Wilmer Ramirez

23 Added | 1 Magazine | 1 Like | 37 Followers | @WRM_MICITT | Keep up with Wilmer Ramirez on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Wilmer Ramirez”

20 things to do after installing Kali Linux 1.x

I’ve compiled a small list of things that I always perform after installing a fresh copy of Kali Linux in this post. Because I got multiple laptops …

Spying Campaign Bearing NSA's Hallmark Found Infecting Thousands of Computers

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according …

National Security

Aplicar hábitos de seguridad y privacidad permiten una vida digital plena

Aunque todavía existen personas que se resisten a incorporar los avances tecnológicos en sus vidas cotidianas, es inevitable negarse a vivir en la …

Stopping Hardware Trojans in Their Tracks

<b>Long ago, the story goes,</b> Greek soldiers tried for 10 years to conquer the city of Troy. Eventually, they departed, leaving behind a large wooden …

U.S. Department of Defense

Nanny Freaks as Baby Monitor Is Hacked

<i>Photo by Thinkstock</i><p>The nanny to a one-year-old girl was going about her business Monday — changing diapers, playing with the baby – when she heard an …

Parenting

Critical networks in US, 15 other nations, completely owned, possibly by Iran | Ars Technica

Operation Cleaver gets near-complete control of airlines, gas producers, defense.<p>For more than two years, pro-Iranian hackers have penetrated some of …

Meet FlashFlood, the lightweight script that causes websites to falter | Ars Technica

Bringing big database-driven sites to their knees just got a little easier.<p>People have grown so dependent on websites to shop, travel, and socialize …

Cómo Facebook se abre a la red oscura

<b>Facebook es el primer gigante de Sillicon Valley que decidió brindarle apoyo técnico a los usuarios que acceden a la red social desde Tor, un servicio de la "red oscura" que permite la navegación anónima por internet.</b><p>Para ello Facebook estableció un servicio especial para Tor accesible desde …

Los factores que fomentan la industria del cibercrimen

<b>El ciberataque a Sony Pictures a finales de noviembre dejó en evidencia lo fácil que es poner en apuros a una gran corporación.</b><p>Aunque el cibercrimen cobra cada día más importancia en los planes de seguridad de las naciones del mundo, la mitad de los países no están preparados para lidiar con el …

The importance of deleting old stuff—another lesson from the Sony attack | Ars Technica

Saving everything in case it might be useful later is a recipe for disaster.<p>Bruce Schneier has been writing about security issues on his blog since …

Google won’t fix bug hitting 60 percent of Android phones | Ars Technica

Google also uninterested in telling anyone about the bugs it does fix.<p>Just as Google is coming under fire for publicizing a Windows bug two days …

Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes | Ars Technica

Always-on sniffer remotely uploads all input typed into Microsoft Wireless keyboards.<p>It sounds like the stuff of a James Bond flick or something …

Here's What Helped Sony's Hackers Break In: Zero-Day Vulnerability

Whoever hacked Sony had a secret way to get in.<p>The hackers behind the devastating attack against Sony Pictures Entertainment late last year exploited a previously undisclosed vulnerability in its computer systems that gave them unfettered access and enabled them to reach and attack other parts of …

Cybersecurity

Phishing scam that penetrated Wall Street just might work against you, too | Ars Technica

Advanced tactics raise the bar on spearphishing attacks, making them harder to spot.<p>Researchers have uncovered a group of Wall Street-savvy hackers …

How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone – AirHopper – Cyber @ Ben-Gurion University

Security researcher <b>Mordechai Guri</b> with the guidance of <b>Prof. Yuval Elovici</b> from the cyber security labs at Ben-Gurion University in Israel presented …

Advice from a Real Hacker: How to Know if You've Been Hacked

It seems like every day now that we see a new headline on a cyber security breach. These headlines usually involve millions of records being stolen …

Is 123456 Really The Most Common Password? – XATO: Information Security by Mark Burnett

I recently worked with SplashData to compile their 2014 Worst Passwords List and yes, <i>123456</i> tops the list. In the data set of 3.3 million passwords I …

Don't Ignore the Simple Cyber Attacks, Says Security Blogger Brian Krebs (Q&A)

"The more we ignore this problem, the worse it’s going to get."<p>On Christmas Day, a group of anonymous mischief-makers who call themselves Lizard Squad crippled Microsoft’s and Sony’s online gaming networks with simple, but effective, “denial of service” attacks. The attacks stopped gamers from …

Cyber-attacks

A Spy in the Machine

How a brutal government used cutting-edge spyware to hijack one activist's life<p><b>In November 2005, during</b> the dead of night, five black cars pulled up in front of the home of Moosa Abd-Ali Ali. The doors opened, and a group of men stepped out. They could’ve been officers, or maybe they were just …

Surveillance

¿Cómo crear contraseñas seguras?

Olvide el uso de contraseñas en Internet en que usted junta el nombre de su persona favorita y un número que, de toda la clave, es lo único que se …

Aprenda cómo identificar códigos maliciosos o virus que roban información

Como se les deja en evidencia, los ladrones informáticos se las ingenian para hacerlo caer, despojarlo de sus contraseñas y robarle información.<p>Puede …