logoSign upLog in
Buzzes
  1. ProducerbeBee in English
    Tips to Create a Snooper-Proof Password
    Tips to Create a Snooper-Proof PasswordOnline security is a very important issue to which we don’t usually grant the importance that it deserves. You might think you don’t have important information on the Internet but, what would happen if someone accessed your online bank account or...
    Relevant
  2. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #IoT, #Malware
    Jaime Contreras
    Researchers Find Fresh Fodder for IoT Attack Cannons — Krebs on Security
    krebsonsecurity.com
    Relevant
  3. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #CyberSec
    Jaime Contreras
    'Cybersecurity has become a full-time job' in healthcare - MedCity News
    medcitynews.com 2016 has been another rotten year for cybersecurity, How can healthcare catch...
    Relevant
  4. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #CyberSec
    Jaime Contreras
    Advancing the science of cybersecurity | NSF - National Science Foundation
    www.nsf.gov NSF's mission is to advance the progress of science, a mission accomplished by funding proposals for research and education made by scientists, engineers, and educators from across the...
    Relevant
  5. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #InfoSec, #RiskManagement
    Jaime Contreras
    CISO Cris Ewell on Overcoming Risk Management Challenges
    www.careersinfosecurity.com Why is risk management so difficult for so many healthcare organizations? Cris Ewell, CISO at University of Washington Medicine, offers insights in this...
    Relevant
  6. Jaime Contreras

    Jaime Contreras

    03/12/2016
    #Ransomware
    Jaime Contreras
    Beware: Scalable Vector Graphics Files Are A New Ransomware Threat - Dark Reading
    www.darkreading.com SVG files offer many advantages as far as graphics go, but hackers looking to embed malware on websites can exploit...
    Relevant
  7. Jaime Contreras

    Jaime Contreras

    03/12/2016
    #InfoSec
    Jaime Contreras
    Compliance doesn't equal security, but it sure does help
    www.scmagazine.com Imagine using faulty information in creating a building design or developing a product or running a political campaign or formulating a new...
    Relevant
  8. Jaime Contreras

    Jaime Contreras

    03/12/2016
    #Malware
    Jaime Contreras
    Tech support scammers up their game with ransomware (UPDATED)
    blog.malwarebytes.com Ransomware is so popular that even tech support scammers have eventually adopted it. Now the ransom note asks you to call 'Microsoft' to get your encrypted files...
    Relevant
  9. Jaime Contreras

    Jaime Contreras

    02/12/2016
    #CloudSec, #IoT
    Jaime Contreras
    ​Cloud Security and IoT Security to dominate coming years, says Intel Report
    cyware.com Intel Security has come out with its report titled “McAfee Labs 2017 Threats Predictions Report”. The report speaks about threat trends that would be observed in the upcoming year 2017. The trends include ransomware attacks, privacy concerns,...
    Relevant
  10. Jack Elmore

    Jack Elmore

    30/11/2016
    To be Effective, Security Needs to Play Well with Others via @CiscoSecurity | | #Cisco #NetworkSecurity
    Jack Elmore
    To be Effective, Security Needs to Play Well with Others
    blogs.cisco.com
    Relevant
  11. Jaime Contreras

    Jaime Contreras

    29/11/2016
    #CyberSec
    Jaime Contreras
    In Opinion: John McAfee claims cyber defence is decades behind weaponized software
    www.newsweek.com Cybersecurity pioneer John McAfee says only a fool would think there is effective cyber...
    Relevant
  12. Jaime Contreras

    Jaime Contreras

    29/11/2016
    #Ransomware
    Jaime Contreras
    Ransomware Result: Free Ticket to Ride in San Francisco
    www.bankinfosecurity.com A ransomware attack against San Francisco's Muni public transportation network attack over the busy Thanksgiving holiday - and Black Friday shopping - weekend...
    Relevant
  13. ProducerPaolo Perego

