Monday, February 27, 2017

The safest places in the world

Today, a year ago...

It have always been said that banks are the safest places in the world but it seems that their digital versions are not so much and use to suffer cyber attacks more often than they should. In spite of this, bank's users digital platforms are growing and people are trusting banks more than before, something that has been reflected in the increase of the online purchases. E-commerce should focus on making the shopping experience easy but, above all, safer.


As every Monday, today we look back and analyze how this went a year ago to see if  we improved in the online banking sector and its attacks. It was just a year ago when we were talking about an investigation into banking trojans. In a Dell report, said that these Trojans were expanding their field of action: The botnets stopped focusing only on banks to cover other fields where money was also important, such as cloud service providers, mobile or technology apps stores, e-commerce, and more.


Friday, February 24, 2017

Toys of the 21st century

The best of the week about Cybersecurity

As you may know already, Nintendo has released this year the first hybrid console in history, a game console that can be used in both modes, portable and desktop: Something like the perfect mix between the Gameboy and Super Nintendo. Another milestone of the Japanese company was Wii, with this one they made a turned in the enjoyment of video games and the group entertainment was enhanced. And if we look back and compare the toys of our childhood with the nowadays ones is unavoidable to miss those toys without batteries and the ones we shared with friends on the street. Today's toys are completely electronic and can sometimes cause scar that cannot be cured with plasters.



The worst thing about these new toys is that they can carry dangers that cannot be detected at first sight, as easy as you can do with a screw about to come out. This could be the case of Cayla doll, accused of cyber-espionage and able to open the door of your house, as you can see in a video published by the BBC. The trick? A microphone and a bluetooth connection that transmits the unnoticed data. Such is the commotion that has been formed that the German Federal Agency of Networks has decided to prohibit the sale of this doll, as it could be a threat to the private sphere. This is not an isolated measure, the OCU (Organization of Consumers and Users of Spain) since December has been identified serious security breaches with this doll.


Wednesday, February 22, 2017

The internet cloud goes up it value

The report of the week

Although we would like to have an infinite memory, unfortunately our memory is limited and we have to use photos, videos or daily diaries to save those moments and to be able to live them over and over. With some ephemeral social networks (Snapchat and its imitations in the Facebook conglomerate), who don't want those memories for more than 24 hours, these are instants that we would like to keep forever. So that why we use  tools within our reach:  the external hard drives and the cloud, the so famous cloud.

The same goal have companies with their data: Not lose them. Therefore, according to the data of the new Report made by Gartner,  The world's leading IT research and consulting company.  Companies are increasing their budget in the IT industry across the globe. Traditional computer systems are declining, Since other digital technologies such as AI and virtual reality are having an excellent acceptance in the field. According to Forbes magazine, where the report was published, by 2018 more than 60% of companies around the world will have at least half of their infrastructure on cloud-based platforms.


Monday, February 20, 2017

The day the little bird did not fly away

A year ago, today...

Fashions come and go, this is something known by almost everyone. And if our reference is the most powerful country in the world, we must take it into account with aspects that sooner or later affect all of us: Is their election of presidents, for example, one of these fashions? And even more disturbing, beyond the familiar chatter with Donald Trump: should his "lessons" of safety be imitated? It is paradoxical that one of the most consumer countries in the world is the biggest credit card fraud to have incorporated the 'smart chip' later than most European or African countries.



If we look back, as we do every Monday, and focus on the most relevant news of last year, we would seriously consider what "fashions" we should follow. Beginning with the worldwide crash in Twitter, the microblogging network par excellence, and whose blackout was for many addicts to 140 characters little more or less than the end of the world. It was ironic that the trending topic of that day was #TwitterDown, because during the down it was technically impossible to tweet anything. So, elemental dear Watson, that's what all users talked about as soon as the service was restored. Jokey comments aside, that day the shares of the company fell by no less than 7%. Jokes are not allow in front of such a blackout, and more if we consider that it was caused by a defective program raised to production.


Friday, February 17, 2017

Trojan "driving" inside your phone

 The best of the week in Cyber Security
Have a car is no longer a 'must', if you live in a large city find a place to park can become an odyssey and let's not talk about the prices of parking. That is why many car rental companies or so-called "sharing economy" companies have emerged. Specialized apps solve the problem, and for much cheaper prices, giving you the freedom that provides you a car but without all its drawbacks.


A study on different car rental apps have detected several security flaws, which of course were reported to companies as soon as they were detected. Many of these apps can be infected by a Trojan in a very easy way, entering in your smartphone and stealling all your data. Something that can also happen when you charge your mobile phone at any mall or public place, so you know, better use an extra external battery.


Wednesday, February 15, 2017

Be careful with the attachments!

The Report of the week


In recent years, the number of theft of sensitive data from third parties to companies has grown, a very worrying issue. In more than half of the cases confidential data were sent to the wrong person by mistake and, surprisingly, such failures are caused by senior executives and not "newbies", which is what any upstart might think.

