turistas | Ciberseguridad + Inteligencia | Scoop.it
Si tienes pensado viajar a EEUU próximamente deberías saber que el Gobierno tiene pensado recopilar datos de tus Redes sociales si viajas a su país.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Sauron, ce logiciel qui espionne gouvernements et armées depuis 5 ans

Sauron, ce logiciel qui espionne gouvernements et armées depuis 5 ans | Ciberseguridad + Inteligencia | Scoop.it
Depuis cinq ans, un logiciel espion aspire les données d'organismes militaires, gouvernementaux et scientifiques à travers le monde. Il pourrait avoir été conçu avec le soutien d'un État non identifié.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Wait, someone's stealing that train: smart city transport can be easily hacked | Information Age

Wait, someone's stealing that train: smart city transport can be easily hacked | Information Age | Ciberseguridad + Inteligencia | Scoop.it
Transport systems across the world are vulnerable to cyber attacks, and this will become more of a problem as transport infrastructure adopts a cloud-based setup
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

The Value of a Hacked Company — Krebs on Security

The Value of a Hacked Company — Krebs on Security | Ciberseguridad + Inteligencia | Scoop.it
Most organizations only grow in security maturity the hard way — that is, from the intense learning that takes place in the wake of a costly data breach. That may be because so few company leaders really grasp the centrality of computer and network security to the organization’s overall goals and productivity, [...]
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Dos ingenieros españoles descubren un error que permitía localizar a los usuarios de Tinder

Dos ingenieros españoles descubren un error que permitía localizar a los usuarios de Tinder | Ciberseguridad + Inteligencia | Scoop.it
El fallo revelaba la ubicación exacta de las personas que se daban match . La posición se actualizaba cuando abrían la app
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Rule 41: Bitcoiners, Torrenters, And TOR Users — FBI Can Catch You With A Single Warrant

Rule 41: Bitcoiners, Torrenters, And TOR Users — FBI Can Catch You With A Single Warrant | Ciberseguridad + Inteligencia | Scoop.it
Fossbytes is a technology news and tutorial website that covers security and hacker news, open source, Windows 10, Ubuntu, and programming languages.
Via Roger Smith
more...
Roger Smith's curator insight, June 11, 11:29 PM

And who in political power will think this is a good idea.  Probably the ill informed, un educated members of congress.   


I hate cybercrime, but using a law to spy on their own public is criminal. 

Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Ciberseguridad + Inteligencia | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
Via Roger Smith
more...
Roger Smith's curator insight, June 3, 12:42 AM

Business security is no longer about building a wall to keep the bad guys out it is more about understanding where the next attack will come from with risk analisys and education.

F24 Group's curator insight, June 4, 1:00 PM

Este es un tema que va a quedarse un largo tiempo entre nosotros porque está claro que las personas somos el punto más vulnerable en ciberseguridad. Los responsables de Continuidad o de Seguridad IT, que han sensibilizado sobre las buenas prácticas que no pongan en riesgo a la empresa, ahora deben entrenar a los empleados frente a técnicas de "ingeniería social" y comportamiento. ¡Vaya reto!

Ken Feltman's curator insight, June 6, 8:37 AM

As people learn about the vulnerabilities of social media sites, usage of unsafe sites will decline. That will force people to change their surfing lifestyle and create winners and losers among social media sites - rewarding those sites that are best at keeping the cyber criminals at bay.


Investment advisors are already trying to figure out which social media sites to advise investors to dump and which to add to portfolios. You may get an early warning about which social media sites to avoid by following stock prices.

Rescooped by Elisa Vivancos from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

On the Limits of Information # Flow #Techniques for #Malware  #Analysis and Containment

On the Limits of Information # Flow #Techniques for #Malware  #Analysis and Containment | Ciberseguridad + Inteligencia | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Infografía - Reglamento de protección de datos - Consilium

Infografía - Reglamento de protección de datos - Consilium | Ciberseguridad + Inteligencia | Scoop.it
“La UE está elaborando un nuevo reglamento que actualiza y moderniza la protección de datos personales.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

¿Por qué me vigilan si no soy nadie? – Marta Peirano

¿Por qué me vigilan si no soy nadie? – Marta Peirano | Ciberseguridad + Inteligencia | Scoop.it
“El pasado 8 de marzo se emitió la entrevista realizada a Edward Snowden, @Snowden por Ana Pastor, en el programa El Objetivo. Intento seguir las entrevistas que realiza Ed Snowden ya que las considero interesante escuchar a una de las pocas personas que ha puesto en jaque al gobierno de los EEUU. Ayer, por fin, hice…”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #Security #InfoSec #CyberSecurity #Sécurité #CyberSécurité #CyberDefence & #DevOps #DevSecOps
Scoop.it!

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat | Ciberseguridad + Inteligencia | Scoop.it
“Selon une récente enquête, Matthew Edman, un expert en cyber-sécurité et ancien employé du projet Tor, aurait aidé le FBI pour le développement de Torsploit, un malware qui a permis de pirater et de démasquer les utilisateurs de Tor, notamment lors des opérations Torpedo et Silk Road.”
Via Frederic GOUTH
more...
No comment yet.