Ciberseguridad + ...
Follow
Find
14.8K views | +0 today
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

La pérdida de datos puede suponer 2,7 millones a las oganizaciones - Network World

La pérdida de datos puede suponer 2,7 millones a las oganizaciones - Network World | Ciberseguridad + Inteligencia | Scoop.it
El uso de los dispositivos personales en el lugar de trabajo, los equipos dispersos geográficamente y el auge de las redes sociales están teniendo un ...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Control Parental en Windows 8

Hasta ahora, la mayor parte de soluciones para controlar el uso que hacen los niños del ordenador se basaban en tomar acciones preventivas, tal y como se puede comprobar en el post del sitio "www.windowstecnico.com/"sobre Control Parental en Windows...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Safe Notes, almacena tus notas de manera segura en Android

Safe Notes, almacena tus notas de manera segura en Android | Ciberseguridad + Inteligencia | Scoop.it
Nuestros smartphones y tabletas cada vez almacenan más información personal y que, lógicamente, no debiera estar al alcance de cualquier persona; sin embargo, existen bastante usuarios que aún no toman conciencia de este hecho y, por ejemplo, no...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Cyber attackers seize, encrypt and ransom medical centre's patient database

Cyber attackers seize, encrypt and ransom medical centre's patient database | Ciberseguridad + Inteligencia | Scoop.it
The data-kidnappers are demanding $4,000 to release thousands of patient records belonging to the Miami Family Medical Centre on Australia's Gold Coast.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Ebook: DDoS for Dummies

  This book explores real-world examples of DDoS attacks, the motivations of their perpetrators, and the operational and business risks to organizations  Get your Complimentary DDoS for Dummies e-Book to find out:...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Kaspersky Lab implementa su servicio de seguridad informático en el metro de Bilbao

Kaspersky Lab ha firmado un acuerdo con el metro de Bilbao para implementar un servicio de seguridad informático. Con esta alianza, Kaspersky se convierte en el nuevo proveedor de seguridad de las instalaciones del subterráneo.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Kaspersky aprecia un aumento de las amenazas de malware

Kaspersky avisa de que todos los sistemas operativos son vulnerables al malware y desmonta el mito de Apple en materia de seguridad.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Una vulnerabilidad en Internet Explorer permite a cualquier página seguir todos los movimientos del ratón

Una vulnerabilidad en Internet Explorer permite a cualquier página seguir todos los movimientos del ratón | Ciberseguridad + Inteligencia | Scoop.it
Parece que a pesar de los esfuerzos de Microsoft en mejorar su navegador, Internet Explorer sigue teniendo agujeros de seguridad.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Vulnerabilidad en Internet Explorer amenazaría los teclados virtuales

Cuando hablamos de seguridad de un sistema o una aplicación uno rara vez se plantea que de lo que estamos hablando realmente es de riesgos y la minimización de éstos, es decir, cuanto más seguro consideramos un sistema menor es el riesgo de que sea...
more...
No comment yet.
Rescooped by Elisa Vivancos from IT Security Unplugged
Scoop.it!

Webcast: Protecting the Enterprise from Zero-Day Threats and Advanced Malware

Webcast: Protecting the Enterprise from Zero-Day Threats and Advanced Malware | Ciberseguridad + Inteligencia | Scoop.it
Join featured guest, Forrester Research Vice President & Principal Analyst, Security and Risk, Chenxi Wang, and Damballa Vice President, Stephen Newman, for this informative webcast.

Via IT Security Unplugged
more...
IT Security Unplugged's curator insight, December 13, 2012 3:17 AM

Damballa are leaders in detecting and terminating criminal activity, stopping data theft and providing the forensics needed to expedite incident response and remediation.

Rescooped by Elisa Vivancos from Informática Forense
Scoop.it!

El FBI desmantela una red de 'cibercrimen' que infectó 11 millones de ordenadores

El FBI desmantela una red de 'cibercrimen' que infectó 11 millones de ordenadores | Ciberseguridad + Inteligencia | Scoop.it
El FBI desmantela una gran red de cibercrimen La red actuaba en todo el mundo y causó más de 653 millones de euros en pérdidas. Hay 10 detenidos en siete países.

Via Javier Pagès López
more...
No comment yet.
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes | Ciberseguridad + Inteligencia | Scoop.it
A screenshot of the fraudulent installer asking for a Mac user's phone number.

Time for Apple users to heed a lesson Windows users have long learned the hard way: Don’t hand out your cell phone number to untrusted applications downloaded from the Web.

On Tuesday, Russian antivirus firm Doctor Web reported the appearance of a new strain of Mac-focused malware that queries users for their cellphone number when they try to install a piece of legitimate software. If the user enters a phone number, he or she receives a text message asking for a reply with a registration code. Responding implicitly signs up the user for a series of recurring mobile charges to their carrier’s account.

Read more, a MUST:
http://www.forbes.com/sites/andygreenberg/2012/12/12/new-mac-malware-scams-users-into-signing-up-for-cellphone-charges/?utm_campaign=techtwittersf&utm_source=twitter&utm_medium=social

Via Gust MEES
more...
Gust MEES's curator insight, December 12, 2012 7:06 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;)

 


Gust MEES's curator insight, December 12, 2012 7:10 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;) 

Scooped by Elisa Vivancos
Scoop.it!

