sábado, 18 septiembre 2021
Visitas totales a la web: 86813464

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Seguridad de la información y protección de datos

La Casa Blanca lanza iniciativas de seguridad de la cadena de suministro y proyectos a medida que las empresas prometen miles de millones en...

El gobierno de Biden anunció el miércoles iniciativas para reforzar la cadena de suministro y la seguridad de los ductos de gas natural, luego de una cumbre de seguridad cibernética del sector privado en la Casa Blanca,...

Attacks against industrial networks will become a bigger problem. We need to fix security now

Industrial infrastructure, including electricity grids, oil and gas facilities, manufacturing plants and more, has become a tempting targets for cyber attackers, whether they're criminal gangs attempting to make money from ransomware attacks, or nation-state-backed hacking operations out...

Group says China hackers infiltrated Vatican ahead of expected talks

A cybersecurity firm has concluded that Chinese hackers penetrated the Vatican’s computer networks in recent months during the lead-up to negotiations between the Catholic Church and Beijing. The attack, reported Tuesday by the Massachusetts-based firm Recorded...

Supply Chains Have a Cyber Problem

In May, JBS S.A., the world's largest meat producer, suffered a ransomware attack disrupting beef production in the United States, Canada, and Australia. That came after another ransomware attack, then against Colonial, disrupted gas supplies in the eastern United States and drove...

Contra el terrorismo en la web

Aunque nada puede sustituir a la lucha sobre el terreno contra el terror, impedir que su huella se extienda y la exaltación de su brutalidad infecte mentes e imágenes, es igual de necesario. Explica...

Open source software security vulnerabilities exist for over four years before detection

It can take an average of over four years for vulnerabilities in open source software to be spotted, an area in the security community that needs to be addressed, researchers say.  According to GitHub's...

Russian, Chinese intelligence targeting Norwegian oil secrets: report

Russia, China and other countries are using espionage to glean secrets of Norway’s petroleum industry and plans by its government to cut or increase production, the Norwegian counterintelligence service PST said. In a report...

Tips para enseñar ciberseguridad a nuestros hijos

Los más pequeños de la casa empiezan a utilizar dispositivos como ordenadores, ‘tablets’ y ‘smartphones’. Por ello, deben conocer unas nociones básicas para disfrutar de una navegación segura. Desde ‘Segurilatam’ compartimos unos consejos que ayudarán a los...

Remote Workers Admit Lack of Security Training

A third of remote working employees have not received security training in the last six months. According to a survey by NinjaRMM of 400 remote workers in the UK across multiple industries, while 83% have had...

EU drug regulator says cyberattack has not disrupted work on COVID vaccines

The head of the European Union drug regulator said on Thursday the agency’s work assessing COVID-19 vaccines had not been disrupted by a cyberattack that took place in the past two weeks. U.S. drugmaker...

Las redes privadas y el malo conocido: ¿a quién confiamos nuestra vida en Internet?

El creciente mercado de las VPNs, al que ahora se suma Google, ofrece la posibilidad de ocultar nuestro tráfico en la red, pero no está exento de riesgos Cuando un cibernauta se hace a...

‘Shadow IoT’: The growing corporate security blindspot

Businesses, manufacturers, and legislators each have their own role to play to manage the risks of 'shadow IoT' With only a third of workers set to return to the office by autumn, UK businesses...

Hackers Have Infiltrated Many of Washington State’s Agencies

Governor had warned that state was target of phishing campaign Timing of attack furthers concerns about election stability Hackers have launched a sprawling, multifaceted cyber-attack against the state of Washington, according to two people familiar...

Major hospital system hit with cyberattack, potentially largest in U.S. history

Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend. A major hospital chain has been hit by what appears to be...

Companies Facilitating Ransomware Payments Could Face Penalties

Companies that assist victims of ransomware attacks in making payments to criminal hackers could face penalties, according to a new advisory from the U.S. Department of the Treasury. The civil penalties would apply to those who...

Últimas noticias

La expedición Malaspina: una odisea moderna por la ciencia

Si habito en tu memoria no estaré solo…Mario Benedetti. Es sabido que la ilustración en España fue...

Casas diminutas para personas sin hogar, una solución transitoria en Los Ángeles

Los Ángeles ha levantado pequeñas aldeas de casas de 6m2...

Seguridad Física. Principios

Principios de Seguridad Física está destinado a servir tres propósitos. En primer lugar los autores revisores y otros colaboradores confían en que...

Drones, fusiles de asalto y casas de cambio: las nuevas rutas y métodos del ‘narco’ en Andalucía

La presión policial en el Campo de Gibraltar (Cádiz) ha desplazado a otras provincias la actividad criminal concentrada antes en la comarca...

Características del ciberespacio que favorecen las actuales acciones de desinformación y decepción

Articulo cedido por: Resumen:El ciberespacio resulta especialmente adecuado para la realización de acciones...