sábado, 10 abril 2021
Visitas totales a la web: 86447642

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Seguridad de la información y protección de datos

Open source software security vulnerabilities exist for over four years before detection

It can take an average of over four years for vulnerabilities in open source software to be spotted, an area in the security community that needs to be addressed, researchers say.  According to GitHub's...

Russian, Chinese intelligence targeting Norwegian oil secrets: report

Russia, China and other countries are using espionage to glean secrets of Norway’s petroleum industry and plans by its government to cut or increase production, the Norwegian counterintelligence service PST said. In a report...

Tips para enseñar ciberseguridad a nuestros hijos

Los más pequeños de la casa empiezan a utilizar dispositivos como ordenadores, ‘tablets’ y ‘smartphones’. Por ello, deben conocer unas nociones básicas para disfrutar de una navegación segura. Desde ‘Segurilatam’ compartimos unos consejos que ayudarán a los...

Remote Workers Admit Lack of Security Training

A third of remote working employees have not received security training in the last six months. According to a survey by NinjaRMM of 400 remote workers in the UK across multiple industries, while 83% have had...

EU drug regulator says cyberattack has not disrupted work on COVID vaccines

The head of the European Union drug regulator said on Thursday the agency’s work assessing COVID-19 vaccines had not been disrupted by a cyberattack that took place in the past two weeks. U.S. drugmaker...

Las redes privadas y el malo conocido: ¿a quién confiamos nuestra vida en Internet?

El creciente mercado de las VPNs, al que ahora se suma Google, ofrece la posibilidad de ocultar nuestro tráfico en la red, pero no está exento de riesgos Cuando un cibernauta se hace a...

‘Shadow IoT’: The growing corporate security blindspot

Businesses, manufacturers, and legislators each have their own role to play to manage the risks of 'shadow IoT' With only a third of workers set to return to the office by autumn, UK businesses...

Hackers Have Infiltrated Many of Washington State’s Agencies

Governor had warned that state was target of phishing campaign Timing of attack furthers concerns about election stability Hackers have launched a sprawling, multifaceted cyber-attack against the state of Washington, according to two people familiar...

Major hospital system hit with cyberattack, potentially largest in U.S. history

Computer systems for Universal Health Services, which has more than 400 locations, primarily in the U.S., began to fail over the weekend. A major hospital chain has been hit by what appears to be...

Companies Facilitating Ransomware Payments Could Face Penalties

Companies that assist victims of ransomware attacks in making payments to criminal hackers could face penalties, according to a new advisory from the U.S. Department of the Treasury. The civil penalties would apply to those who...

These ‘smart’ home devices could be the biggest security threat to your entire company

From teddy bears to Teslas, nothing is safe, experts warn So-called 'smart' devices could be posing a major security risk to not just your home network, but to that of your business too, experts...

Woman becomes first healthcare cyberattack death after German hospital was forced to turn her away when hackers deactivated their computers

Woman died en route to another hospital after being turned away from first oneDusseldorf's University Clinic couldn't admit her because its systems were down The cause was a Sept. 10 cyberattack that the hospital is yet to recover...

Smart Device Hacks Are Up Since the Pandemic Started

Cybersecurity researchers say smart devices are playing an increasing role in attacks against organizations. With many working remotely, unsecured smart devices offer an unprecedented vector for attack. As the coronavirus pandemic spread this year,...

US Army combines fake hacks, natural disaster simulation to test municipal responses

Cybersecurity experts from the U.S. military and the private sector have spent recent weeks working with two American cities to test their ability to respond during a simulated cyberattack layered with several simulated physical disruptions. The virtual exercise, which has feigned...

US Army report says many North Korean hackers operate from abroad

US Army says many North Korean hackers are actually located outside the hermit kingdom, in countries like Belarus, China, India, Malaysia, and Russia. North Korea has at least 6,000 hackers and electronic warfare specialists...

Últimas noticias

Alaska, un erial que Rusia no dudó en vender

Españoles y británicos intentaron arrogarse este territorio, sobreexplotado por los rusos, que finalmente se deshicieron de él.

Un retén 24 horas atenderá las emergencias en las zonas verdes de Madrid

La Junta de Gobierno aprueba el nuevo contrato, que entrará en vigor en agosto, obligará a mantener una plantilla mínima de más...

Telefónica despide al jefe del negocio de ciberseguridad por un presunto fraude

Su salida y la de otros tres directivos se produjo antes de la remodelación completa de la cúpula de Telefónica Tech

Muere Dick Hoyt, el padre que convirtió a su hijo con parálisis cerebral en un Ironman

Juntos participaron en más de 1.000 carreras y triatlones, incluyendo 32 ediciones del Maratón de Boston Dick Hoyt participó en...

¿Qué puedo hacer para que no okupen mi casa?

La Policía Nacional elabora una guía de consejos y actuaciones para los propietarios ante la okupación ilegal de viviendas