Friday, March 10, 2017

The spotlight of all the cameras

The best of the week in Cybersecurity

Thanks to all the technological advances that we have today, we can do things that were unthinkable years ago. Sanitary technological innovation, for instance, already allows the realization of non-face to face operation, and being far from home becomes easier with all the possibilities of communication that we have available. But it is already known that everything has a ying and a yang side, and these advances can carry great dangers of security.


Trying to safe the privacy and security of our messages the White House, among others, began to use the 'safe version of Whatsapp'. It is an App called Confide that encrypts the messages and never shows more than 4 or 5 lines of text at a time, which makes it difficult to see the screenshots and the viewers intrude into our privacy.  Pero no siempre es todo lo que parece, y la solución para cualquier persona para chatear sus mensajes, también tiene "algunos errores".The responsible for publishing them to the entire world have been the ICOctive Quarkslab guys, Which in their last report have exposed that the implementation of the encryption could make possible the impersonation or the alteration of the content of the messages or files. Is communication secure the holy grail of our time? It seems that yes, and that is a long journey ahead to find it.

And speaking of data that come to light we can not not speak of what has undoubtedly been the news of the week. On Tuesday WikiLeaks published all the data that the CIA reported had compiled through a secret hacking program. The CIA has used national shield protection but WikiLeaks has reminded it that the security protocols of a wide range of companies and products from Europe and the United States, such as Apple's iPhone, Google's Android phones Or Samsung smart TVs.

If you want to spend your time in  investment of new businesses today we bring you two possibilities: one not too ethical and another a little more elaborate. For the first of them: make a spam campaign. River City Media, a group of cybercriminals, made a € 36,000 profit in a single day by running a spam campaign. About 18 million Gmail emails were affected and another 15 million AOL. To get to make this massive shipment in a single day used automation, years of research and, of course, illegal tricks of which a cybercriminal knows well. Frequently spammers will share their databases, that might explain how we end up on mailing lists that try to sell us everything from generic drugs to auto loans.

Given the first of the proposals, which obviously DO NOT recommend, we present the second one, with a little more base. A new study by INCIBE (Spanish National Cybersecuruty Institute) highlights that automotive robotics and healthcare will be the main business opportunities in cybersecurity for 2017. On the one hand, the evolution of smart cars has made it necessary to evolve cybersecurity systems as well. On the other hand, the health branch is one of the major affected by cyber attacks, and that is why business development opportunities are very high: to strengthen data protection, encryption for medical research or protection of medical devices Connected.

Maybe, as things stand at the moment, we will need a wide range of services of monitoring and protection of our devices. Fortunately IBM and Experis Cyber ​​have made a new agreement to respond effectively to the challenges in information security. It will integrate IBM's QRadar security intelligence platform into the range of monitoring and control services of Experis Cyber. This integrated service will enable large organizations around the world to manage and investigate cyber incidents and identify security anomalies and breaches in the organization's systems. The service they will offer will also cover cloud infrastructures and Internet security, making it unnecessary to establish a costly internal system that requires constant updating.

                                                                                                                       Fotografía: freeimages.com

0 comments:

Post a Comment