Noticias y Alertas
Header

Author Archives: kwelladm

2014: Resumen Ciberdefensa

enero 13th, 2015 | Posted by kwelladm in Ciberguerra - (0 Comments)

Este es un resumen centrado en los acontecimientos más relevantes en el mundo de la Ciberdefensa. Este año nos dejó un importante aumento de actividad relacionada con el Ámbito de la Ciberdefensa. Especialmente en cuanto a la proliferación de operaciones APT: ataques sofisticados de tipo estatal, con objetivos de espionaje empresarial, gubernamental y militar. (más…)

Lewis Morgan nos regala una buena lista de ciberataques y brechas, mes a mes durante 2014:

Enero

1 Enero, 2014 – 1.1 MILLION customers’ credit card data was swiped in Neiman Marcus breach
20 Enero, 2014 – Credit Card Details of 20 Million South Koreans Stolen
21 Enero, 2014 – Microsoft blog hacked by Syrian Electronic Army
24 Enero, 2014 – CNN website, Twitter and Facebook hijacked by Syrian Electronic Army
25 Enero, 2014 – Michaels Stores confirms payment card information compromised in breach
(más…)

El semanario alemán «Der Spiegel» ha publicado un extenso reportaje basado en nuevos documentos filtrados por Edward Snowden en el que señala que a la NSA (Agencia de Seguridad Nacional estadounidense) se le resisten varias combinaciones de protocolos de cifrado.

Muchas personas, desde que aparecieran las primeras revelaciones de Snowden, han asumido que la NSA puede vulnerar cualquier sistema, protocolo y programa protegido con cifrado que se le atraviese. Sin embargo, los nuevos documentos filtrados por el semanario alemán apuntan que la NSA no ha podido vulnerar combinaciones de protocolo en los últimos dos años. (más…)

Google Releases Chrome Extension for End-To-End Email EncryptionBack in june this year, Google announced an alpha Google Chrome extension called “End-to-End” for sending and receiving emails securely, in wake of former NSA contractor Edward Snowden’s revelations about the global surveillance conducted by the government law-enforcements.

Finally, the company has announced that it made the source code for its End-to-End Chrome extension open source via GitHub.

(más…)

Hacker Clones German Defense Minister's Fingerprint Using Just her PhotosHackers have already bypassed Apple’s fingerprint scanner using fake fingerprints, and now they have found a way to reproduce your fingerprints by using just a couple of photos of your fingers.

Special Fingerprint sensors have already been used by Apple and Samsung in their smartphones for authentication purposes and in near future fingerprints sensors are believed to be the part of plenty of other locked devices that can be unlocked using fingerprints, just to add an extra layer of authentication. But, How secure are your fingerprints?

(más…)

12 millones de routers en posible riesgo

enero 7th, 2015 | Posted by kwelladm in Noticias - (0 Comments)

Router Vulnerability Puts 12 Million Home and Business Routers at RiskMore than 12 million routers in homes and businesses around the world are vulnerable to a critical software bug that can be exploited by hackers to remotely monitor users’ traffic and take administrative control over the devices, from a variety of different manufacturers.

The critical vulnerability actually resides in web server “RomPager” made by a company known as AllegroSoft, which is typically embedded into the firmware of router , modems and other “gateway devices” from about every leading manufacturer. The HTTP server provides the web-based user-friendly interface for configuring the products.

(más…)

 Internet Authority ICANN Has Been HackedThe Internet Corporation for Assigned Names and Numbers (ICANN) has been hacked by unknown attackers that allowed them to gain administrative access to some of the organization’s systems, the organization confirmed.

The attackers used “spear phishing” campaign to target sensitive systems operated by ICANN and sent spoofed emails disguised as internal ICANN communications to its staff members. The link in the emails took the staff to bogus login page, where they provided their usernames and passwords with the keys to their work email accounts.

(más…)

Microsoft IE: otra “guasada”….

enero 5th, 2015 | Posted by kwelladm in Noticias - (0 Comments)

Microsoft Could Kill Internet Explorer, Microsoft Spartan browser Coming Soon

Bad News for Internet Explorer fans, if any! Microsoft’s almost 20 years old Web browser with a big blue E sign might soon be a thing of the past.
With the arrival of Windows 10, probably by next fall, Microsoft could come up with its brand new browser that’s more similar to Mozilla’s Firefox and Google’s Chrome, but less like Internet Explorer (IE), according to a recent report published by ZDNet.

(más…)

First time ever in the History, Apple Inc. has pushed out an automatic security update for Macintosh OS X computers to address a critical security issue that, according to the company, was too risky to wait for users to patch after seeking their prior approval.
Despite having the ability for years to silently and automatically update its users computers, Apple typically asks its users’ permission to approve them manually or automatically before installing any security update of this kind. But, the company has exercised its ability for the very first time to patch a critical security flaw in a component of its OS X operating system called the Network Time Protocol (NTP).

(más…)

Tendencias de ciberseguridad en 2015

enero 3rd, 2015 | Posted by kwelladm in Noticias - (0 Comments)

Un escenario caracterizado por el crecimiento de los ciberataques (que pondrán en jaque la validez de los estándares de seguridad actuales), sobre todo en dispositivos móviles y contra el Internet de las Cosas, y un aumento de sofisticadas estrategias de ciberespionaje, incluyendo técnicas capaces de burlar algunas de las más conocidas tecnologías sandboxing de detección de malware diseñado específicamente para atacar a una determinada organización. Así es como ven el panorama de seguridad en 2015 los expertos de Intel Security, a la luz del último informe presentado por la compañía, y del que destacan las siguientes conclusiones: (más…)