Joomla sites misused to deploy malware

Joomla sites misused to deploy malware | Ciberseguridad + Inteligencia | Scoop.it
For weeks, unknown criminals have exploited a known hole in the widely used Java Content Editor to take control of web servers via automated attacks.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Google Takeout facilita nuestro backup de Google Drive

Google Takeout facilita nuestro backup de Google Drive | Ciberseguridad + Inteligencia | Scoop.it
Ha pasado casi un año y medio desde que Google lanzase Google Takeout, un interesante servicio que, aunque no es muy conocido, vale la pena tener presente porque nos permite realizar una copia de seguridad de nuestros datos para descargarlos y...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Facebook ayuda al FBI a arrestar a una banda de ciberdelincuentes

En la operación en la que Facebook ha tomado parte activa, se han arrestado a diez personas que han generado pérdidas por valor de 850 millones de dólares.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Power grid operators attacked via DDoS

Power grid operators attacked via DDoS | Ciberseguridad + Inteligencia | Scoop.it
In November, unknown attackers crippled the internet infrastructure of 50Hertz, a power grid operator that runs transmission networks in Northern and Eastern Germany; however, no critical infrastructures are believed to have been affected...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Verizon pide exponer a los copyright trolls en defensa de las P2P

Verizon pide exponer a los copyright trolls en defensa de las P2P | Ciberseguridad + Inteligencia | Scoop.it
En vista del gran número de demandas en masa contra las P2P y el BitTorrent por parte de los denominados copyright trolls, Verizon ha dado un paso al frente en defensa de los usuarios.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Los algoritmos te siguen en Facebook y en Twitter

Los algoritmos te siguen en Facebook y en Twitter | Ciberseguridad + Inteligencia | Scoop.it
Ana Hernando El gigante de la consultoría Accenture, con 250.000 empleados en el mundo y 9.000 en España, compró a principios de año Neo Metrics, una firma creada en 2003 por cuatro amigos asturianos –dos matemáticos, un informático y un...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Herramientas para monitorear nuestra reputación online

Herramientas para monitorear nuestra reputación online | Ciberseguridad + Inteligencia | Scoop.it
La reputación online es algo que no solamente buscan mantener en buen estado los usuarios, sino también las marcas.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware

Samsung Smart TV security hole allows hackers to watch you, change channels or plug in malware | Ciberseguridad + Inteligencia | Scoop.it
Researchers have found a vulnerability in an unspecified model of a Samsung LED 3D TV that they exploited to get root access to the TV and any attached USB drives.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Facebook privacy control overhaul will remove ability to limit who can find us

Facebook privacy control overhaul will remove ability to limit who can find us | Ciberseguridad + Inteligencia | Scoop.it
Facebook's most recent round of changes carry some good privacy tidings, including Privacy shortcuts from the main page drop-down menu, plus a new Request Removal tool for getting untagged (and telling the tagger why) in multiple photos.
more...
No comment yet.
Rescooped by Elisa Vivancos from IT Security
Scoop.it!

Internet Explorer flaw allows websites to track your mouse cursor, even when you aren’t browsing

Internet Explorer flaw allows websites to track your mouse cursor, even when you aren’t browsing | Ciberseguridad + Inteligencia | Scoop.it
A new Internet Explorer vulnerability has been discovered that allows an attacker to track your mouse cursor anywhere on the screen, even if the browser isn't being actively used.
Via IS Decisions
more...
IS Decisions's curator insight, December 12, 2012 11:12 AM

Time to fix that flaw Microsoft!

Scooped by Elisa Vivancos
Scoop.it!

Mobile apps for kids collecting and sharing information with third parties

Mobile apps for kids collecting and sharing information with third parties | Ciberseguridad + Inteligencia | Scoop.it
The second of two FTC reports on kids' mobile apps shows that the industry hasn't improved with regards to privacy, with many apps sharing personal information with third parties.

Many mobile apps aimed at children are sharing personal information - such as device ID, geolocation and phone numbers - with third parties, all without notifying parents or asking for permission.

A number of mobile apps also contain advertising, in-app purchasing ability, and links to social media. Some even send information to ad networks, analytics companies, or other third parties, all without disclosing such features to parents prior to download.

Those are the findings of a new report released on Monday by the US Federal Trade Commission (FTC), titled Mobile Apps for Kids: Disclosures Still Not Making the Grade [see this link: http://www.ftc.gov/os/2012/12/121210mobilekidsappreport.pdf].

Some additional findings from the report:

* Only 20% of the apps reviewed disclosed any information about privacy practices.
* A relatively small number of third parties received information from a large number of apps. This means the third parties that receive information from multiple apps could potentially develop detailed profiles of the children based on their behavior in different apps.
* 58% of reviewed apps contained advertising within the app, while only 15% disclosed the presence of advertising prior to download.
* 22% of the apps contained links to social networking services, while only 9% disclosed that fact.
* 17% of reviewed apps allow kids to make purchases for virtual goods within the app, with prices ranging from 99 cents to $29.99. Although both app stores provided certain indicators when an app contained in-app purchasing capabilities, these indicators were not always prominent and, even if noticed, could be difficult for many parents to understand.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

3 Congreso Nacional de Interoperabilidad y seguridad

3 Congreso Nacional de Interoperabilidad y seguridad | Ciberseguridad + Inteligencia | Scoop.it
CNIS. Congreso Nacional de Interoperabilidad y Seguridad
more...
No comment yet.