Ciberseguridad + Inteligencia
17.5K views | +0 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited

A MUST READ to understand about CyberSecurity! | The Scrap Value of a Hacked PC, Revisited | Ciberseguridad + Inteligencia | Scoop.it

Brian KREBS @briankrebs (Twitter)

 

A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.

 

I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.

 

Learn more:

 

https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 


Via Gust MEES
more...
Gust MEES's curator insight, August 16, 2015 12:22 PM

Brian KREBS @briankrebs (Twitter)


A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer user who can’t begin to fathom why miscreants would want to hack into his PC. “I don’t bank online, I don’t store sensitive information on my machine! I only use it to check email. What could hackers possibly want with this hunk of junk?,” are all common refrains from this type of user.


I recently updated the graphic (below) to include some of the increasingly prevalent malicious uses for hacked PCs, including hostage attacks — such as ransomware — and reputation hijacking on social networking forums.


Learn more:


https://gustmees.wordpress.com/2013/10/25/cyber-security-blogs-to-follow/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy

Metadata Can Expose Person’s Identity Even Without Name | MIT Research | Privacy | Ciberseguridad + Inteligencia | Scoop.it
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.

 

Learn more:

 

https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/

 


Via Gust MEES
more...
Gust MEES's curator insight, January 30, 2015 3:32 PM
Shopping habits can expose a person’s identity even when he or she is a nameless customer in a database of anonymous credit-card records, according to a study that shows the power of so-called metadata to circumvent privacy protections.


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Simda botnet taken down in global operation

Simda botnet taken down in global operation | Ciberseguridad + Inteligencia | Scoop.it

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.

 

In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.

 

The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.

 

Learn more: 

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

 

 

 


Via Gust MEES
more...
Gust MEES's curator insight, April 13, 2015 8:17 AM

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

It's Only the Beginning: The Internet R.I.P. (Mikko Hypponen) - YouTube

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.

Via Gust MEES
more...
Polly A. Sheppard's curator insight, January 23, 2015 6:00 PM

This really gives you something to think about!

Lynnette Van Dyke's curator insight, April 1, 2016 8:41 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.


Lynnette Van Dyke's curator insight, April 1, 2016 8:42 PM

It's only the beginning - Security expert Mikko Hypponen warns about the monster we have created with our connected world.