David Julian Garbayo

11 Flips | 1 Magazine | 1 Following | @palangui | Keep up with David Julian Garbayo on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “David Julian Garbayo”

La seguridad del pago 'online', punto débil de la banca

Mientras Europa exige métodos de pago más seguros como la doble autenticación, la banca sigue estancada en otros obsoletos como las tarjetas de …

How Spies Stole the Keys to the Encryption Castle

<b>AMERICAN AND BRITISH</b> spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys …

Visual hacking exposed - Help Net Security

While most security professionals focus on thwarting data breaches from cyber attacks, a new study exposes visual hacking, a low-tech method used to …

Cyber-attacks

FBI captures its most wanted cyber criminal

<b>The Untouchables</b> have finally fingered the collar of the world’s most wanted “cybercriminal”.<p>Noor Aziz Uddin, 52, was wanted for his alleged …

Malware infected as many Android devices as Windows laptops in 2014

A new report published by Alcatel-Lucent’s Motive Security Labs division says that no less than 16 million mobile devices were hit by malware last …

Uh-oh: Samsung smart TVs don't encrypt your captured voice data

Samsung does not encrypt voice recordings that are collected and transmitted by its smart TVs to a third party service, even though the company has claimed that it uses encryption to secure consumers’ personal information.<p>A week ago, the revelation that Samsung collects words spoken by consumers …

Information Security

Five free OS X data encryption utilities | ZDNet

Introduction<p>Running OS X and want to keep your data safe from prying eyes? Whether you're using your system for work or play, keeping your data …

Information Systems

Automate Security Audit

Netool is a toolkit written in bash, python and ruby and provides easy automation for frameworks like Nmap, Driftnet, Sslstrip, Metasploit and …

10 Ways Employees Compromise Their Company's Cyber Security

In a perfect world, employees would have excellent cyber security habits and never put the company’s network or data at risk. This isn’t a perfect world, however, and the reality is employees do a lot of things that mess with a CISO’s on-the-job sanity.<p>According to a survey commissioned by Sungard …

XCODE - Get logs, passwords, and files from a target with Office

0 <br>1 <br>1 <br>1 <br>4 <br>0 <br>0<p><b>The Xcode tool / software is made in purpose of education ONLY, usage of it is at Your own risk and responsibility. All possible damage</b> …

DNS-based DDoS, Author: Daniel Wesemann

ISC reader Zach reports that his company currently sees about 4Gbps of DNS requests beyond what is "normal", and all seem to originate from …

DNS Server