Monday, 30 de March de 2015

Noticias y opinión en Seguridad informática


El ITI participa en la Jornada "Fondos Europeos 2.0"

El pasado lunes 5 de marzo tuvo lugar en Valencia, en la Sede del Centro Cultural Bancaja, la Jornada “Fondos Europeos 2.0”, organizada por la Asociación de Empresas y Profesionales de Internet de la Comunitat Valenciana (AVALNET), en colaboración con la Generalitat Valenciana

(hace 3 years) | Seguir leyendo

Norton Mobile Security now available for Samsung Galaxy users

(hace 3 years) | Seguir leyendo

Cybercriminals embrace popularity of Pinterest

(hace 3 years) | Seguir leyendo

Security Researchers Seek Help Decoding DuQu Worm

(hace 3 years) | Seguir leyendo

Microsoft Research TechFest 2012: Keynote Address

(hace 3 years) | Seguir leyendo

ISMS Forum pone en marcha la primera certificación en español sobre seguridad en la nube

Los servicios de cloud computing exigen una gestión responsable ya que implican riesgos graves. Bajo esta filosofía la asociación sin ánimo de lucro ISMS Forum ha decidido impulsar la primera certificación profesional en español sobre seguridad de la información en la nube.

(hace 3 years) | Seguir leyendo

MyBioID Brings Webcam Biometric Authentication to OpenID

(hace 3 years) | Seguir leyendo

Guidance on wireless local area network security is close at hand

The National Institute of Standards and Technology (NIST) has released in final form a guide to enhanced security for wireless local area networks (WLAN). A WLAN is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications.

(hace 3 years) | Seguir leyendo

Study: Most Common Password is "Password1"

(hace 3 years) | Seguir leyendo

Poison Texts and Malicious Mobile Apps on the Rise

(hace 3 years) | Seguir leyendo

Mobile Users Bill of Rights Proposed

(hace 3 years) | Seguir leyendo

Remote access tools a growing threat to smartphones

At RSA Conference, researchers demonstrate tools that let hackers track smartphone users

(hace 3 years) | Seguir leyendo

Android mug shots have no lock and key

(PhysOrg.com) -- If Google loyalists will persist that this Internet Goliath can do no evil, they at least need to admit, based on new evidence this week, that Google can do a lot of mindless harm. A security door in Android smartphones is left open that can enable Android apps to nab your photos without your permission. In fact this has been an unsettling week in smartphone revelations. People have been informed that whether their smartphone of choice is from Apple with iOS or another vendor’s phone with Android, they can never be certain who out there in cyberspace ...

(hace 3 years) | Seguir leyendo

NaCl: Una librería de criptografía de dominio público

(hace 3 years) | Seguir leyendo

Ericsson joins OpenStack project

(hace 3 years) | Seguir leyendo

How To Evaluate Next-Generation Firewalls

A host of new network threat-protection products will be introduced at RSA, but not all firewalls are built the same.

(hace 3 years) | Seguir leyendo

How a Web Link Can Take Control of Your Phone

If Android users click the wrong link, an attacker could intercept phone calls and track their location.

(hace 3 years) | Seguir leyendo

ICBC's offering of biometric services deemed illegal

(hace 3 years) | Seguir leyendo

Big Data Can Boost Security Defenses, Has Privacy Baggage: Microsoft

Big Data analytics can provide significant insights into the network to detect threats, but it needs to be balanced with privacy concerns, speakers at the RSA conference said.

(hace 3 years, 1 month) | Seguir leyendo

Symantec mejora la protección de los datos corporativos en movilidad

Symantec ha anunciado en el Mobile World Congress las mejoras realizadas en la tecnología que dispone para asegurar los datos corporativos y potenciar la productividad empresarial en las plataformas para dispositivos móviles Android, iOS y Windows Phone 7.

(hace 3 years, 1 month) | Seguir leyendo