Mercado seguridad...
Follow
Find tag "IT-Security"
12.9K views | +4 today
Mercado seguridad TIC
Seguridad de la información, seguridad TIC, scada, infraestructuras críticas, SGSI, Protección datos personales,
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple blocks Java on Macs due to vulnerabilities

Apple blocks Java on Macs due to vulnerabilities | Mercado seguridad TIC | Scoop.it
NEW YORK (AP) — Some Mac users were taken by surprise Thursday as their computers stopped running programs written using the Java programming language after Apple blocked Java due to security problems.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

New BackDoor.Butirat generates names of control servers

New BackDoor.Butirat generates names of control servers | Mercado seguridad TIC | Scoop.it
Russian anti-virus company Doctor Web is warning users that a new backdoor has been found in large numbers in the wild.

Via Gust MEES
more...
Gust MEES's curator insight, January 29, 2013 3:45 PM

             ===> BEWARE of the MALWARE!!! <===

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Pentagon to boost cyber-security force

Pentagon to boost cyber-security force | Mercado seguridad TIC | Scoop.it
Pentagon to boost cyber-security force: The Pentagon plans to assign significantly more personnel in coming
years to counter increasing thr...

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from Free Tutorials in EN, FR, DE
Scoop.it!

Twitter Help Center | My Account Has Been Compromised

Twitter Help Center | My Account Has Been Compromised | Mercado seguridad TIC | Scoop.it
Twitter is without a doubt the best way to share and discover what is happening right now.

 

If your account has been compromised but you're still able to log in, this page will help you secure your account and stop unwanted behaviors. If you can't log in to your account, please see thistroubleshooting article.

Has my account been compromised? Read more in article... 


Via Gust MEES
more...
Gust MEES's curator insight, January 27, 2013 4:13 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

 

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

 

Learn more:

 

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 27, 2013 4:16 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

 

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

 

Learn more:

 

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Twitter bug gives 3rd-party apps access to users' Direct Messages

Twitter bug gives 3rd-party apps access to users' Direct Messages | Mercado seguridad TIC | Scoop.it

"There should be millions of Twitter users that have signed in with Twitter into third-party applications. Some of these applications might have gained access to and might still have access to Twitter users private direct messages," he points out, and advises users to check third-party applications permissions and revoke the apps to which they never gave permission to access their DMs.


Via Gust MEES
more...
Gust MEES's curator insight, January 22, 2013 8:52 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 8:54 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Gust MEES's curator insight, January 22, 2013 8:59 AM

===> check third-party applications permissions and revoke the apps to which they never gave permission to access YOUR DMs. <===

Check ALSO:

https://twitter.com/settings/applications


http://blog.ioactive.com/2013/01/you-can-not-trust-social-media-twitter-vulnerable.html


https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: The Kingdom of Fraud-CyberCrime

Infographic: The Kingdom of Fraud-CyberCrime | Mercado seguridad TIC | Scoop.it
GOOD Infographic: The Kingdom of Fraud - The State of Global Economic Crime

Via Gust MEES
more...
Gust MEES's curator insight, January 15, 2013 11:42 PM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!

 

Gust MEES's curator insight, January 15, 2013 11:47 PM

The Infographic is already 12 months old, but it shows the trend of Cyber-Crime!!!


Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Apple blacklists Java on OS X to prevent latest “critical” exploits

Apple blacklists Java on OS X to prevent latest “critical” exploits | Mercado seguridad TIC | Scoop.it
Apple's automated system is allowing for a fast response to malware threats.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Operating System Infection Rates: Application Vulnerabilities & Exploits Trend Up, Increase OS Infection Rates

Operating System Infection Rates: Application Vulnerabilities & Exploits Trend Up, Increase OS Infection Rates | Mercado seguridad TIC | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.

Via Gust MEES
more...
Gust MEES's curator insight, January 7, 2013 2:45 PM

                       

                      ===> Be AWARE of the MALWARE!!! <===

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives

Schneier on Security: "Evil Maid" Attacks on Encrypted Hard Drives | Mercado seguridad TIC | Scoop.it
October 23, 2009

"Evil Maid" Attacks on Encrypted Hard Drives
Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this:

Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down.

Step 2: You boot your computer using the attacker's hacked bootloader, entering your encryption key. Once the disk is unlocked, the hacked bootloader does its mischief. It might install malware to capture the key and send it over the Internet somewhere, or store it in some location on the disk to be retrieved later, or whatever.

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

First fake-installer Trojan for Mac OS

First fake-installer Trojan for Mac OS | Mercado seguridad TIC | Scoop.it
Russian anti-virus company Doctor Web informs users about a new Trojan for Mac OS X dubbed Trojan.SMSSend.3666.

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Cybersecurity Summary for Parents

Cybersecurity Summary for Parents | Mercado seguridad TIC | Scoop.it

Cyber-Security:

 

Download this free guide to get the full list of...

 

- How to prevent and avoid cyberbullying

 

- Tips for you teen to prevent sharing too much personal information

 

- Tips for identifying and dealing with an online predators

 

Want more safety information for you and your kids? Download this new guide today, hot off the press!


Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD savings may be lost by security and admin costs

BYOD savings may be lost by security and admin costs | Mercado seguridad TIC | Scoop.it
BYOD savings may be lost by security and admin costs
Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort.

 

The Aberdeen Group found that BYOD, on average, costs companies 33 percent more than adopting a company-owned device policy. This is particularly surprising because, at first glance, BYOD seems to be the ultimate cost saver.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22614-BYOD-savings-may-be-lost-by-security-and-admin-costs.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Tools for Teaching-People and Learners
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | Mercado seguridad TIC | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 


Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infosecurity Europe is Europe’s number one Information Security event

Infosecurity Europe is Europe’s number one Information Security event | Mercado seguridad TIC | Scoop.it

Infosecurity Europe is Europe’s number one Information Security event.  Featuring over 350 exhibitors, the most diverse range of new products and services,

 

              ===> an unrivalled education programme

 

and over 12,400 unique visitors from every segment of the industry, it is the most important date in the calendar for Information Security professionals across Europe. 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, January 31, 2013 3:52 PM

 

Critical Thinking:

 

When someone connects to the Internet (s)he needs (he doesn't see it BTW) to connect trough  different other service located in the US and somewhere else before (s)he gets his Internet connection (right!?), SO (s)he needs to pass through a lot of different services...

 

When searching a website on Internet one mostly finds some located in countries where "Security" isn't really taken that serious and one risks an infection of the connected device (right!?) when connecting device (computer, anyOs, SmartPhone, tablet, BYOD)!

 

Here is a list of the countries who host the most Malware on a global view:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=TOP+20+countries+whit+malware+resources

 

 

I would wish to see the Day that when someone connects to the Internet I would see ===> YOUR visited website, blog (or other...) is secure! (without a Third Party Program!) Even if my connecting device would NOT be protected, in this case I would like to see displayed ===> YOUR connecting device is NOT protected! We suggest to YOU to check the following... to make it protected! <===

 

That would be what the Internet in 21st Century MUST be!

 

 

 

 

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Le « cybercrime », un butin de 83 milliards d'euros

Le « cybercrime », un butin de 83 milliards d'euros | Mercado seguridad TIC | Scoop.it

 

===> Selon Symantec, 556 millions de personnes ont été les proies d'une arnaque sur Internet en 2012 à travers le monde ! <===

 

Les crimes et carambouilles éclaboussant Internet prennent des reliefs singuliers, qui n'ont rien de virtuel. Selon un état des lieux établi par la société américaine Symantec, 556 millions de personnes ont été les proies d'une arnaque en 2012 à travers le monde, pour un butin global de 83 milliards d'euros.

 

===> Soit 18 victimes par seconde. <===

 

Actuellement, les experts dénombrent plus de 100 millions de programmes malveillants, dont 95.000 nouveaux venus par jour.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

DHS Secretary Warns of Potential Cyber Attacks - cyber 9/11

DHS Secretary Warns of Potential Cyber Attacks - cyber 9/11 | Mercado seguridad TIC | Scoop.it
DHS secretary Janet Napolitano says that there is an urgent need for better cybersecurity legislation to avoid a cyber 9/11.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

Twitter Help Center | Keeping Your Account Secure

Twitter Help Center | Keeping Your Account Secure | Mercado seguridad TIC | Scoop.it
Twitter is without a doubt the best way to share and discover what is happening right now.

 

 

 

 

We want Twitter to be a safe and open community. This help page provides some information and tips to help you practice safe Tweeting and keep your account secure.

 

Here are some basics:

 

- Use a strong password.

 

- Watch out for suspicious links, and always make sure you’re on Twitter.com before you enter your login information.

 

- Don't give your username and password out to untrusted third-parties, especially those promising to get you followers or make you money.

 

- Make sure your computer and operating system is up-to-date with the most recent patches, upgrades, and anti-virus software.

 


Via Gust MEES
more...
Gust MEES's curator insight, January 27, 2013 3:58 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

 

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

 

Learn more:

 

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 27, 2013 4:06 PM

Even Twitter says what I am saying and what about my FREE courses are, BUT apparently NOBODY is reading it!

Teaching and Learning about Cyber-Security is a MUST in 21st Century!

Learn more:

https://gustmees.wordpress.com/2013/01/23/is-your-professional-development-up-to-date/

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

It's Time to Abandon Java | threatpost

It's Time to Abandon Java | threatpost | Mercado seguridad TIC | Scoop.it
The security vulnerabilities in Java make it difficult for users to continue using the browser plugin. Security researchers say it's time to get rid of Java altogether and only use it when it's absolutely required.

