The Tech Occur
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Número 8 – Abril 2019
THIBER DIGEST Informe mensual de ciberseguridad Nº 8 ABRIL 2019 Análisis de la actualidad internacional Directiva copyright: la tasa, los filtros, los memes y un poco de fake news CIBERATAQUES MARZO 2019 COMENTARIO THIBER: TIDE SPRINT: acelerando la transformación digital de la OTAN Desarrollado por THIBER DIGEST ÍNDICE Informe mensual de ciberseguridad Nº 8 ABRIL 2019 03 13 Comentario THIBER Análisis de la actualidad TIDE SPRINT: acelerando la internacional transformación digital de la Directiva copyright: la tasa, OTAN los filtros, los memes y un poco de fake news 05 20 Informes y análisis Libro recomendado sobre ciberseguridad El cisne negro publicados en marzo de 2019 06 21 Análisis de actualidad Eventos Ciberataques marzo 2019 Comentario THIBER: TIDE SPRINT: AUTOR: Guillem Colom, acelerando la Director de THIBER transformación digital de la OTAN TIDE SPRINT: acelerando TIDE SPRINT: acelerando Comentario THIBER: Comentario la transformación digital de OTAN 3 Fuente: Allied Command Transformation (ACT) La Alianza Atlántica necesita dotarse de capacidades tecno- En este contexto, surge TIDE (Think Tank for Information De- lógicas innovadoras y flexibles que les permita contrarrestar cision and Execution), uno de los conceptos liderados por cualquier amenaza potencial que pudiese surgir en el actual ACT, y cuyos objetivos principales son la innovación de las contexto estratégico, caracterizado este por su compleji- capacidades TI de la Alianza (mediante la reutilización de las dad, impredecibilidad y continua transformación. capacidades existentes y/o la adopción de tecnologías de última generación) y promover la interoperabilidad entre la El Mando Aliado de Transformación (Allied Command Trans- OTAN y sus estados miembros. formation, ACT) es el responsable de liderar la transformación militar y las capacidades de la alianza, utilizando conceptos y TIDE pretende ser un “foro abierto” para la colaboración en- doctrinas que mejoren la eficacia operativa de la OTAN. -
The Seeds of Nationalism of Money That Has Been Abandoning Mr
AT AGE 86, YOTAM OTTOLENGHI MUSEUMS A TRAIL- REMINISCES ON THE BEGIN TO BLAZING RICHNESS OF CITRUS, TAKE ON SCULPTOR Weekend WITH A RECIPE, TOO CRITICAL FORGES PAGE 27 | FOOD AND DRINK ISSUES AHEAD IN OF OUR THE ART TIMES ‘THE HANDMAID’S TALE’ WORLD VANESSA FRIEDMAN PAGE 22 | AND WHAT IT MEANS WEEKEND IN THE AGE OF TRUMP PAGE 19 | ON PRICE, POPULISM WEEKEND AND POLITICS ... AND PAGE 26 | BOOKS PEARLS AND PANTS PAGE 21 | STYLE .. INTERNATIONAL EDITION | SATURDAY-SUNDAY, MARCH 18-19, 2017 Dutch vote As Fed acts, not a defeat tremors are of populism felt across Cas Mudde the globe CIUDAD JUÁREZ, MEXICO OPINION Rate increase is driving The parliamentary election in the Netherlands on Wednesday was pre- money out of less affluent dicted to be the next populist show of nations, bringing hardship strength after the Brexit referendum and Donald Trump’s election. The Dutch BY PETER S. GOODMAN, would be the first of a number of Euro- KEITH BRADSHER AND NEIL GOUGH pean countries to succumb to the right- wing populists’ siren songs in 2017, with Francisca Hervis Reyes and her family the French not far behind. have persevered on the border, working It didn’t work out that way. in factories more than 1,300 miles from Geert Wilders, who is all too often their hometown. They remained even as described as a bleach blond or referred deadly warfare between drug cartels to as “the Dutch Trump,” did not defeat turned this city into one of the most dan- the conservative prime minister, Mark gerous on the planet. -
Mcafee Threats Report: Third Quarter 2012
