Sec Business
4.9K views | +0 today
Follow
Sec Business
#ciber seguridad. Infosec.  Seguridad TIC
Curated by Emilio
Your new post is loading...
Your new post is loading...
Scooped by Emilio
Scoop.it!

¿Gasolina cara?. Cambia el precio del surtidor. Es fácil XD

¿Gasolina cara?. Cambia el precio del surtidor. Es fácil XD | Sec Business | Scoop.it

Estamos a fin de mes, o a principios, da igual. El pasar por la gasolinera a llenar el depósito es algo que tenemos que hacer cada cierto tiempo. Siempre andamos cabreados con las subidas... Lo suyo sería poder cambiar el precio de la gasolina, en esta episodio vamos a aprender a hacerlo.

more...
No comment yet.
Scooped by Emilio
Scoop.it!

Hacked Cameras, DVRs Powered Today’s Massive Internet Outage — Krebs on Security

Hacked Cameras, DVRs Powered Today’s Massive Internet Outage — Krebs on Security | Sec Business | Scoop.it
A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.
Emilio's insight:
more...
No comment yet.
Scooped by Emilio
Scoop.it!

¿Cómo se cometió el ciberataque que tiró sitios como Twitter, Netflix y Spotify?

¿Cómo se cometió el ciberataque que tiró sitios como Twitter, Netflix y Spotify? | Sec Business | Scoop.it

¿Es posible que millones de cámaras, juguetes y otros electrodomésticos con conexión a la web te dejen sin poder entrar a tus sitios y redes preferidos en internet? Sí. Eso es lo que hizo un grupo de hackers durante el ciberataque de este viernes.

more...
No comment yet.
Scooped by Emilio
Scoop.it!

Por qué el área de seguridad no debería depender de TI

Por qué el área de seguridad no debería depender de TI | Sec Business | Scoop.it
incluir al área de seguridad en TI no suele ser recomendado como una buena práctica, debido a que las actividades relacionadas con la protección de los activos y el negocio podrían representar un conflicto de interés si también son implementadas por las áreas de tecnología.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Bulgaria passes Law that mandates Government Software must be Open Source

Bulgaria passes Law that mandates Government Software must be Open Source | Sec Business | Scoop.it
The Bulgarian Parliament has passed legislative amendments to its Electronic Governance Act that require all software written for the country's government to be fully open-sourced and developed in the public Github repository.
more...
No comment yet.
Rescooped by Emilio from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Drones – A hacker’s playground

Drones – A hacker’s playground | Sec Business | Scoop.it
Unmanned Aerial Vehicles (UAVs) offer new perspectives, both from a civilian and a military standpoint; yet, they present vulnerabilities having the potential to lead to disastrous consequences regarding public safety if exploited successfully, as evidenced by recent hacks. These repercussions can be prevented by implementing best practices, continuously assessing the technologies used and most importantly…

Via Constantin Ionel Milos / Milos Constantin
more...
Ken Feltman's curator insight, June 28, 11:45 AM
Drones and hackers: A deadly combination?
Scooped by Emilio
Scoop.it!

Intel podría desprenderse de su división de seguridad, la antigua McAfee 

Intel podría desprenderse de su división de seguridad, la antigua McAfee  | Sec Business | Scoop.it
En el marco de la profunda reestructuración que está llevando a cabo la empresa, Intel Security podría salir a la venta por un valor que superaría los 7.700
more...
No comment yet.
Scooped by Emilio
Scoop.it!

phishing attacks on the rise

phishing attacks on the rise | Sec Business | Scoop.it
There has been a notable escalation in phishing attacks in 2016, according to a new report from the Anti-Phishing Working Group (APWG). It noted that there have been more phishing attacks during the the first quarter of this year, “than at any other time in history”
more...
No comment yet.
Scooped by Emilio
Scoop.it!

10 security Ted Talks you can’t miss

10 security Ted Talks you can’t miss | Sec Business | Scoop.it

We know you’re busy, that’s why we invested the time to find you the 10 Security TED talks that you really can’t miss. These talks tackle some of the biggest security challenges of our time. We think you’ll be better for having taken the time to listen and consider their messages

more...
No comment yet.
Scooped by Emilio
Scoop.it!

