Marcus Hutchins: cybersecurity experts rally around arrested WannaCry ‘hero’ | Technology | The Guardian

The 23-year-old has fallen from grace as he battles accusations of involvement in a malware scam, but the cyber community has protested his innocence

Fuente: Marcus Hutchins: cybersecurity experts rally around arrested WannaCry ‘hero’ | Technology | The Guardian


Sweden scrambles to tighten data security as scandal claims two ministers | World news | The Guardian

Besides the entire national driver’s licence database, the records potentially included information on intelligence agents, military and police transport and personnel, people with criminal records and those in witness protection programmes, Swedish media have reported.

Fuente: Sweden scrambles to tighten data security as scandal claims two ministers | World news | The Guardian


Reuben Paul, el niño de 11 años que hackea ositos de peluche y ya tiene su propia empresa de ciberseguridad – El Mostrador

Este joven estadounidense, un prodigio de la informática, se llama a sí mismo “ciberninja” y a través de su propia empresa quiere “educar a la gente, enseñarles cosas nuevas” sobre la seguridad en el mundo cibernético.

Fuente: Reuben Paul, el niño de 11 años que hackea ositos de peluche y ya tiene su propia empresa de ciberseguridad – El Mostrador


Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador

Expertos en informática advierten que un nuevo ataque global con un brote de ransomware es “inminente” y que incluso podría ser lanzado el lunes. BBC Mundo te cuenta los detalles y cómo protegerte de estos virus.

Fuente: WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


¿Qué hacen las páginas de citas online para proteger a sus usuarios? – El Mostrador

Las autoridades advierten de que el fraude en las webs de citas está aumentando. La pregunta es: ¿cómo protegen estos portales a sus miembros?

Fuente: ¿Qué hacen las páginas de citas online para proteger a sus usuarios? – El Mostrador


Defender los derechos humanos en el entorno tecnológico. Nuestra apuesta desde América Latina | Derechos Digitales

Derechos Digitales comienza hoy una nueva etapa de trabajo en defensa de los derechos fundamentales en América Latina. Nuestro camino se dirige a la identificación de un entorno cambiante para los usuarios, los gobiernos y la sociedad civil en general.

Fuente: Defender los derechos humanos en el entorno tecnológico. Nuestra apuesta desde América Latina | Derechos Digitales


Científicos ya piensan en cómo revertir un apocalipsis fruto de la Inteligencia Artificial – El Mostrador

Consistió en una suerte de juegos apocalípticos de IA que organizaron a alrededor de 40 científicos, expertos en ciberseguridad y especialistas en políticas en grupos de atacantes (equipo rojo) y defensores (equipo azul) que reprodujeron escenarios catastróficos en IA, desde manipulación del mercado bursátil hasta guerra global.

Fuente: Científicos ya piensan en cómo revertir un apocalipsis fruto de la Inteligencia Artificial – El Mostrador


Russian cybersecurity experts suspected of treason linked to CIA | World news | The Guardian

Two of Moscow’s top cybersecurity officials are facing treason charges for cooperating with the CIA, according to a Russian news report.The accusations add further intrigue to a mysterious scandal that has had the Moscow rumour mill working in overdrive for the past week, and comes not long after US intelligence accused Russia of interfering in the US election and hacking the Democratic party’s servers.

Fuente: Russian cybersecurity experts suspected of treason linked to CIA | World news | The Guardian


¿Por qué China prohibió los juegos de realidad aumentada? – El Mostrador

El gigante asiático ha decidido prohibir aplicaciones para celulares como el mundialmente popular Pokémon Go porque “amenaza a la seguridad” de los ciudadanos. ¿A qué se refieren los censores y cuáles son esos riesgos?

Fuente: ¿Por qué China prohibió los juegos de realidad aumentada? – El Mostrador


With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?

Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?

Fuente: With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?


Google and Microsoft in war of words over bug disclosure | Technology | The Guardian

The bug, which allows privilege escalation in Windows, was discovered by Google on 21 October. An attacker can use it to access things they should not be able to, and according to Google, it is already being actively exploited in the wild.

Fuente: Google and Microsoft in war of words over bug disclosure | Technology | The Guardian


WhatsApp asked by European regulators to pause sharing user data with Facebook | Technology | The Guardian

The letters come as European nations express concern over WhatsApp’s changes and Yahoo’s mishandling of its hack and the revelations over US intelligence operations.

Fuente: WhatsApp asked by European regulators to pause sharing user data with Facebook | Technology | The Guardian


DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian

The cyber-attack that brought down much of America’s internet last week was caused by a new weapon called the Mirai botnet and was likely the largest of its kind in history, experts said.

Fuente: DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees

Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.

Fuente: NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees


NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian

Shares183Save for laterThe FBI has arrested a National Security Agency contractor on suspicion of the theft of top secret classified data and documents in an alleged security breach at the same intelligence agency whose spy secrets were exposed by Edward Snowden.

