johnricof

297 Flips | 1 Magazine | 2 Likes | 1 Follower | @johnricof | Keep up with johnricof on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “johnricof”

Fighting cybercrime using IoT and AI-based automation

Last November, detectives investigating a murder case in Bentonville, Arkansas, accessed utility data from a smart meter to determine that 140 …

Google Testing Post-Quantum Cryptography in Chrome

Plenty has been speculated since the Snowden documents were made public about the NSA’s interest in building a quantum computer that could break …

Inside the Mind of a Hacker: Attacking Databases With SQL Injection

Many developers don’t realize that by introducing security issues in their code they may be making a hacker rich. There is a bustling market for …

Databases

How will cybersecurity look like in 2020? Five threat scenarios

<b>Researchers from UC Berkeley’s School of Information tried to answer this immensely challenging question in their most recent report, Cybersecurity</b> …

IT leaders pick productivity over security

Results from two recent studies suggest that cybersecurity needs an overhaul at most companies with root causes of the problem including poor …

Cybersecurity

Fake LastPass extension exposes users to ads and installs

When it comes to passwords, one piece of advice we give our readers is to use password managers / vaults to help them maintain, keep track of, and …

Chrome Web Store

The Industrialization of Cybercrime: Driving Innovations in Security

If you compare the world of cybercrime now to that of 10 years ago, there really is no comparison. Whether one measures its impact through estimated …

Payment Systems

2015: Year of the Chinese Hacker

Last year, FBI director James Comey told CBS’s <i>60 Minutes</i> that, “There are two kinds of big companies in the United States. There are those who’ve …

What is… a VPN?

Welcome to the first article in our <b>What is…</b> series,<br>where we’ll be turning technical jargon into plain English.Because it’s Cybersecurity Awareness …

Information Systems

Encryption: Safeguarding Your Sensitive Data

Damon Covey, Senior Director, Product Management, Symantec<p>Join us for this webinar on March 22, where we will discuss the Symantec approach to …

Lotería Visa. Te contamos, paso a paso, esta variante de la estafa nigeriana

Kaspersky Lab alerta: WhatsApp para PCs utilizado como gancho de spam y troyanos bancarios - Tecnología y Sociedad

Páginas falsas ofreciendo la descarga de esta nueva versión han sido registradas en español y portugués<p>Analistas de <b>Kaspersky Lab</b> han descubierto …

Researchers observe databases being encrypted, websites held for ransom

Security firm High-Tech Bridge has identified a new type of threat that is similar in concept to ransomware; however, instead of compromising a …

Cybersecurity in 2015: What to expect

Breaches of information security and individual privacy hit the headlines regularly in 2014. But how will the arms race between cyber-attackers and …

Kaspersky Lab official blog

Our innovative products help to give you the Power to Protect what matters most to you. Discover more about our award-winning security.<p>Our FREE …

Kaspersky Lab

Hechos terroristas que cambiaron al mundo // Especiales W

El domingo pasado estuve en #EspecialesW de W Radio abordando uno de los temas de mayor importancia en la actualidad, nos referimos a los ataques …

Forensics professor sees digital data as future crime solver

OKLAHOMA CITY (AP) - Data analysis will likely be the DNA of the future, Dwight Adams said.<p>The director of the Forensic Science Institute at the …

Blog

Blog

Predicciones de expertos para 2015.

Es diciembre, y en la industria de la seguridad esto significa que llegan las predicciones de los expertos acerca de lo que va a pasar el próximo …

Our top 10 predictions for security threats in 2015 and beyond

After a year of big data breaches like Home Depot and Sony, and widespread security vulnerabilities in our shared software, which spawned the likes …

Segu-Info

23 feb. 2018<p>Con el tiempo, la industria ha conseguido un mejor control del panorama de amenazas móviles. Resulta que la seguridad móvil tiene que ver …

'Cibercriminales' usan el doble chulito azul de WhatsApp para estafar usuarios

Con un enlace malicioso, los delincuentes informáticos se aprovechan de quienes buscan evadir la notificación de mensaje leído en WhatsApp. Ya hay …

El doble check azul de WhatsApp, utilizado en engaños

Siendo una de las aplicaciones móviles más utilizadas hoy en día, es lógico que cualquier noticia relacionada con <b>WhatsApp</b>, el servicio de mensajería …

Scary new malware uses a Gmail trick to steal your data

A new piece of malware that can spy on a user’s computer has been discovered, <i>Wired</i> reports, with researchers also having found a clever way for the …

The POODLE Vulnerability: Is the Dog's Bark Worse Than the Bite?

(October 27, 2014) - The instant the POODLE vulnerability within SSLv3 [CVE-2014-3536] was identified, SecurityScorecard R&D team moved to determine …

Diferencias entre malware y exploit

Escrito por<p>Generalmente estamos acostumbrados a llamado “virus” a todo tipo de software diseñado con fines maliciosos, sin embargo, actualmente los …

El ciberterrorismo es una actividad en continuo crecimiento

El <b>ciberterrorismo</b> es una actividad "en continuo crecimiento", lo que la convierte en una amenaza constante contra la que de momento no se dispone de …