    Paolo Perego

    29/11/2016
    Racconti da codemotion
    Racconti da codemotionVenerdì, mentre vi ammazzavate di reload sulla pagina di Amazon per il black friday, ho fatto il mio ultimo talk, per il 2016, a Codemotion.Lasciatemi dire che è stato un bellissimo evento, un sacco di pubblico, molte startup e grandi nomi tra...
    Relevant

    Comments

    Michele Basile
    30/11/2016 #1 Anonymous
    Molto interessante leggere la tua esperienza.
  14. Jaime Contreras

    Jaime Contreras

    22/11/2016
    #Malware
    Jaime Contreras
    Security Experts Call For Regulation On IoT Cybersecurity
    www.darkreading.com During a House Committee hearing today, Bruce Schneier also asks for the establishment of a new government agency devoted to...
    Relevant
  15. Jaime Contreras

    Jaime Contreras

    22/11/2016
    #Malware
    Jaime Contreras
    It's okay I'm on the list...trojan whitelists itself to stay connected to attackers
    www.scmagazine.com Authors of the Android.Fakebank.B malware developed a new trick whitelist itself on a users device to stay connected with the...
    Relevant
  16. Jaime Contreras

    Jaime Contreras

    21/11/2016
    #Linux, #InfoSec
    Jaime Contreras
    How to fix the Cryptsetup vulnerability in Linux - TechRepublic
    www.techrepublic.com A new vulnerability has been found to affect encrypted Debian and Ubuntu systems. Here's how to put a temporary fix on the Cryptsetup...
    Relevant
  17. Jaime Contreras

    Jaime Contreras

    21/11/2016
    #Ransomware
    Jaime Contreras
    This ransomware uses your social media profiles to personalise its demands | ZDNet
    www.zdnet.com Brazen desktop locker campaign uses social media info to make its threat more compelling to...
    Relevant
  18. Jaime Contreras

    Jaime Contreras

    21/11/2016
    #Ransomware
    Jaime Contreras
    New ransomware variant extorts your reputation rather than money
    www.scmagazine.com Researchers at security firm ProofPoint have discovered a new variant of malware which triggers it's ransom screen once it finds indecent...
    Relevant
  19. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec
    Jaime Contreras
    €350bn cyber crimewave to become a tsunami as high-tech heists soar - Independent.ie
    www.independent.ie High-tech heists are costing businesses worldwide €350bn a year and a cyber crimewave is hitting...
    Relevant

    Comments

    Kevin Baker
    18/11/2016 #1 Kevin Baker
    To eliminate the majority of these problems IT should incorporate one way encryption logins
  20. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec, #AI
    Jaime Contreras
    Artificial intelligence and cybersecurity: The future is here | Microsoft Secure Blog
    blogs.microsoft.com
    Relevant
  21. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec
    Jaime Contreras
    The next big hacking threat is already happening—you just can’t see it
    qz.com Cyberattacks are the norm at power plants, factories, and...
    Relevant
  22. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #Malware
    Jaime Contreras
    This malware attack starts with a fake customer-service call
    www.networkworld.com Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email...
    Relevant
  23. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #BreachNews
    Jaime Contreras
    Biggest hack of 2016: 412 million FriendFinder Networks accounts exposed
    computerworld.com 412,214,295 user accounts were exposed after Friend Finder Networks were hacked; the breach included 20 years of customer data from six compromised databases: Adultfriendfinder.com, Cams.com, Penthouse.com, Stripshow.com. iCams.com and an unknown...
    Relevant
  24. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec
    Jaime Contreras
    White House tweaks incident reporting in FISMA memo -- FCW
    fcw.com Agencies get an updated definition of a cyber incident in a recent Federal Information Security Modernization Act...
    Relevant
  25. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #Malware
    Jaime Contreras
    Study finds malware lurking in Amazon, Google and Groupon cloud services
    www.scmagazineuk.com A recent study detected more than 600 cloud repositories hosting malware and other malicious activities on major cloud...
    Relevant
See all