Ricardo Castilleja

117 Flips | 1 Magazine | 138 Likes | 4 Following | 1 Follower | @Rcastilleja | Keep up with Ricardo Castilleja on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Ricardo Castilleja”

British Airways Hacked - More than 380,000 Payment Cards Compromised

British Airways Hacked, customers who made the booking through the website or mobile app from August 21, 2018, to September 5, 2018, are affected.<p>The …

British Airways

How To: Hack Wi-Fi & Networks More Easily with Lazy Script

Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration tools that can be explored …

Information Security

Double Zero-day Exploit Discovered in same PDF file Affected Adobe & Windows 7

A researcher discovered new double Zero-day exploit that affected Adobe Acrobat, Reader and older Windows 7 platforms, Windows Server 2008.<p>This …

WP3 Security Standard Released by Wi-Fi Alliance for Wi-Fi Security

New WP3 Security Standard released by Wi-Fi Alliance that provides Next-generation Wi-Fi Security with new capabilities to enhance both personal and …

El elemento seguro protege los pagos contactless con smartphone

Los <i>smartphones</i> combinan a la perfección un teléfono, cámara, reproductor musical, abono de transporte público e incluso una cartera. Evidentemente, …

Día Mundial de Internet: más de la mitad de los españoles han sido infectados por algún virus informático

Internet se ha convertido en una herramienta indispensable para desarrollar diferentes tipos de actividades, facilitando procesos, tiempos de entrega …

Office 365 Zero-Day Used in Real-World Phishing Campaigns

A new email attack known as baseStriker allows miscreants to send malicious emails that bypass security systems on Office 365 accounts. [...]

Phishing

Ransomware, tech-support scams or email fraud: Which cybercrimes cost victims most?

Not all online crimes are equal in their impact.<p><i>Video: Cryptocurrency-mining malware is targeting IoT devices: Is it worth it?</i><p>The FBI has released a …

Identity Theft

Mexico Tells Banks to Take Steps to Guard Against Suspected Hack

Mexico’s monetary authority asked about a dozen banks to take emergency measures to shore up the country’s electronic payment network after a …

una-al-día

La periodista Emma Best ha publicado más de 11.000 mensajes directos de un grupo de Twitter utilizado por WikiLeaks.<p>"En varios momentos del chat, hay …

Presunto 'hackeo' al sistema de pagos de Banxico pega a operación

El <b>“intento” de ataque cibernético</b> que sufrieron algunas instituciones financieras afectó su proceso de conexión con el <b>Sistema de Pagos Electrónicos</b> …

Google will make 3rd-party logins more secure in May with a new account verification feature

Google takes security very seriously, especially when it comes to logging in to your account. Today, the company has announced a new sign-in feature that should help out with upping the security even further.<p>Announced in a blog post today, Google is bringing a new sign-in feature to all Google …

Free Qualys services give orgs visibility of their digital certs and cloud assets

Qualys announced two new free groundbreaking services: CertView and CloudView. Harnessing the power and scalability of the Qualys Cloud Platform, …

Intel Tells Remote Keyboard Users to Delete App After Critical Bug Found

Intel said it is lights out for its Remote Keyboard app just as security researchers find three vulnerabilities that let local attackers inject …

Practical Attacks with DNS Rebinding

One of the tools I expect to see gain in popularity in the wild is DNS rebinding. DNS rebinding is a technique that turns a victim’s browser into a …

CertUtil.exe Could Allow Attackers To Download Malware While Bypassing AV

Windows has a built-in program called CertUtil, which can be used to manage certificates in Windows. Using this program you can install, backup, …

Atlanta is offline as ransomware attack cripples city computer network

Atlanta is the latest victim of a broad-scale ransomware attack that knocked out computer networks across the city.<p>The attack was described in a …

Mozilla pulls ads off Facebook over data access concerns

Mozilla has announced it’s suspending its advertising on Facebook in the wake of the Cambridge Analytica privacy controversy — saying it has concerns the current default privacy settings remain risky, and having decided to take a fresh look at Facebook’s app permissions following the latest user …

Review: Bricata adds threat hunting to traditional IPS/IDS

These days, even the most basic cybersecurity defenses for any medium to large enterprise will include an intrusion prevention system (IPS) or an …

Apple Working on Siri Bug That Lets Strangers Hear Messages

<b>Updated March 23 at 8:04 am ET with comment from Apple.</b><p>If you use a feature baked into iOS 11 that lets you hide messages, you might be disappointed …

Old banking Trojan TrickBot has been taught new tricks

The banking Trojan is back with a range of new capabilities.<p>The TrickBot Trojan has been upgraded with new modules to make detection, and defense, …

The 5 Latest Phishing Scam Emails You Should Avoid

Scam emails have come a long way from requests for money from far-flung lonely hearts, or investment opportunities from dubious overseas princes. …

Phishing

You need an ‘I’ve been hacked’ plan for your cloud

A study that was conducted by Ponemon Institute and sponsored by IBM Resilient and found that 77 percent of respondents admit they do not have a …

How Why the Cybersecurity Landscape Is Changing

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.<p>Cisco recently published its 2018 annual cybersecurity …

Make the Most of the New CIS Controls v7

Recently, the Center for Internet Security (CIS) released its next revision of the Top 20 Security Controls. Initially developed by the SANS …

500 new cyber threats emerge every minute

McAfee: Mac malware and healthcare attacks are also on the rise<p>Eight new cyber threats were discovered every second at the end of 2017, almost twice …

Cybersecurity

Google backs its Bristlecone chip to crack quantum computing

The 72-qubit chip will help researchers understand error rates and scalability.<p>Like every other major tech company, Google has designs on being the first to achieve quantum supremacy -- the point where a quantum computer could run particular algorithms faster than a classical computer. Today it's …

Spotify issues warning to users of 'hacked' apps

Spotify over the weekend sent out e-mails to users who were suspected of using “hacked” Spotify apps. In the mailing, the company claims it has …

Human Predictability Make Attacks Easy For Threat Actors

Now that the books are closed on 2017, the cybersecurity industry is developing a better understanding of the strategies currently used by threat actors and cybercriminals. Unfortunately, we’ve found that malicious groups are still using the same malware — with slight tweaks and modifications — as …