Ciberseguridad + Inteligencia
17.4K views | +1 today
Follow
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Scooped by Elisa Vivancos
Scoop.it!

98 cosas que Facebook sabe de ti (y que usa para mostrarte publicidad relevante)

98 cosas que Facebook sabe de ti (y que usa para mostrarte publicidad relevante) | Ciberseguridad + Inteligencia | Scoop.it
Facebook abre una nueva sección donde explica cómo funciona su plataforma de anuncios (y de dónde saca la información de su
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Inside ‘The Attack That Almost Broke the Internet’ — Krebs on Security

Inside ‘The Attack That Almost Broke the Internet’ — Krebs on Security | Ciberseguridad + Inteligencia | Scoop.it
Krijg een kijkje in de keuken bij een van de grootste aanvallen op het internet https://t.co/tE9ZJsbD1v
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

10 Sea-Changing IT Security Trends Of The Last 10 Years

10 Sea-Changing IT Security Trends Of The Last 10 Years | Ciberseguridad + Inteligencia | Scoop.it
A look at ten trends that have shaped and changed the way security departments -- and enterprise businesses -- approach their cyber strategies over the last decade.
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Should cyber insurance become compulsory for UK businesses?

Here's why the threat of cyber attacks has paved the way for certain measures to be taken against them. Cyber attacks affecting businesses are on the rise.
Via Roger Smith
more...
Roger Smith's curator insight, June 6, 2016 5:56 AM

Unless you resolve the issues of business protection and manage the risks associated with the digital world cyber insurance is an unneccasary cost with no chance of recovering the investment.


busness security has to com from addressing the risks and mitigating them, then take out insurance.

Scooped by Elisa Vivancos
Scoop.it!

The Snowden Effect: Privacy Is Good For Business

The Snowden Effect: Privacy Is Good For Business | Ciberseguridad + Inteligencia | Scoop.it
Tech companies didn't look so good when Edward Snowden revealed they were helping governments spy on average people. But the revelations have worked in the industry's favor.
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Ciberseguridad + Inteligencia | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
Via Roger Smith
more...
Roger Smith's curator insight, June 3, 2016 5:42 AM

Business security is no longer about building a wall to keep the bad guys out it is more about understanding where the next attack will come from with risk analisys and education.

F24 Group's curator insight, June 4, 2016 6:00 PM

Este es un tema que va a quedarse un largo tiempo entre nosotros porque está claro que las personas somos el punto más vulnerable en ciberseguridad. Los responsables de Continuidad o de Seguridad IT, que han sensibilizado sobre las buenas prácticas que no pongan en riesgo a la empresa, ahora deben entrenar a los empleados frente a técnicas de "ingeniería social" y comportamiento. ¡Vaya reto!

Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave

Análisis | ¿Qué narices es un “delegado de Protección de Datos”? 7 preguntas clave | Ciberseguridad + Inteligencia | Scoop.it
“Empresas y administraciones públicas deben tener esta figura regulada.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea

20 recursos para trabajar la protección de privacidad en el #DíaDeInternet - Inevery Crea | Ciberseguridad + Inteligencia | Scoop.it
“Estamos celebrando el Día de Internet, por ello compartimos contigo, estos recursos para trabajar el tema de la protección de la privacidad al navegar en la red. Explóralos! a) Desde la Agencia Española de Protección de DatosSitio Web: Tú decides en internet Un proyecto dirigido a conciencia”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

#Security: The Art of Searching for #OpenSource Intelligence #OSINT by @irfaanshakeel

#Security: The Art of Searching for #OpenSource Intelligence #OSINT by @irfaanshakeel | Ciberseguridad + Inteligencia | Scoop.it
“Irfan Shakeel”
Via Frederic GOUTH
more...
No comment yet.
Rescooped by Elisa Vivancos from Toungues Tied: NLP, Hypnosis and Mind Control
Scoop.it!

5 Social Engineering Attacks to Watch Out For

5 Social Engineering Attacks to Watch Out For | Ciberseguridad + Inteligencia | Scoop.it
“ Social engineers exploit the one weakness that is found in each and every organization: human psychology.”
Via JW
more...
No comment yet.
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

IoT Raises new Legal Challenges for Business

IoT Raises new Legal Challenges for Business | Ciberseguridad + Inteligencia | Scoop.it

Privacy, security, and data ownership issues surrounding Internet of Things devices are creating a host of new legal questions and problems. Here's what's happening now, and what you need to know.


Via TechinBiz
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | Ciberseguridad + Inteligencia | Scoop.it
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet

 


Via Gust MEES
more...
Gust MEES's curator insight, January 1, 2016 10:13 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Umberto Orefice's curator insight, January 2, 2016 4:09 PM

Good to know..

Dennis Swender's curator insight, March 13, 2016 2:07 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Scooped by Elisa Vivancos
Scoop.it!

