Monday, March 17, 2014

Our particular Cybersecurity Trivial Pursuit

“God may not play dice but he enjoys a good round of Trivial Pursuit every now and again” (Italian film director Federico Fellini). Who wouldn’t like to test his knowledge from time to time? Do you want to do it now? Well here's our own version of Cybersecurity Trivial Pursuit.

- What is the biggest advantage of the new encryption algorithm developed by Nippon Telegraph and Telephone Corporation, Mitsubishi Electric Corporation and the University of Fukui? More confidentiality and integrity against multiple misuse in authenticated encryption operations.

- What security feature of the Apple’s iOS 7 is supposedly weaker than the one in the previous version? According to the company Azimuth Security, it is the internal random number generator used in the new version of iOS, the early_random () PRNG (pseudo-random number generator).

- Is it true that it is been leaked a database of the bankrupted Bitcoin exchange company MtGox? Absolutely not. It is a hoax spread by hackers to infect users' computers with a Bitcoin wallet stealing malware.

- Is it safe to download from any website the Windows 8.1 Update which was leaked last week and was already deleted by Microsoft from their servers? No, it is not. Cybercriminals are taking this opportunity to distribute malware through fake updates containing the most varied malware: Trojans, spyware, adware, cryptoware...

- What European country has begun to collaborate with Google to block jihadi videos? It is UK, which received special permission from the Mountain View company to mark the extremist videos in order to be reviewed immediately. They have already managed to remove more than 8,000 videos in eight weeks.

- Which country has blocked access to four websites that criticize its leader? This is Russia. Putin does not like criticism, so he commanded to block the blog of his opponent Alexei Navalny and the websites , and

If you didn’t guess even half of the questions, we invite you to read us every day through some of our different channels (you have the links at the bottom) and our blog ( to be always informed about the latest developments of the cybersecurity’s field.


We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)


Post a Comment