Fuente: NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian


Payments networks battle new breed of criminals in cyber attacks – FT.com

Payments networks — whether Swift or the latest peer-to-peer money transfer app — are only as trustworthy as their weakest link. Even if data are encrypted in transit, each bank or individual on a network must be able to reliably prove who they are — and authentication in payments still has a way to go.

Fuente: Payments networks battle new breed of criminals in cyber attacks – FT.com


Yahoo faces questions over delay in data breach revelation – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Work & Careers Life & Arts Try the new FT.comLast updated: September 23, 2016 11:59 pmYahoo faces questions over delay in data breach revelationNic Fildes and Madhumita Murgia in London, Tim Bradshaw in San Francisco Share Print Clip Commentsepa05552696 The Yahoo logo is pictured on a computer monitor in Taipei, Taiwan, 23 September 2016. According to news reports on 23 September, around 500 million Yahoo account users information had been stolen or hacked on its network in 2014. EPA/RITCHIE B. TONGO©EPAYahoo chief executive Marissa Mayer and her board are facing serious questions over the handling of the largest-ever cyber attack recorded, as customers, regulators and even its new owners search for answers on why a two-year-old data breach has only just come to light.

Fuente: Yahoo faces questions over delay in data breach revelation – FT.com


Someone Is Learning How to Take Down the Internet – Schneier on Security

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.

Fuente: Someone Is Learning How to Take Down the Internet – Schneier on Security


El MI6 contratará casi mil espías para combatir el terrorismo – El Mostrador

Según afirmaciones de Younger publicadas por The Times el mundo digital “representa una amenaza porque los que se oponen a nosotros pueden utilizar esta capacidad para tener acceso a nuestras actividades, lo que significa que tenemos que cambiar completamente la forma en que hacemos las cosas”.

Fuente: El MI6 contratará casi mil espías para combatir el terrorismo – El Mostrador


Google Chrome Will Start Shaming Unencrypted Websites in January | Motherboard

Starting in January of 2017, Google’s Chrome browser will start flagging some websites that don’t use web encryption as “Not Secure”—the first step in Google’s eventual plan to shame all sites that don’t use encryption.

Fuente: Google Chrome Will Start Shaming Unencrypted Websites in January | Motherboard


Amistosa Caja Anti Vigilancia | Derechos Digitales

Con mucho orgullo y de manera oficial, Derechos Digitales presenta hoy la Amistosa Caja Anti Vigilancia, un conjunto de herramientas y consejos prácticos que te ayudarán a resguardar mejor tu información personal y la de otros. Pareciera ser que hoy más que nunca es necesario proteger nuestros datos, pues siempre hay alguien intentando acceder a ellos: empresas privadas, cibercriminales y el mismo Estado.

Fuente: Amistosa Caja Anti Vigilancia | Derechos Digitales


Internet or Splinternet? by Joseph S. Nye – Project Syndicate

The Internet is a network of networks. Each of the separate networks belongs to different companies and organizations, and they rely on physical servers in different countries with varying laws and regulations. But without some common rules and norms, these networks cannot be linked effectively. Fragmentation – meaning the end of the Internet – is a real threat.

Fuente: Internet or Splinternet? by Joseph S. Nye – Project Syndicate


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian

The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

Fuente: Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian


El pionero satélite cuántico chino que puede revolucionar las comunicaciones del mundo – El Mostrador

Se trata de un millonario y ambicioso proyecto apodado QUESS, que pone al gigante asiático a la cabeza de una revolución tecnológica: crear nuevas redes de comunicación globales a prueba de hackeos.

Fuente: El pionero satélite cuántico chino que puede revolucionar las comunicaciones del mundo – El Mostrador


Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners

National Security Agency whistleblower Edward Snowden has been working with prominent hardware hacker Andrew “Bunnie” Huang to solve this problem. The pair are developing a way for potentially imperiled smartphone users to monitor whether their devices are making any potentially compromising radio transmissions. They argue that a smartphone’s user interface can’t be relied on to tell you the truth about that state of its radios. Their initial prototyping work uses an iPhone 6.

Fuente: Edward Snowden’s New Research Aims to Keep Smartphones From Betraying Their Owners


Brussels to tighten grip on web services in telecoms shake-up – FT.com

Brussels will tighten its regulatory grip over online services such as WhatsApp and Skype in a radical overhaul of the EU’s rules on telecoms due out in September. According to internal documents seen by the Financial Times, so-called “over-the-top” services operated by groups such as Facebook, which runs WhatsApp, and Skype owner Microsoft would in future have to abide by “security and confidentiality provisions” demanded by the EU.

Fuente: Brussels to tighten grip on web services in telecoms shake-up – FT.com


Falta de limites sobre balões vigilantes nas Olimpíadas põe privacidade da população em xeque – Gizmodo Brasil

Diante deste cenário, o país tem se esforçado em mostrar que é seguro com a prisão de suspeitos de terrorismo, o aumento de contingente de forças de ordem recrutadas para jogos — são milhares de policiais, soldados do exército e da guarda nacional — e também com o uso da tecnologia. Um dos destaques é a aquisição de quatro balões de vigilância comprados pelo governo do Rio de Janeiro.

