logoSign upLog in
Buzzes
  1. Jaime Contreras

    Jaime Contreras

    18/01/2017
    #CyberSec
    Jaime Contreras
    Top 12 cyber security predictions for 2017
    www.slideshare.net What does cyber security have in store for us in 2017? Experts predict that we may see increased attacks while some say more companies will go on the...
    Relevant
  2. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Phishing
    Jaime Contreras
    Credit Card Data and Other Information Targeted in Netflix Phishing Campaign « Threat Research Blog
    www.fireeye.com FireEye Labs discovered a phishing campaign in the wild that is targeting primarily U.S.-based Netflix...
    Relevant
  3. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #BreachNews
    threatpost.com A database of 3.3 million Hello Kitty users tied to a 2015 breach surfaced over the weekend exposing thousands of minors to potential credential...
    Relevant
  4. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Malware
    Jaime Contreras
    Deadly KillDisk malware: Now in Linux
    www.scmagazine.com The notorious KillDisk malware is back, this time arriving as a Linux...
    Relevant
  5. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Ransomware
    Jaime Contreras
    MongoDB Ransomware Impacts Over 10,000 Databases
    www.eweek.com MongoDB database deployments are being attacked by multiple groups of attackers, that are encrypting data and demanding a ransom from...
    Relevant
  6. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #RiskManagement, #InfoSec
    Jaime Contreras
    The trouble with third-party security assessments
    www.csoonline.com If you let one customer perform security tests against your applications and network, you let yourself in for a lot of...
    Relevant
  7. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #CyberSec
    Jaime Contreras
    Defensive regression in cybersecurity
    www.csoonline.com There has been a lot of talk lately about defensive regression in cybersecurity. But what exactly is defensive regression? It's not the regression that Sigmund Freud talks about, although there are plenty of folks that don't act like adults in our...
    Relevant
  8. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #CyberSec
    Jaime Contreras
    2017: The year of cybersecurity scale
    www.networkworld.com Cloud, IoT, mobile and digital transformation will place new demands on usability, scalability and enterprise-class features of cybersecurity analytics and operations...
    Relevant
  9. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Malware
    Jaime Contreras
    Memory-Resident Malware Creating Forensics Challenges
    www.careersinfosecurity.com Because cyberattackers are now using memory-resident malware that leave no trace on the disk, forensics experts using traditional methods will face a...
    Relevant
  10. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #InfoSec
    Jaime Contreras
    Self-defense: Training your network to defend itself
    www.securityinfowatch.com Software programs that evolve after deployment to match wits with hackers and mitigate new threats goes beyond science...
    Relevant
  11. Kevin Mitnick

    Kevin Mitnick

    12/01/2017
    An Ultimate Guide To Understanding Extended Validation Digital Certificate
    Kevin Mitnick
    An Ultimate Guide To Understanding Extended Validation Digital Certificate
    medium.com Extended Validation SSL Certificate deliver’s industry’s highest level of trust and...
    Relevant
  12. Jaime Contreras

    Jaime Contreras

    11/01/2017
    #InfoSec
    Jaime Contreras
    C-suiters: Keep an eye on these technologies in 2017 | FierceHealthcare
    www.fiercehealthcare.com From Pepper, the emotional interactive robot, to the new da Vinci Xi Integrated Table Motion, ECRI Institute highlights 10 healthcare technologies C-suiters should keep an eye on in 2017. The organization's annual watch list outlines technologies...
    Relevant
  13. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    DDoS-for-hire services thrive despite closure of major marketplace
    www.itworld.com The closure of a major online marketplace for paid distributed denial-of-service attacks may have done little to slowdown the illegal activities from taking...
    Relevant
  14. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Ransomware
    Jaime Contreras
    This ransomware targets HR departments with fake job applications | ZDNet
    www.zdnet.com Campaign targets those who most often need to open attachments from unknown...
    Relevant
  15. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #MobileSec
    Jaime Contreras
    Data: More vulnerabilities found in Google Android than any other program in 2016
    www.scmagazine.com Amassing 523 distinct coding flaws this past year, Google's Android mobile operating system took top spot among the 50 products with the most discovered vulnerabilities in 2016, according to the security vulnerability database website CVE...
    Relevant
  16. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    Cloudmark Security Predictions for 2017
    blog.cloudmark.com The Internet of Things will be an ever-increasing threat. We have already seen massive botnets of home routers and security cameras used for devastating DDoS attacks such as the one on Dyn. The...
    Relevant
  17. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #IoT, #InfoSec
    Jaime Contreras
    IoT: The Need to Expand the Scope of Security
    www.careersinfosecurity.com To deal with the risks posed by the explosive growth of the internet of things, CISOs and CIOs must expand the scope of their security efforts, says...
    Relevant
  18. ProducerCristian 🐝 Randieri, PhD Founder & CEO of Intellisystem.it   Randieri.com
    IT-SH161-IR INFRARED ILLUMINATOR - Intellisystem Technologies - www.intellisystem.it
    IT-SH161-IR INFRARED ILLUMINATOR - Intellisystem Technologies - www.intellisystem.itWith 16 pieces 2W dot-matrix power IR LED, Wavelength: 740nm / 850nm / 940nm, Beam angle: 15° to 120°,Beam distance: 150m to 30m (850nm), the IT-SH161-IR Infrared Illuminator deliver high power infrared light for CCTV & IP camera at night time...
    Relevant

    Comments

    Riccardo Marciani
    11/01/2017 #3 Riccardo Marciani
    #2 They are UNuseful terms, and he repeat always the same article changing some word on the title... It means is SPAM!
    Clelia Rizza
    10/01/2017 #2 Clelia Rizza
    #1 I don't think it is spamming....
    Riccardo Marciani
    10/01/2017 #1 Riccardo Marciani
    Visto che questo utente ha cancellato l'articolo in cui avevo espresso il mio dissenso nei confronti del suo SPAM, mi ripeto in tutti i suoi articoli con questo messaggio!

    Basta Spammare!!!
  19. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    Why soft skills outweigh hard skills for IT-business collaboration
    www.computerworld.com There's a growing demand for more cross-collaboration with IT and other departments, which means IT workers not only need technical skills, but also the soft skills to serve as the authority on...
    Relevant
  20. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Privacy, #CyberSec
    Defending Our Privacy—A True Story
    www.isaca.org
    Relevant
  21. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Privacy, #IAPP
    Jaime Contreras
    Global News Roundup — 2017 legislative predictions
    iapp.org
    Relevant
  22. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #CyberSec
    Jaime Contreras
    Sophos cautions firms against increased cybercrimes menace
    guardian.ng Sophos Group, a security software and hardware company, has called on organisations to prepare adequately well against possible attacks from cybercriminals in...
    Relevant
  23. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Malware
    Jaime Contreras
    Hackers have a new way to steal your banking login using WhatsApp
    bgr.com Hackers are targeting unsuspecting users with a new type of mobile virus that spreads through legitimate-looking word documents sent via WhatsApp, which could then steal sensitive information from...
    Relevant
  24. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    Hate 'contact us' forms? This PHPmailer zero day will drop shell in sender
    www.theregister.co.uk Borked patch opens remote code execution on web...
    Relevant
  25. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Phishing
    Jaime Contreras
    Criminals phish credit card numbers with 'Twitter verification' scam
    www.scmagazine.com Criminals are targeting users on Twitter purporting to offer verified account status but instead taking over their accounts, according to...
    Relevant
See all