Friday, April 28, 2017

Digital House of Cards

In 2013 the almighty Netflix brought to light the series House Of Cards. Starring the magnificent Kevin Spacey and directed (among others) by the always interesting David Fincher, this political drama tells the story of Frank Underwood, Democrat politician with untiring eagerness for power. Based on manipulations, plots and various strategies (of dubious legality) we accompany the protagonist in his scale to power skipping over all democratic barriers.



The name House of Cards is a perfect reference to the meticulousness of his actions, to erect his political castle, where any false step can cause it to collapse. Today in our review of the best of the week in cybersecurity we find plots worthy of the Netflix series, rigging in elections, blackmail and much more.


Wednesday, April 26, 2017

Be careful when resting at home

You get home after work. Tired of an arduous day of work, you’re going to relax and watch your favorite series. Before that, you verify that your router is not one that is full of holes. Relieved by that fact, you connect the wifi willing to see your mail. However, the fear that you open a file that you should not, or click on an unfortunate link will overwhelm you. The danger is just around the corner and any missteps can be fatal.



But what threat is more likely to catch me off guard? Vulnerabilities are everywhere and although we must be alert to all kinds of attacks, there are some of them that are more willing to take our data. For example: phishing. According to the latest study by Helpness Security, three out of four malware attacks are caused by phishing.


Monday, April 24, 2017

The Villa Diodati of cybersecurity

Summer of 1816. Percy Bysshe Shelley and his wife, Mary Shelley, went to Villa Diodati to visit the famous poet Lord Byron. Due to the weather in that year, the couple, the poet and his personal doctor (John Polidori) spent the night reading German ghosts stories. Then Lord Byron challenged his guests to use all their intellect to create each one a terror story. As a result, today we can enjoy stories like 'The Vampyre' by Polidori or the magnificent 'Frankestein' by Mary Shelley.


Today in our step back in time we are going to talk about some kind of Villa Diodati of cybersecurity. We will also discover why it is our fault that hackers are still present in our nightmares and we will know more thoroughly one of the members of the group Int3pids.


Friday, April 21, 2017

Do ignorant people live happier?

Since childhood we start learning naturally, almost by accident. Years pass and with schooling we feed our knowledge. There are people who do it by obligation, others by a tireless spirit of curiosity. You create your own critical thinking, you become wiser ... However, someone one day says: "If you were an ignorant, surely you would live happier." This gives you thought and you may wonder if it could be true, if everything you have been studying so far really serves you to be happy.


Today, in our review of the best of the week in cybersecurity we want to disassemble this myth. And we found a perfect example in Canada. In this country, many teachers are beginning to teach cybersecurity to their students. To explain this initiative much better, the colleagues of Tripwire Inc interviewed Professor Benjamin Kelly, one of those involved in carrying out this initiative.


Thursday, April 20, 2017

The Talented Mr. Ripley is on the loose on the Internet

A year ago, today ...

The writer Patricia Highsmith, in the mid-twentieth century, created Tom Ripley, a young man with an innate talent for survival. He was adapted several times into movies (the most famous one was directed by Anthony Minghella and played by Matt Damon), so the character became popular by his ability to adapt to any situation and become camouflaged with his surroundings. These skills allowed him to impersonate various people with little effort.



Although this ability is not accessible to everyone, with the advent of the internet anyone can be Mr. Ripley and impersonate someone else without anyone knowing. That is why identity theft has become one of the main concerns of all cybersecurity experts.