“La ciberguerra sería una forma de terrorismo de Estado”

El libro pretende incentivar la mirada crítica entre el gran público ante los acontecimientos calificados de “ciberguerra” y alertar de la coartada que puede proporcionar el tremendismo sensacionalista en estos temas a quienes pretenden recortar libertades o privacidad.

Fuente: “La ciberguerra sería una forma de terrorismo de Estado”

Cyber criminals lead race to innovate – FT.com

Cyber criminals lead race to innovate – FT.com.


Devices to simulate cyber crimes are displayed at Interpol Global Complex for Innovation (IGCI) at its newly built building during the inauguration opening ceremony in Singapore on April 13, 2015. The Interpol Global Centre for Innovation opened its doors with officials hoping it will strengthen global efforts to fight increasingly tech-savvy international criminals. AFP PHOTO / ROSLAN RAHMAN©AFP

Cyber criminals are advancing faster than companies can defend themselves, with denial of service attacks worsening, ransoms on the rise and data breaches targeting more high-profile retailers, according to two widely followed reports from cyber security companies.

Five out of six large companies were targeted by an advanced hacker last year, up 40 per cent from the year before, according to a report compiled by Symantec, the internet security company.

He said the cyber world was similar to the business world, with criminals selling more ways to attack companies to meet demand, and copying their rivals’ most lucrative tactics.Kevin Haley, director of Symantec’s security response product and an author of the report, said the threat continued to rise because criminals had been so successful.


When it comes to surveillance, there is everything to play for | James Ball | Comment is free | theguardian.com

When it comes to surveillance, there is everything to play for | James Ball | Comment is free | theguardian.com.

Against a backdrop of hacks and terror attacks, it’s possible that surveillance powers will be further strengthened
Man looking through binoculars
‘Major players are starting to regard privacy as a selling point: Google and others are encrypting ever more of their traffic.’ Photograph: Tom Jenkins

Looking back at 2014 from the perspective of a surveillance reformer is a short and dispiriting task: almost nothing good happened.

EU’s new digital commissioner calls celebrities in nude picture leak ‘stupid’ | World news | The Guardian

EU’s new digital commissioner calls celebrities in nude picture leak ‘stupid’ | World news | The Guardian.

Germany’s Günther Oettinger says stars who put naked photos of themselves online could not count on his protection



Günther Oettinger during his hearing at the European parliament
Günther Oettinger said celebrities ‘stupid enough’ to put nude photos online did not deserve protection. Photograph: /Zuma/Rex


Former EU energy commissioner Günther Oettinger, 61, is used to accusations that he is more digitally naïve than digitally native by now. But at a hearing in front of the European parliament, the EU’s next commissioner designate for digital economy and society raised some serious questions about his suitability.


During a three-hour grilling by MEPs in Brussels, Oettinger said it would not be his job to protect stars “stupid enough to take a nude photo of themselves and put it online” – seemingly unaware that the recent leak of celebrities’ nude photographs had come about as a result of a targeted hacking attack.


Oettinger said: “We can mitigate or even eliminate some risks. But like with any technology, you can’t exclude all risks.


If someone is stupid enough as a celebrity to take a nude photo of themselves and put it online, they surely can’t expect us to protect them. Stupidity is something you can only partly save people from.”


Oettinger seemed to refer to the recent leak of nude photographs showing celebrities including actress Jennifer Lawrence and singer Rihanna, which took place after hackers targeted their victims’ iClouds. Most modern smartphones automatically store backups of photographs online, often without their users’ knowledge.


Oettinger’s comments sparked criticism from a number of MEPs and the German press. “He revealed that he still hasn’t understood the real problem behind these leaked pictures,” Green MEP Jan Philipp Albrecht told the Guardian. “Serious questions need to be asked about the security of cloud systems currently in use, and asking those questions is very much part of the job remit of the next EU commissioner for digital society.”

Filtración de fotos íntimas de famosas cuestiona la seguridad en la nube – El Mostrador

Filtración de fotos íntimas de famosas cuestiona la seguridad en la nube – El Mostrador.

Los expertos en seguridad barajan varios escenarios posibles para que los piratas informáticos tuvieran acceso libre a sus cuentas en la nube, para horror de las actrices y temor de los usuarios comunes, que en ocasiones no son conscientes de que sus datos están siendo almacenados.


La filtración de decenas de fotografías de famosos en internet puso en tela de juicio la seguridad de los servicios de almacenamiento de datos en la nube, una cuestión que muchos consumidores siempre han visto con recelo.

Las imágenes de actrices como Jeniffer Lawrence posando para la cámara desnuda en fotos privadas que no estaban pensadas para que vieran la luz corrieron como la pólvora en las redes sociales para indignación de la actriz, que ha amenazado con demandar a cualquier medio que publique sus “fotografías robadas”.

¿El culpable? Una posible brecha de seguridad en el sistema de iCloud de Apple, que facilita el almacenaje de datos en el mundo virtual sin ocupar espacio en la memoria real de los aparatos electrónicos. La compañía descartó sin embargo que sus sistemas fueran vulnerados.

Las imágenes fueron difundidas en un mensaje en el foro 4chan por una persona (o grupo) anónima, que aseguraba que fueron obtenidas de las cuentas de iCloud de Lawrence y otras famosas como Kate Upton y Mary Elizabeth Winstead.