What is the actual value of a CISO? - Help Net Security

What is the actual value of a CISO? - Help Net Security | Sec Business | Scoop.it
The problem with this is that if companies are unaware of their losses or underestimate their vulnerability, they will underestimate risk.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

How Russian cybercrime bosses crafted a ransomware empire out of an economic crisis

How Russian cybercrime bosses crafted a ransomware empire out of an economic crisis | Sec Business | Scoop.it
A new report details an organized deep web-based Russian ransomware campaign which has targeted thousands of corporations, from hospitals to hotels, and netted ringleaders exorbitant salaries.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

All the World's a Chess Board, & All Security Pros Merely Pieces

All the World's a Chess Board, & All Security Pros Merely Pieces | Sec Business | Scoop.it
Information security is a lot like chess. On the macro level, the security field is divided between the black hats and the white hats, just as a chessboard is split between black and white pieces. Those groups compete against one another using a combination of offensive and defensive tactics
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Context is Key to Identity and Access Management When Securing a Mobile Workforce - Information Security Buzz

Currently, we take a binary approach to IAM, where access is granted or denied, and it’s no longer sufficient.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Botnet Mirai: Internet de las Cosas está "destruyendo" Internet

Botnet Mirai: Internet de las Cosas está "destruyendo" Internet | Sec Business | Scoop.it
Una botnet masiva de dispositivos asociados a Internet de las Cosas (IoT) hackeados se ha visto implicada en uno de los ataque de DDoS má
Emilio's insight:
more...
No comment yet.
Scooped by Emilio
Scoop.it!

El ciberataque sufrido por Estados Unidos revela su vulnerabilidad digital

El ciberataque sufrido por Estados Unidos revela su vulnerabilidad digital | Sec Business | Scoop.it

No ha sido un ataque más. La creciente sofisticación de los hackers en sus asaltos al sistema ha disparado la alarma entre los investigadores y las compañías afectadas. Los expertos alertan de un riesgo de caída total del sistema.

Emilio's insight:
more...
No comment yet.
Rescooped by Emilio from Cybersafe
Scoop.it!

These Maps Show What the Dark Web Looks Like

These Maps Show What the Dark Web Looks Like | Sec Business | Scoop.it
New research traces the relationships between a load of Tor hidden services, and shows that many dark web sites are more intimately intertwined than commonly thought.

Via Ángel G. de Ágreda
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Researchers Figure Out How to Detect Malware in Encrypted Traffic

Researchers Figure Out How to Detect Malware in Encrypted Traffic | Sec Business | Scoop.it
Now, researchers from Cisco claim that encrypted traffic can give away enough tell-tale signs for them to figure out if it's related to certain pieces of known malware, without the need to decrypt it
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Siete de cada diez empresas sufren el robo de datos por parte de sus empleados.

Siete de cada diez empresas sufren el robo de datos por parte de sus empleados. | Sec Business | Scoop.it

Según un informe de Accenture, el robo interno de datos (48%) preocupa más que las infecciones de malware (42%) a las compañías.

more...
No comment yet.
Scooped by Emilio
Scoop.it!

How MDM software exposes your personal data - Help Net Security

How MDM software exposes your personal data - Help Net Security | Sec Business | Scoop.it
Discover how MDM software could be misused, and how to assess the true extent of access employers have to personal data and user behavior.
more...
No comment yet.
Scooped by Emilio
Scoop.it!

The next generación SOC - SOC 3.0 is a strategy as much as a technology

The next generación SOC - SOC 3.0 is a strategy as much as a technology | Sec Business | Scoop.it
The next generation SOC – or SOC 3.0 – is a strategy as much as a technology in that it qualifies issues and alerts according to their relevance to the business. Events are still captured and flagged but now the data is being scruntinized, sifted and segmented according to criteria specific to the business
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain | ENDGAME

Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain | ENDGAME | Sec Business | Scoop.it

Endgame's research on the latest variant of TeslaCrypt - 4.1A - demonstrates that ransomware not only is becoming more widespread, but it is also becoming more sophisticated and adaptable. TeslaCrypt 4.1A is only a week old and contains an even greater variety of stealth and obfuscation techniques than its previous variants.

more...
No comment yet.
Scooped by Emilio
Scoop.it!

Conoce esta recopilación de todos los Ransomware que han aparecido, ideal para sysadmins

Conoce esta recopilación de todos los Ransomware que han aparecido, ideal para sysadmins | Sec Business | Scoop.it
Recopilación de todos los ransomware que han aparecido, podrás ver el nombre, si existe forma de descifrarlo y la extensión de los archivos cifrados
more...
No comment yet.
Scooped by Emilio
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Sec Business | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
more...
No comment yet.
Rescooped by Emilio from Informática Forense
Scoop.it!

Se identifican 227.000 nuevas muestras de ‘malware’ cada día en el primer trimestre del año

Se identifican 227.000 nuevas muestras de ‘malware’ cada día en el primer trimestre del año | Sec Business | Scoop.it
Los datos del Informe trimestral de PandaLabs, que se dio a conocer a principios del mes de mayo, muestra que se han detectado 227.000 muestras de malware cada día, 2.000 más que en el mismo trimestre del año pasado.

Los troyanos, con el 66,81 por ciento, siguen siendo la opción preferida por los ciberdelincuentes, destacando el incremento de ataques de malware tipo ransomware por lo lucrativos que resultan para los atacantes. Los virus (15,98 por ciento), gusanos (11,01 por ciento), PUPs (4,22 por ciento) y Aware/Spyware, con un 1,98 por ciento, siguen a los troyanos en la clasificación.

Via Javier Pagès López
more...
No comment yet.