This is the Doomsday plan for America if cyber attacks hit the grid

This is the Doomsday plan for America if cyber attacks hit the grid | Ciberseguridad + Inteligencia | Scoop.it

Dubbed Rapid Attack Detection, Isolation and Characterization (RADICS), the initiative's goal is to develop automated systems to deal with a loss of power.

more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

The Value of a Hacked Company — Krebs on Security

The Value of a Hacked Company — Krebs on Security | Ciberseguridad + Inteligencia | Scoop.it
Most organizations only grow in security maturity the hard way — that is, from the intense learning that takes place in the wake of a costly data breach. That may be because so few company leaders really grasp the centrality of computer and network security to the organization’s overall goals and productivity, [...]
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Dos ingenieros españoles descubren un error que permitía localizar a los usuarios de Tinder

Dos ingenieros españoles descubren un error que permitía localizar a los usuarios de Tinder | Ciberseguridad + Inteligencia | Scoop.it
El fallo revelaba la ubicación exacta de las personas que se daban match . La posición se actualizaba cuando abrían la app
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Rule 41: Bitcoiners, Torrenters, And TOR Users — FBI Can Catch You With A Single Warrant

Rule 41: Bitcoiners, Torrenters, And TOR Users — FBI Can Catch You With A Single Warrant | Ciberseguridad + Inteligencia | Scoop.it
Fossbytes is a technology news and tutorial website that covers security and hacker news, open source, Windows 10, Ubuntu, and programming languages.
Via Roger Smith
more...
Roger Smith's curator insight, June 12, 2016 4:29 AM

And who in political power will think this is a good idea.  Probably the ill informed, un educated members of congress.   


I hate cybercrime, but using a law to spy on their own public is criminal. 

Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Social media is giving cybercriminals a way around your IT-security defences

Social media is giving cybercriminals a way around your IT-security defences | Ciberseguridad + Inteligencia | Scoop.it
Forget scattershot malware attacks: today's cybercrims are using your social network against you – and it's working
Via Roger Smith
more...
Roger Smith's curator insight, June 3, 2016 5:42 AM

Business security is no longer about building a wall to keep the bad guys out it is more about understanding where the next attack will come from with risk analisys and education.

F24 Group's curator insight, June 4, 2016 6:00 PM

Este es un tema que va a quedarse un largo tiempo entre nosotros porque está claro que las personas somos el punto más vulnerable en ciberseguridad. Los responsables de Continuidad o de Seguridad IT, que han sensibilizado sobre las buenas prácticas que no pongan en riesgo a la empresa, ahora deben entrenar a los empleados frente a técnicas de "ingeniería social" y comportamiento. ¡Vaya reto!

Rescooped by Elisa Vivancos from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

On the Limits of Information # Flow #Techniques for #Malware  #Analysis and Containment

On the Limits of Information # Flow #Techniques for #Malware  #Analysis and Containment | Ciberseguridad + Inteligencia | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

Infografía - Reglamento de protección de datos - Consilium

Infografía - Reglamento de protección de datos - Consilium | Ciberseguridad + Inteligencia | Scoop.it
“La UE está elaborando un nuevo reglamento que actualiza y moderniza la protección de datos personales.”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #TRIC para los de LETRAS
Scoop.it!

¿Por qué me vigilan si no soy nadie? – Marta Peirano

¿Por qué me vigilan si no soy nadie? – Marta Peirano | Ciberseguridad + Inteligencia | Scoop.it
“El pasado 8 de marzo se emitió la entrevista realizada a Edward Snowden, @Snowden por Ana Pastor, en el programa El Objetivo. Intento seguir las entrevistas que realiza Ed Snowden ya que las considero interesante escuchar a una de las pocas personas que ha puesto en jaque al gobierno de los EEUU. Ayer, por fin, hice…”
Via Sonia C. Alonso
more...
No comment yet.
Rescooped by Elisa Vivancos from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat

#Sécurité: #Torsploit – Un #Malware anti - #Tor développé pour le #FBI pour détruire l’#anonymat | Ciberseguridad + Inteligencia | Scoop.it
“Selon une récente enquête, Matthew Edman, un expert en cyber-sécurité et ancien employé du projet Tor, aurait aidé le FBI pour le développement de Torsploit, un malware qui a permis de pirater et de démasquer les utilisateurs de Tor, notamment lors des opérations Torpedo et Silk Road.”
Via Frederic GOUTH
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

UCO: A Unified Cybersecurity Ontology

Elisa Vivancos's insight:
A common language for Cybersecurity.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Anti-virus products, security devices affected by 7-Zip flaws

Anti-virus products, security devices affected by 7-Zip flaws | Ciberseguridad + Inteligencia | Scoop.it
Researchers have uncovered two vulnerabilities in 7-Zip that leave various security devices and anti-virus products vulnerable to attack.
more...
No comment yet.
Rescooped by Elisa Vivancos from Identidad Digital
Scoop.it!

Has your sleeping baby been indexed by this search engine?

Has your sleeping baby been indexed by this search engine? | Ciberseguridad + Inteligencia | Scoop.it
Shodan calls itself the world's first search engine for internet-connected devices. The top 3 searches: "webcam", "cams" and "netcam".

Via Emilio
more...
Scooped by Elisa Vivancos
Scoop.it!

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología | Ciberseguridad + Inteligencia | Scoop.it

Cómo el ransomware se está convirtiendo en la mayor amenaza de internet. Noticias de Tecnología.

more...
No comment yet.