Fuente: Falta de limites sobre balões vigilantes nas Olimpíadas põe privacidade da população em xeque – Gizmodo Brasil


¿Dónde y al alcance de quién está toda la información sobre ti? (y por qué debe importarte) – El Mostrador

Más de la mitad de la capacidad de almacenamiento de la nube que se puede rentar está controlada por cuatro corporaciones

Fuente: ¿Dónde y al alcance de quién está toda la información sobre ti? (y por qué debe importarte) – El Mostrador


La grave falla que afecta a 900 millones de teléfonos Android y cómo saber si el tuyo es vulnerable – El Mostrador

La firma de seguridad Checkpoint detectó varias fallas de seguridad que pueden dar a potenciales atacantes acceso a los datos en más de 900 millones de dispositivos Android. ¿De qué se tratan? ¿Y cómo puedes averiguar si te afectan?

Fuente: La grave falla que afecta a 900 millones de teléfonos Android y cómo saber si el tuyo es vulnerable – El Mostrador


Cyber experts warn of hacking capability of drones – FT.com

Hackers could employ flying drones to buzz office buildings and intercept corporate communications, cyber security researchers have warned ahead of the industry’s annual gathering.A simple drone can be used to attack WiFi, bluetooth and other wireless connections such as those used in contactless payment cards, making it as easy to intercept information in a private building as it is in a public café.

Fuente: Cyber experts warn of hacking capability of drones – FT.com


America’s broken digital copyright law is about to be challenged in court | Technology | The Guardian

The Electronic Frontier Foundation is suing the US government over ‘unconstitutional’ use of the Digital Millennium Copyright Act

Fuente: America’s broken digital copyright law is about to be challenged in court | Technology | The Guardian


Sextear o no sextear en México

Con la colaboración de autoridades mexicanas, una campaña pide a la gente que no haga sexting: la práctica en la que una persona envía a otra mensajes con contenido sexual, incluyendo fotografías o videos de desnudos, por medio de internet.Sin embargo, algunos activistas y académicos consideran que esta tiene un enfoque inadecuado, e incluso moralista.

Fuente: Sextear o no sextear en México


¿Para qué necesitamos anonimato y por qué es importante defenderlo? | Derechos Digitales

En la medida en que nuestras vidas transcurren en internet de forma creciente e interactuamos cada vez más con tecnologías digitales, también se vuelve más sencillo identificarnos y recolectar información sobre nuestros hábitos, gustos, opiniones e incluso sobre nuestros cuerpos.

Fuente: ¿Para qué necesitamos anonimato y por qué es importante defenderlo? | Derechos Digitales


Brussels set to sign off on transatlantic data transfer rules – FT.com

The new deal, called Privacy Shield, will provide a legal means for businesses to transfer personal data online — whether payslips, pictures or healthcare data — to the US from the EU without falling foul of the bloc’s strict privacy laws.

Fuente: Brussels set to sign off on transatlantic data transfer rules – FT.com


Filtrada World-Check, la base de datos usada por Gobiernos y bancos con sospechosos de terrorismo

La base de datos contendría 2.240.000 entradas con categorías como “individuo político”, “corporativo”, “militar”, “Crimen-narcóticos” y “terrorismo”. Estos datos estarían siendo utilizados por más de 300 gobiernos y agencias de inteligencia, nueve de los diez mejores bufetes de abogados o 49 de los 50 bancos más grandes del mundo. En total, se estima que son 6.000 clientes los que la utilizan en 170 países.

Fuente: Filtrada World-Check, la base de datos usada por Gobiernos y bancos con sospechosos de terrorismo


Security Tips Every Signal User Should Know

Although Signal is well-designed, there are extra steps you must take if you want to maximize the security for your most sensitive conversations — the ones that could be misinterpreted by an employer, client, or airport security screener; might be of interest to a snooping government, whether at home or abroad; or could allow a thief or hacker to blackmail you or steal your identity.

Fuente: Security Tips Every Signal User Should Know


The riff: Taking away the internet does not make you safe – FT.com

Around the world, computers controlling critical infrastructure such as nuclear power stations are isolated from the internet. In Singapore, however, the government has taken security a step further by imposing an “air gap” on the entire public sector.From May next year, Singapore’s civil servants will no longer have direct access to the web from their work computers.

Fuente: The riff: Taking away the internet does not make you safe – FT.com


Take that, FBI: Apple goes all in on encryption | Technology | The Guardian

The new feature is just the latest move towards more widespread encryption in consumer technology products following Apple’s standoff with the FBI earlier in 2016, in which it refused to help the agency weaken its own security processes to access information on an iPhone belonging to a terrorist. Facebook and Google both pledged support for Apple during the fight, and both are subsequently reported to be planning encrypted versions of their messaging apps.

Fuente: Take that, FBI: Apple goes all in on encryption | Technology | The Guardian


Demand for digital services leaves banks open to more risk – FT.com

The majority of top bankers — 76 per cent — “strongly agree” that they are open to more risks than they can manage as a result of digital developments, according to a global survey of 300 managers by consultancy Accenture.

Fuente: Demand for digital services leaves banks open to more risk – FT.com