Friday, May 25, 2018

A trip to Las Vegas

Get ready because we’re going to Las Vegas! As it happens in cybersecurity, Las Vegas is a city where you can surprise you at any time. Because of that, this week news review is about the city of lights, casinos and gambling. We have our cards to play against hackers. Who will win? 

Cybersecurity workers are tired: a non-efficient work with loads of weak passwords, vulnerabilities in BMW and not-safe-enough networks in big cities, like Las Vegas.

Wednesday, May 23, 2018

The first thing you do when you get to the office

Its 9am, you make your coffee and sit in your work seat to start your working day. The first thing you do is to check your Outlook mail, then you work on your PowerPoint presentation and then you insert names and phones in the company Excel database. Office365 is the suite that we most use in a daily basis and in most of the companies that work with data and confidential information for organizations, but… Is it safe? 

As a result of the Redmon expansion, there’s the risk that more threats are happening inside its structure, and more precisely, inside the email. Osterman Research informed in 2017 that 41% of the organizations aren’t sure of what to do when complementing their safety.

Monday, May 21, 2018

Hacking The Pentagon

Today we’re going to talk about The Pentagon, the headquarters of the Defense Department in the United States. In this building, 23.000 militaries and citizens are working along 3000 supporters. The Pentagon is located in Arlington, Virginia.  Right now, The Pentagon is the biggest office building in the world. What’s interesting about it is that it’s also one of the most protected buildings in the world. It’s is nothing more than the United States Defense Department, what makes the government make great investments in their security to store there new and technological projects. But, what would you say if they tried to hack their own system? 

In today’s interview to Lisa Wiswell from Grimm & HackerOne, Security area’s leader with more than 10 years in programming experience and cyberwar, talked about the program “Hack the Pentagon”.

Friday, May 18, 2018

A game in the work break

After several hours working with your computer, hours by the phone with a client, long meetings starring at a clock, it’s finally your resting time at the office. They’ve talked to you about a really cool game for your smartphone so you download it so you can be distracted. You play a couple of games while making your coffee in the machine and you read your personal email on the computer. It all seems harmless…  

By using the computer in your workspace for your personal stuff you are risking your personal and your company data and information.

Wednesday, May 16, 2018

A slot machine through the clouds

Slot machines, the gaming machines in where you introduce a coin and have the possibility of winning the big prize and making it expulse hundreds of coins. Less and less slot machines can be seen because nowadays you can play those games on the internet. There’s invisible money, invisible prizes and also, hackers waiting for their opportunity to get their own prize. When migrating company data to the cloud, hackers insert the coin that will make them winners of the big prize: a coin with a value of millions of dollars if they play it right. 

Cryptohacking has become a main flow between hackers and companies that are fighting to learn the fulfillment requirements in the public cloud, as said by the last RedLock research.