How to protect your digital photos from hackers | Technology | theguardian.com

How to protect your digital photos from hackers | Technology | theguardian.com.

After over 100 celebrities had their sensitive photos exposed this week, here are some tips on keeping yours safe from hackers



Jennifer Lawrence with her best actress Oscar
Jennifer Lawrence with her best actress Oscar Photograph: Mike Blake/Reuters


This week, nude photos of over 100 celebrities were posted online by an anonymous source who may have have got them by hacking the Apple iCloud online storage service, or guessing the security questions needed to gain access to each individual account.


Either way it has got many people wondering about the safety of their own photos, nude or otherwise, and about whether any snapshot taken on or shared via a digital device can ever be considered secure.


So how can you keep your own images away from uninvited viewers? Here are some quick pointers.

Gang of hackers behind nude celebrity photo leak routinely attacked iCloud | Technology | The Guardian

Gang of hackers behind nude celebrity photo leak routinely attacked iCloud | Technology | The Guardian.

‘Months of hard work’ behind publication of more than 100 stars’ private photos as hackers ask for bitcoin and go underground
Jennifer Lawrence

Hackers claimed to have obtained nude pictures of Jennifer Lawrence at the end of August. Photograph: Frederic J. Brown/AFP/Getty Images

A gang of hackers who collected and traded nude pictures of female celebrities by routinely breaking into Apple‘s iCloud system were the source of private photographs leaked online, new evidence shows.

Private photos and videos of more than 100 mostly female American and British stars were released on the internet on Monday from the 4chan website, sparking condemnation from the Oscar-winner Jennifer Lawrence and other actors including Kirsten Dunst, Kate Upton and Briton Jessica Brown Findlay.

Chatroom transcripts show that “OriginalGuy”, a member of the gang who has now gone on the run, boasted that the hacking of accounts belonging to Lawrence and others “is the result of several months of long and hard work” and that “several people were in on it”.

Other chatroom transcripts show that the gang had offered nude pictures of female celebrities and athletes for sale, and others offered to “rip” the iCloud backup accounts containing photos for anyone once they were given their user name and password. The iCloud backups come from the stars’ iPhones, which automatically store photos online for up to 30 days or until they are downloaded.

The revelation comes as the FBI and Apple started investigating the security breach, the most serious ever to affect the iPhone maker and a serious blow to its efforts to push new devices expected to incorporate mobile payment functions next week.

There are more than 800 million iCloud accounts globally – but the chatroom transcripts suggest there is now a growing semi-professional trade in “ripping” iCloud accounts, posing a serious problem for Apple’s security profile.

How to protect your personal data from the next hack attack like eBay | Technology | theguardian.com

How to protect your personal data from the next hack attack like eBay | Technology | theguardian.com.

Passwords and personal data were stolen in eBay’s cyberattack. Here’s how to protect your information against future hacks



ebay password change
When companies ask for your private information you don’t always need to give it to them. Photograph: Paul Stewart/Demotix/Corbis


Ebay suffering the biggest hack of all time led to the exposure of lots of personal data including postal addresses, dates of birth and phone numbers for millions of people around the world.

While the company insists no financial information was stolen, private personal data still holds a lot of value.

But what options do users have when a site demands personal information as a condition of use, with no way of determining how secure that data will be?

“We have to take care of our data, but in many circumstances if we want to use a service we have no choice but to surrender data, stuff that is very difficult to change,” Rik Ferguson, global vice president of security research at security software firm Trend Micro, told the Guardian in the wake of the hack.

“It’s all very well telling everyone to go out and change their passwords, but you can’t go and change your postal address, telephone number, name and date of birth.”

Shopping services need your postal address to deliver goods, for instance, media services need your date of birth to verify age, and a taxi firm will need your phone number to alert you when its car arrives outside your door.

“All organisations that are hold any sort of private or financial information should absolutely be encrypting that data at all times – there is no excuse for not doing so,” says Ferguson.

Unfortunately, eBay’s hack has proved that not all companies are as good at protecting your personal data as they should be.

“All data that is shared should be done so in the knowledge that it absolutely is at risk from targeted attack. All of that data has financial value to the attacker, and they will continue to go after it.”

Ataque informático a eBay puede afectar hasta a 145 millones de usuarios – BioBioChile

Ataque informático a eBay puede afectar hasta a 145 millones de usuarios – BioBioChile.



Publicado por Gabriela Ulloa | La Información es de Agencia AFP

eBay anunció el jueves que hasta 145 millones de usuarios pueden haberse visto afectados por el ataque de piratas informáticos a su base de datos.

“A todos los usuarios de eBay se les está pidiendo que cambien sus contraseñas”, dijo un portavoz en un correo electrónico enviado por la compañía. “Al final del primer trimestre, teníamos 145 millones de compradores activos”.

La cifra es mayor a los 128 millones de usuarios activos mencionados inicialmente en el sitio web de eBay.

La empresa anunció el miércoles que había sido víctima de un ataque de piratas informáticos que entraron a su base de datos, que contenía claves y otras informaciones personales, en lo que podría constituir el mayor ataque de este tipo.

En un comunicado, eBay señaló que la base de datos atacada “incluye nombres, claves encriptadas, direcciones de correo electrónico, dirección física, número de teléfono y fecha de nacimiento de los clientes”.

Pero aclaró que “no contiene información financiera ni otra información confidencial personal”.