Tuesday, December 2, 2014

The Hitchhiker's Digital Guide

Imagine a morning like today, someone bites your door and gently notifies you that your house will be demolished. A similar situation (in fact, literally similar), just changing 'home' for 'planet', was what Arthur Dent had to live in "The Hitchhiker's Guide to the Galaxy", the first novel of the saga with the same name, written by Douglas Adams and whose format resembles more the classic step by step tutorial about what we should not to do in accordance with what’s happening.


If Adams was able to write five novels under the same prism, shall we not be able to lecture us accordingly with the day's news in computer security? Digital Hitchhiker, let's do it.


Kaspersky Lab released the latest study about its investigation into countries with a higher risk of computer infection. And for the first time Spain is not on the top, which is led by the US (which passes from second to first place), Netherlands, Germany, Ukraine and Russia. Does this mean we are better protected? The truth is that we have been victims of massive attacks less focused on more profitable markets.

Whenever Assange or Snowden open their mouth the price of bread (albeit digital) raises. During last intervention of Julian Assange, who remains in the embassy in London, he encouraged members of UNASUR (Union of South American Nations) to create their own digital tools such as search engines and social networks that ensure freedom of opinion outside the American government tentacles capable, in his words, "to monitor up to 98% of world traffic" .

If you have a toddler, you'll be pleased to know that the National Police is working with INCIBE, the University of León, the Polytechnic University of Madrid and the Association of Graduates in Computer Engineering in creating a tool to automate audits in cases of child abuse. ASASEC, which is the name of the 'creature', is able to identify patterns in society based on information associated with pedophile content found on the net.

Tobacco, like any other drug, is addictive. A lot of people’s turning to electronic cigarettes as a temporary substitute. Now if you're trying to quit smoking, and you are also a possible espionage target, whether corporate or government, perhaps these devices, that connect via USB to our computers, are not the best choice. A routine testing in one of these devices led researchers find a vulnerability that allowed them to install an exploit kit ready to spread it out as soon as it was connected to an operating system. A story that reminds us the importance of safety and not only in the familiar surroundings, but in the supply chain related.

Java language and platform has brought so much joy to developers (note the irony). As soon it’s used for a mobile application, than to design an AlienSpy, a RAT (Remote Administration Tool) that infects any supported system, serving it as a hotspot for monitoring the entire network.

Knowing the score, never is enough to have extra protection that do not interfere in the final usability of our devices. A good choice would be to encrypt our Android or iOS data, knowing the differences between each.

Several tips that digital hitchhiker should consider to make his cyberspace trip as flattering as possible.

0 comments:

Post a Comment