Sunday, February 2, 2014

Top 5 Infosec links of the week (XI)

Clearly we like spy stories. “Real” spies, but also simulated spies, even detectives so applied to their work that could be spies. Besides that, we also like to know how to push the technology to its limits, to know how we are stolen, or learn to not be teased.



So is this 11th edition of the weekly top infosec news, based on the preferences you have expressed clicking on the links that we have proposed through last 7 days. The top one goes to the revelation that even an email client as TorMail, which should be inherently inaccessible, was actually a loophole: the FBI has been spying at home.

Want a “real” spies story? Then you should read the post about the criminals who developed SpyEye, and TrendLabs researchers who hunted them after a thorough research. Security company share now with all of us this Sherlock Holmes alike story with great detail. If you want to know how they dismantled a criminal gang, you can not miss this story.

We’ve got another detailed work this week: a true "geek" technology, which began to hear a strange noise in a video from Youtube and ended up drawing the path of a helicopter on Google Maps. Remember when travelling: whatever you do, you could be leaving a trace.

The "bottom club" this weekly top five goes to two stories that have also been of interest to you: the origin of massive fraud in the Target case, which was apparently the theft of vendor credentials; and a lesson from TrendLabs about the use of malware inside-out and outside-in the Tor network.

(If you have been fine, you will have seen that three of this five links are Saturday news. Wow, it seem that you really like reading as soon as you reach the weekend ;-)).

---

We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)7

0 comments:

Post a Comment