 

===> In the face of that kind of threat, the most rational course of action is to simply eliminate the target, and that means it's time to abandon Java for good. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, January 21, 2013 12:46 PM

===> In the face of that kind of threat, the most rational course of action is to simply eliminate the target, and that means it's time to abandon Java for good. <===

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: Underground Economy and Cyber Crime - Exposed

Infographic: Underground Economy and Cyber Crime - Exposed | Mercado seguridad TIC | Scoop.it
Get Cyber Safe Blog

Via Gust MEES
more...
Gust MEES's curator insight, January 14, 2013 12:44 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Gust MEES's curator insight, January 14, 2013 12:50 AM

A MUST know...

 

Learning the basics of Cyber-Security is ALSO a MUST in 21st Century! Education should follow this and teaching it up from the early age as nearly anyone is Online today!

 

It is actually very easy, so don't fear about, and check my FREE courses to find out and to help protecting the kids worldwide:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

The "Practice" is very easy to implement, YOU can do it in ONLY 1 week and less, it's ALL about the reflexes later to NOT forget it ;)

 

https://gustmees.wordpress.com

 

https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

When #Kids use Internet they MUST know the #dangers ===>  #InternetSafety ===> http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Internetsafety… and #protection ===>  #CyberSecurity ===> https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Security in 2013: The rise of mobile malware and fall of hacktivism | PCWorld

Security in 2013: The rise of mobile malware and fall of hacktivism | PCWorld | Mercado seguridad TIC | Scoop.it
McAfee makes some predictions about what to expect and trends to watch for security in 2013.

Via Gust MEES
more...
Gust MEES's curator insight, January 10, 2013 1:09 PM

                       ===> Be AWARE of the MALWARE! <===

Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

New Laws: Is it Really Up to the Government to Protect Your Kid Online?

New Laws: Is it Really Up to the Government to Protect Your Kid Online? | Mercado seguridad TIC | Scoop.it

A focus on child safety is among the top state laws taking effect at the start of 2013. In many states, new laws take effect on Jan. 1, 2013

 

Now It’s Your Turn

 

With all this new legislation, it should be a reminder that if the government is concerned about the safety of your kids online, you should be concerned too.

 

===> It is ultimately the parents’ responsibility to protect their children both off line and online. <===

 


Via Gust MEES
more...
Breanne Hemann's comment, April 12, 7:12 PM
I agree that some measures are needed to protect children from the harms that can come with the internet. However, I do believe there is only so much that the government can do before it begins to affect citizens freedom. How will these new laws affect internet users? Will it be a positive move on the governments part?
Lauren Heim's curator insight, May 7, 7:58 PM

I think this is a good and bad idea. I think it's by far an invasion of privacy but i also believe that it will save a lot of lives and that overrules invasion of privacy. So it's probably not a bad idea considering cyber bullying has only gotten worse.  

Abigail Beinborn's comment, May 8, 10:28 AM
I agree that this is a good idea for the government to keep children safe on the internet. People are becoming more violent and violating a lot of people's personal business on the internet. I believe that the internet is becoming more unsafe.
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes | Mercado seguridad TIC | Scoop.it
A screenshot of the fraudulent installer asking for a Mac user's phone number.

Time for Apple users to heed a lesson Windows users have long learned the hard way: Don’t hand out your cell phone number to untrusted applications downloaded from the Web.

On Tuesday, Russian antivirus firm Doctor Web reported the appearance of a new strain of Mac-focused malware that queries users for their cellphone number when they try to install a piece of legitimate software. If the user enters a phone number, he or she receives a text message asking for a reply with a registration code. Responding implicitly signs up the user for a series of recurring mobile charges to their carrier’s account.

Read more, a MUST:
http://www.forbes.com/sites/andygreenberg/2012/12/12/new-mac-malware-scams-users-into-signing-up-for-cellphone-charges/?utm_campaign=techtwittersf&amp;utm_source=twitter&amp;utm_medium=social

Via Gust MEES
more...
Gust MEES's curator insight, December 12, 2012 4:06 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;)

 


Gust MEES's curator insight, December 12, 2012 4:10 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;) 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Top 10 security experts to follow on Twitter

Top 10 security experts to follow on Twitter | Mercado seguridad TIC | Scoop.it
Pick of the bunch in the information security space...

 

A MUST read:

http://www.v3.co.uk/v3-uk/news/2097638/security-experts-follow-twitter

 


Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from Social Media and its influence
Scoop.it!

Facebook shuts down Albania Pirate Group, after stolen passwords shared

Facebook shuts down Albania Pirate Group, after stolen passwords shared | Mercado seguridad TIC | Scoop.it
The Albania Pirate Group has had its Facebook page shut down by the social network, after stolen passwords were exchanged between 600+ members.

Via Gust MEES
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Adobe Ships Election Day Security Update for Flash

Adobe Ships Election Day Security Update for Flash | Mercado seguridad TIC | Scoop.it

Adobe has released a critical security update for its Flash Player and Adobe AIR software that fixes at least seven dangerous vulnerabilities in these products.

 

===> Updates are available for Windows, Mac, Linux and Android systems. <===

 

Read more, a MUST and don't forget to update:

http://krebsonsecurity.com/2012/11/adobe-ships-election-day-security-update-for-flash/

 


Via Gust MEES
more...
No comment yet.