“…A computer system is no more secure than the persons responsible for its operation…” Cybersecurity, is much more than information security applied to IT assets. Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. There are a big number of different vulnerabilities in relation of the type of assets: a) Denial-of-service attack b) Backdoors c) Exploits d) Direct access attacks e) Eavesdropping f) Indirect attacks There are different type of countermeasures: 1) Security and systems design 2)Read More →

Companies increasingly have more presence on the Internet, this being actively or by the action of users and customers in opinion forums, blogs, etc. As a result, increasingly monitoring the assessment that the public (Internet) makes our business or organization on the Internet is becoming more important. Becoming increasingly critical to have the proper management of corporate reputation online. Digital identity and corporate reputation online today are very important aspects that companies should not be neglected, because of not having proper management of it, is exposing the organization to risks related to privacy and security that can affect the image of the company in theRead More →

Whatsapp Sniffer: An example application that exploits security vulnerabilities Whatsapp Yes, WhatsApp, the famous messaging program that the vast majority of us use. The same program that lets you send free messages, photos, video and even our GPS location also has its dark side. Already been reported at different times and by different means WhatsApp is one of the most secure applications as it has many security holes and does not encrypt your data. This has led to different applications. I will mention one. WhatsApp Sniffer: As mentioned before, WhatsApp sends all our messages in plaintext, unencrypted. As anyone in the same WiFi can easily get theRead More →