Friday, April 28, 2017

Digital House of Cards

In 2013 the almighty Netflix brought to light the series House Of Cards. Starring the magnificent Kevin Spacey and directed (among others) by the always interesting David Fincher, this political drama tells the story of Frank Underwood, Democrat politician with untiring eagerness for power. Based on manipulations, plots and various strategies (of dubious legality) we accompany the protagonist in his scale to power skipping over all democratic barriers.

The name House of Cards is a perfect reference to the meticulousness of his actions, to erect his political castle, where any false step can cause it to collapse. Today in our review of the best of the week in cybersecurity we find plots worthy of the Netflix series, rigging in elections, blackmail and much more.

Wednesday, April 26, 2017

Be careful when resting at home

You get home after work. Tired of an arduous day of work, you’re going to relax and watch your favorite series. Before that, you verify that your router is not one that is full of holes. Relieved by that fact, you connect the wifi willing to see your mail. However, the fear that you open a file that you should not, or click on an unfortunate link will overwhelm you. The danger is just around the corner and any missteps can be fatal.

But what threat is more likely to catch me off guard? Vulnerabilities are everywhere and although we must be alert to all kinds of attacks, there are some of them that are more willing to take our data. For example: phishing. According to the latest study by Helpness Security, three out of four malware attacks are caused by phishing.

Monday, April 24, 2017

The Villa Diodati of cybersecurity

Summer of 1816. Percy Bysshe Shelley and his wife, Mary Shelley, went to Villa Diodati to visit the famous poet Lord Byron. Due to the weather in that year, the couple, the poet and his personal doctor (John Polidori) spent the night reading German ghosts stories. Then Lord Byron challenged his guests to use all their intellect to create each one a terror story. As a result, today we can enjoy stories like 'The Vampyre' by Polidori or the magnificent 'Frankestein' by Mary Shelley.

Today in our step back in time we are going to talk about some kind of Villa Diodati of cybersecurity. We will also discover why it is our fault that hackers are still present in our nightmares and we will know more thoroughly one of the members of the group Int3pids.

Friday, April 21, 2017

Do ignorant people live happier?

Since childhood we start learning naturally, almost by accident. Years pass and with schooling we feed our knowledge. There are people who do it by obligation, others by a tireless spirit of curiosity. You create your own critical thinking, you become wiser ... However, someone one day says: "If you were an ignorant, surely you would live happier." This gives you thought and you may wonder if it could be true, if everything you have been studying so far really serves you to be happy.

Today, in our review of the best of the week in cybersecurity we want to disassemble this myth. And we found a perfect example in Canada. In this country, many teachers are beginning to teach cybersecurity to their students. To explain this initiative much better, the colleagues of Tripwire Inc interviewed Professor Benjamin Kelly, one of those involved in carrying out this initiative.

Thursday, April 20, 2017

The Talented Mr. Ripley is on the loose on the Internet

A year ago, today ...

The writer Patricia Highsmith, in the mid-twentieth century, created Tom Ripley, a young man with an innate talent for survival. He was adapted several times into movies (the most famous one was directed by Anthony Minghella and played by Matt Damon), so the character became popular by his ability to adapt to any situation and become camouflaged with his surroundings. These skills allowed him to impersonate various people with little effort.

Although this ability is not accessible to everyone, with the advent of the internet anyone can be Mr. Ripley and impersonate someone else without anyone knowing. That is why identity theft has become one of the main concerns of all cybersecurity experts.

Monday, April 17, 2017

The spirit of Robin Hood

A year ago, today ...

Although his origin is not very clear, the figure of Robin Hood has become a common reference in the popular culture. The origins of the character are an amalgam of references to real outlaws and touches of fiction that enriched the character. With this premise was created a personality that transcended literature, and refers to a person who works to help the weakest from those who take advantage of them.

In our return to the past, we have found it impossible not to remember Robin Hood. In the world of cybersecurity there are also good Samaritans who have the bow ready to hunt down all those cybercriminals who try to profit at the expense of others.

Wednesday, April 12, 2017

Get ready for the Apocalypse

The report of the week

We all know someone who is paranoid about the end of the world coming. As they are convinced that the apocalypse is nearby (there are several types: nuclear annihilation, doomsday, an alien invasion, zombies...), they are prepared for every possible scenario. Dozens of canned food, clothing for extreme conditions, matches, gas cans, guns, a bunker ... all preparations are too short to deal with the decline of civilization.

Maybe in the cybersecurity world  the end is not close (among other things, because cybercriminals are not interested in it), but it is true that we must always be prepared to avoid an attack that could leave us with a security gap which it will be difficult to recover from.

Monday, April 10, 2017

Was any passed time better?

A year ago, today ...

Back in 2011, Midnight in Paris was released, a film written and directed by Woody Allen. The film tells the story of a couple traveling to the French capital before their wedding. During their stay, the fiancé, a frustrated writer who lives idealizing the past, discovers that he can travel back in time and meet all the artists of the Golden Twenties.

Like every Monday, we join this retrospective and travel a year back in time, to see what the world of cybersecurity brought us and what the past can teach us to fix the present.

Friday, April 7, 2017

Not all heroes wear capes

The best of the week in Cybersecurity

The cape is a piece of clothing that has always been associated with superheroes. While we associate it with other characters, such as a famous Basque host or the most popular count of all Transylvania, seeing a cape makes us think of defenders of the good, like Batman or Superman. However, back to the real world and agreeing to the fashion designer from 'The Incredibles', the cape is not a practical attire and it is not usually seen on the street.

Hence the phrase "Not all heroes wear capes”, but that does not mean that in both the real world and cybersecurity world they do not exist. This week, in our review of what the week has left us, we want to pay tribute to these defenders who remain anonymous.

Wednesday, April 5, 2017

The shoemaker's son...

The report of the week

The popular collection of sayings is full of wisdom and it is always useful to give a good advice in the form of a metaphor, whether we are kidding or we are mean it. Sayings such as "it is the early bird that catches the warm" or others as resorted as "feast today, famine tomorrow" are some classics that we have heard more than once from our parents and our grandparents. And although they may sound obsolete, they are currently used in both the real world and the cybersecurity world.

Today it is impossible not to remember the saying "The shoemaker's son always goes barefoot" when reading the report collected by our collegues from Dark Reading. The study carried out by Thycotic gathers the testimonies of around 300 professionals of the sector who attended the RSA Conference of San Francisco held during the month of February. The main reason for the survey: how cybersecurity experts treat security of their own passwords.

Monday, April 3, 2017

The Internet of Things is expanding its field

A year ago, today ...

The IoT, the Internet Of Things, is gradually spreading to all areas of our lives: from being able to control when a package will arrive home to check if our refrigerator has run out of milk. The connectivity of all the devices we use on a day-to-day basis makes our lives simpler and safer in many cases. For instance: being able to see the images of our house security camera in real time from our mobile.

As every Monday we go into our time capsule and we go back a year ago to take perspective and see how we have evolved in the IoT sector and cybersecurity issues. There was an outstanding case on this subject last year: Andrew Auernheimer discovered that thousands of printers around the world had the port 9100 open and without authenticating. To prove it, he assaulted thousands of them and made them print anti-Semitic leaflets. Of course he was condemned for that, because as much as he wanted to demonstrate the existing problem, the way he did it was not right.