The new Mimecast report indicates that cyber security is not up to date with perceived threats and actual damage. The report combines data from their E-mail Security Risk Assessment (ESRA) with a survey conducted by Vanson Bourne on corporate cybersecurity.





Monday, February 13, 2017

Health and cybersecurity must go hand in hand

A year ago, today...


Science and technology increasingly go hand in hand and there are several cases of cyber attacks to health centers in recent months. The safest places for the health sector should be the safest technological places too, but not always both go hand in hand. Sometimes it is the health professionals themselves who perform unsafe actions, such as lowering the volume of the alarm to inaudible levels or even deactivating them, causing a potential danger to the patient.



Like every Monday, we get into the time machine and go back a year, to take perspective and see how we have developed in science and health in cybersecurity issues. There was a very important case on the subject: an important discovery based on the study of the genome of an African ancestor who lost bellow when it was known that it was due to a software failure.


Friday, February 10, 2017

'Diseases' of the future

  The best of the week in Cyber Security

When we look back and think of our old mobiles and computers that only could be use to call and send SMS or e-mails, we can not believe it. Now the possibilities of communication have multiplied, the power of the Internet and new technologies have gradually led us to a new world, the future that foreshadowed the movie Metropolis. Our needs have been changing and forgetting the mobile at home can cause you a tremendous stress for the rest of the day and even have to go back for it.


And one of the big 'culprits' of that sickly need to have our cell phone next to us is: WhatsApp. A fantastic communication tool that has improved over time and today is on the news for his new breakthrough in cybersecurity. The Facebook app has sought to reduce the risk of phishing, with 2-step verification. Since November there was the beta version that will be released today for millions of users, it will be available for both Android, iOS and Windows Phone. Although it can be somewhat uncomfortable, everything is for our safety.


Wednesday, February 8, 2017

Out of sight, out of mind

The Report of the week

The term 'Digital Natives' is being generalized with a wrong meaning that has to be clarify. Yesterday was the International Safer Internet Day and some worrying information came to light, such as that 38% of the children access to Internet without parenting supervision and through theirs devices. We could say that parents underestimate the dangers of the Internet. Something that is duplicate in companies around the world, who believe they are safe from cybercriminals.


The porpouses of these online professionals theft have diversified and not only focus on financial institutions, it also affects any organization that relies on email addresses and passwords to authenticate their users.


Monday, February 6, 2017

Myths and facts about the hacker phenomenon

A year ago, today...

The figure of the hacker has jumped into the breanch in recent times, going from being a term to define an almost mythological figure to key figure in books, movies and obviusly, the news of each day. Therefore, the time has come to review the trajectory of the term in the last year, to put a bit of order and distinguish between those who practice ethical hacking, cybersecurity professionals, those who use their skills to illicitly enrich themselves (should be considered cybercriminals) and all those interested in information security in its multiple variants.


"I admire hackers and I would like to be like them," Silvia Barreara, National Police Inspector and head of the Technical Section of the Technological Research Unit. These statements may seem surprising, but if you dig deeper into the hacker phenomenon, you will discover that once you eliminate the negative connotations of the term, a hacker (at least the type the inspector refers to in his interview) is a person with advanced knowledge of Programming and who knows in depth the internal workings of a system, in particular of computers and computer networks, someone with curiosity and desire for improvement who is always looking for the limits.


Friday, February 3, 2017

Step back to the past...


                                                                                    The best of the week in Cyber Security


Many times when we talk with our grandparents they tell us how much life has changed . Houses with open doors, children playing in the street,couples that last forever ... and they may be are right in many things. One of the things they complain about is, for example, these days 
in family meals everyone is more aware of the mobile phones than the conversation, and they are totally right about it. There are some reasons why we would not mind going back to the past, either voluntarily or by obligation ...



Nowdays it is a little shabby to arrive to a hotel and get an inconvenient key instead of a discreet card that allows you to open the door of the room. Believe it or not, a luxury hotel has decided to leave the cards aside and return to the traditonal. The hotel suffered an attack by ransomware that left all the hotel doors blocked, leaving all theirs guests with no possibility to enter or leave their rooms. The attackers requested 1,500 euros to unlock the central computer of the establishment and, after not receiving a clear answer by the police, the hotel paid the ransom and the computer was released. When the ransomware is knocking at your door ...


Wednesday, February 1, 2017

Build walls up is something from the paleolithic

The  report of the week

While a new elected president are working on build a wall up to make his country "reputable again", the cibersecurity managers (CIOs) from big companies are more aware with the idea that build a wall up is something from the past. Now most of the budget is being   is to be earmarked for detention policies. Goodbye to years of focusing on prevention. It could be true that is better safe than sorry, but if half of the times that to try to prevent at the end you finish the work with a virus, it is may be that something is going wrong and we have to change it. 
A recent study by Anderson Research, shows that the trend that led to spending up to 75% of the budget on prevention technologies has changed, since the budget is targeted for detection.
It does for two reasons: First one, because it seems more effective, and the second one, because the organizations are facing a lot, and not easy challenges for having a  cibersecurity policy based in detection that is truly useful.