Noticias y Alertas
Header

A new report on Chinese hackers details a huge cyber espionage campaign against of American companies from security providers to power plant suppliers.  The  failure of a big deal by Coca- Cola was also blamed on Chinese army hackers.  In 2008, Coca-Cola bid about $2.4 billion for the China Huiyuan Juice Group, a beverage company based in Beijing, in what would have been one of the biggest foreign acquisitions ever in that country. While the bid was being developed, Chinese hackers were inside Coke’s systems reading the details

http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?_r=0Companies

http://dealbook.nytimes.com/2013/02/19/accusations-of-hacking-in-cokes-failed-big-deal/

http://www.usatoday.com/story/tech/2013/02/19/chinese-military-hacking-group-us-attacks-cybersyping/1930307/

Burla 2.0

febrero 19th, 2013 | Posted by kwelladm in Noticias - (0 Comments)

 La burla 2.0 ya no es una broma sino más bien un tema realmente preocupante sobre el que tenemos que actuar. El acoso ha sido (y sigue siendo) un conflicto difícil de tratar. Actualmente, la presencia de las nuevas tecnologías agrava la situación ya que la víctima tiene dificultades para encontrar refugio, y el acosador tiene a su disposición múltiples canales para agredir desde el anonimato.

Los casos de ciberacoso son cada vez más frecuentes y alarmantes, y tienen un factor común, se producen principalmente a través de las redes sociales. Sin ir más lejos, en la recta final del pasado año fuimos testigos de varios casos que llevaron a los afectados al suicidio. (más…)

A la pregunta de si debes tener instalado un antivirus, la respuesta es que sí. Sí se debe contar con un antivirus en el móvil que analice ficheros y aplicaciones instaladas y que se actualice constantemente. Las principales casas de antivirus disponen de una versión para móvil, algunos de ellos gratuitos. Se debe tener más cuando todos los informes de empresas de seguridad, y en especial las casas de antivirus, ya apuntan el desvío de malware a esta plataforma como una tendencia exponencial en los últimos años. (más…)

For Immediate Release
February 12, 2013
 

Executive Order — Improving Critical Infrastructure Cybersecurity

 

EXECUTIVE ORDER

– – – – – – –

IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

 

By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:

Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national and economic security of the United States depends on the reliable functioning of the Nation’s critical infrastructure in the face of such threats. It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. We can achieve these goals through a partnership with the owners and operators of critical infrastructure to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards. (más…)

Durante el discurso del Estado de la Unión, Obama destacó un segmento especial al tema de la seguridad en el ciberespacio.

Citing the growing threat from cyberattacks, President Obama on Tuesday announced that he had signed an executive order that calls for the creation of voluntary standards to boost the security of computer networks in critical industries such as those that keep trains from colliding and drinking water clean.

“We know hackers steal people’s identities and infiltrate private e-mail,” he said in his State of the Union speech. “We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.” (más…)

Los hackers de hoy, cada vez más jóvenes. En el artículo que reproducimos debajo (BBC News) claramente queda en evidencia la necesidad de contar con un programa con HHS Hacker High School como el de Kwell. Cuando querramos darnos cuenta… nuestros hijos / nietos…. ya estarán del otro lado.

Niños de tan sólo 11 años están escribiendo códigos informáticos malignos para hackear cuentas en sitios de juegos y redes sociales, aseguran expertos.

Un informe de la compañía de antivirus AVG muestra evidencia detallada de los programas para “robar” monedas virtuales. La empresa señaló que los niños deben ser educados acerca de los “errores y aciertos” de estos tipos de programación. (más…)

SANS informa continuando con lo publicado días atrás

According to a National Intelligence Estimate, China more than any other country in the world is targeting the US in a focused cyberespionage campaign that threatens the country’s economy. The classified report lists organizations in the energy, finance, aerospace, information technology and other sectors that have been the targets of these attacks. Russia, Israel, and France have also been named as engaging in similar activity, but China’s alleged activity outstrips theirs by far. (más…)

El quinto fabricante mundial de armas, la firma norteamericana Raytheon, lleva desarrollando desde 2010 un software para rastrear las actividades y movimientos de las personas. El programa chupa los datos y fotos colgados en Facebook y otras redes sociales, los minimensajes de Twitter y además aprovecha la localización por GPS que la gente se activa en sus smartphones y con aplicaciones como Foursquare. Con todo ello, y las rutinas que se desprenden, el software de Raytheon podría predecir comportamientos y desplazamientos de las personas rastreadas, según ha informado The Guardian. (más…)

The New York Times reports that Chinese hackers targeted its computer systems in an attack that began in September 2012. The attackers managed to gains access to a domain controller that holds account access credentials for all Times employees; this particular attack targeted the accounts of the current and former Times Beijing bureau chiefs. The hackers appear to have been looking for information identifying sources in China who may have provided information to journalists investigating a story about the fortunes amassed by family members of Chinese Prime Minister Wen Jiabao. The hackers took circuitous routes, directing their attacks through previously compromised systems at several different US universities and shifting IP addresses often. Such deceptive strategy is similar to that used in other cyberattacks that have been linked to China. Chinese officials deny involvement in the attacks. The Times called in Mandiant to help monitor and block the attacks, gather evidence, and expunge the hackers. The attackers have been ousted from the system for now and more cyberdefenses have been established, but the Times harbors no illusions that its systems will not be targeted again. (más…)

Microsoft y Symantec han desmantelado una red de bot que se hizo con millones de ordenadores para actividades criminales, tales como el robo de identidad o el fraude.

Conocida como Bamital, este bot amenazó a la industria de anuncios online en Estados Unidos, que genera 12.700 millones de dólares, a través de la generación de una serie de clicks fraudulentos en anuncios de Internet, que financian muchos de los servicios online gratuitos disponibles para los usuarios. (más…)