Month: February 2019

SecuritySophos

Una vulnerabilidad de seguridad en 5G, 4G y 3G podría exponer la localización de los usuarios

Credit to Author: Naked Security| Date: Tue, 05 Feb 2019 12:37:57 +0000

Las comprobaciones de las redes inalámbricas de quinta generación (5G) acaban de comenzar y ya hay especialistas que dicen haber encontrado nuevas debilidades en el protocolo que debería asegurarlas. La seguridad 5G se construye sobre AKA 5G (Authentication and Key Agreement), una versión mejorada del protocolo AKA ya en uso para las redes 3G y [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/SIFdCiL1Kfk” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

¡Actualiza ya! Chrome y Firefox solucionan problemas de seguridad

Credit to Author: Naked Security| Date: Mon, 04 Feb 2019 15:38:09 +0000

Nos encontramos ante la primera actualización de navegadores con tanto Google y Mozilla solucionando vulnerabilidades de seguridad tanto en Chrome y Firefox para Mac, Windows, y Linux. Pero en cuanto a la seguridad de Chrome de su versión 72, se trata más de lo que se ha quitado de lo que se ha añadido. Uno [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/EUY2DVW6a8k” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Como secuestraron mi cuenta de Instagram

Credit to Author: Naked Security| Date: Fri, 01 Feb 2019 09:22:53 +0000

De vez en cuando recibo una solicitud de amistad en las redes sociales de atractivas mujeres con poses sugerentes como foto de perfil. No estoy presumiendo de esto, la persona detrás de esa cuenta muy probablemente no se parezca a la de la foto. Muchas veces son cuentas secuestradas usadas por los ciberdelincuentes para explotar [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/2KemjORR_qU” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Matrix, el nuevo ransomware dirigido exige rescates por valor de 2.500 euros

Credit to Author: Sophos Iberia| Date: Thu, 31 Jan 2019 11:16:43 +0000

La ciberdelincuencia está evolucionando. Se ha sustituido el bot que producía los devastadores ataques masivos de ransomware como WannaCry o NotPetya por los ciberataques personalizados que hace seguimiento a las víctimas. Tras el aumento de este número de ataques en 2018, que alcanzaron popularidad gracias al éxito económico de SamSam, BitPaymer y Dharma, Sophos, líder [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/0YnROfSDKdI” height=”1″ width=”1″ alt=””/>

Read More
SecurityTrendMicro

Trend Micro Security’s 2019 Release Protects You Better Than Ever Against Ransomware, Coin-mining, Banking, and E-Commerce Threats

Credit to Author: Trend Micro| Date: Thu, 07 Feb 2019 13:00:15 +0000

2019 has barely gotten started, but by Q4 of 2018 Trend Micro had already seen a 956% increase in coin-mining malware detections for the year-to-date—right alongside the persistent threat of ransomware and online banking and e-commerce hacks designed to steal your identity or your money. Folks can take heart, however, with the latest release of…

The post Trend Micro Security’s 2019 Release Protects You Better Than Ever Against Ransomware, Coin-mining, Banking, and E-Commerce Threats appeared first on .

Read More
ComputerWorldIndependent

Why Apple is disabling Safari’s Do Not Track feature

Credit to Author: Jonny Evans| Date: Thu, 07 Feb 2019 03:34:00 -0800

Apple takes privacy very seriously. It takes its leadership in that care seriously, and getting rid of the voluntary ‘Do Not Track’ setting in its Safari browser is the right decision.

Why disabling Safari’s Do Not Track feature is the right thing to do

Apple introduced support for Do Not Track (DNT) in iOS 7, but removed the feature in Safari 12.1.

The problem with DNT is that the signal it sends to websites, analytics firms, plug-in makers and ad networks is a voluntary request, and can be ignored.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Throwback Thursday: Pick a card, any card …

Credit to Author: Sharky| Date: Thu, 07 Feb 2019 03:00:00 -0800

This conglomerate is structured as several smaller companies, with a big central IT organization plus individual IT groups in some of the companies, reports an IT pilot fish there.

“An IT staffer from one of the companies loaded a password cracker and proceeded to crack the Windows NT servers,” fish says. “He sent out emails bragging about how insecure NT was and giving the NT team a hard time.”

Fish isn’t on the NT team, but he and his security co-workers decide to strike back on behalf of their colleagues — and they do it through the central IT audit group, to make sure it’s all above board.

First, they supply the audit people with a list of more than 100 Unix servers, and get them to pick a server at random. Amazingly, the audit group picks the only server on the list that belongs to the company where the NT attack originated.

To read this article in full, please click here

Read More