Report McAfee Threats Report: Third Quarter 2012 By McAfee Labs Table of Contents Operation High Roller 4 Dynamically hiding the evidence 5 Links to European and Asia-Pacific campaigns 6 Mobile Malware 7 General Malware Threats 9 Ransomware 15 Network Threats 16 Database Security 19 Web Threats 20 Phishing 23 Spam URLs 25 Messaging Threats 25 Spam volume 26 Botnet breakdowns 28 New botnet senders 29 Drug spam a popular subject 32 Cybercrime 33 Demanding ransom 33 Crimeware tools 34 Actions against cybercriminals 35 Hacktivism 36 A touch of cyberwarfare 37 About the Authors 39 About McAfee Labs 39 About McAfee 39 2 McAfee Threats Report: Third Quarter 2012 Threat analysis, in many ways, is equal parts art and science. At McAfee Labs we try to apply as much math and analytical rigor to our analysis as we can, but we often cannot see the whole picture. We must also interpret and surmise many things. German philosopher Friedrich Nietzsche wrote “There are no facts, only interpretations.” This bit of wisdom strikes us as quite relevant to analyzing threats. Depending on one’s perspective, threats can mean many things. Spam, for example, looks like it’s on a steady decline when viewed globally, but when looked at locally or by country we see tremendous variations. The same can be said of many threat vectors we analyze in this edition of the McAfee Threats Report: One’s perspective makes all the difference. The trends within the threats landscape seem at times akin to predicting weather patterns or stock prices. We know they will go up and they will go down. -
U.S. Intelligence: Russia Tried to Con the World with Bogus Missile Ankit Panda Daily Beast, 02.18.19
U.S. Intelligence: Russia Tried to Con the World With Bogus Missile Ankit Panda Daily Beast, 02.18.19 The Russians hyped a cruise missile launch earlier this year. But a briefing by the CIA and a second agency determined that it was essentially a hoax. The top secret treason trial of a cybercrime analyst wrapped up this week after months of testimony behind the closed doors of a Moscow military court, with prosecutors reportedly demanding 20 years in a penal colony for the crime of allegedly snitching on Russian cybercriminals to American investigators. A verdict is expected on February 27. Ruslan Stoyanov is a one-time cybercop who went on to head the computer incidents investigation team at the cybersecurity firm Kaspersky Lab. He stood trial with Col. Sergei Mikhailov, who was second in command in the cybercrime division of Russia’s federal security service, the FSB, until December 2016, when his fellow agents ended an internal meeting by abruptly shoving a black bag over his head and dragging him off to prison. The men are accused of passing confidential material from a 2010 cybercrime and spam investigation to an analyst at a U.S. security firm. But the trial ended without the court hearing from a key figure in the prosecution’s theory: the analyst herself, who says the Russian military appears to be on the verge of convicting Stoyanov for treason he didn’t commit. “I formally requested to testify, and they said no,” said Kimberly Zenz, a veteran cybercrime threat analyst who was caught up in the Russian intrigue while working for Verisign’s iDefense threat intelligence division. -
Part 2: a Practical Guide for International Players
An international study by E-COMMERCE IN RUSSIA Part 2: A practical guide For international players WITH SUPPORT FROM Main research partners UPDATED JAN. 2020 ABOUT THIS STUDY The result of a six-month research effort involving more than 50 market experts and players, this report highlights the main facts, numbers and trends of Russian e-commerce in an international perspective. It can be requested at no charge via https://www.ewdn.com/ecomreport q ADVERTISING OPPORTUNITIES With participation from major partnering resources, this report and its further updates will be viewed by thousands of industry professionals and investors, both in Russia and across the world. You may get featured in it via a promotional page, expert content or a case study made jointly with our team at the highest editorial standards. To inquire about these opportunities, or if your would like to get involved in the distribution of this report, please contact us at [email protected] q COPYRIGHT AND REPUBLICATION RULES The content of this report is protected by copyright. Individuals and organizations can, without prior authorization and free of charge, copy and publish without limitation short extracts in the form of quotes. This report must be clearly indicated as the source with a link to https://www.ewdn.com/ecomreport. To copy and republish very large extracts, or the full report, or for other editorial cooperation opportunities, please contact Head of Research Adrien Henni at [email protected] q INACCURACIES AND UPDATES We will be pleased to receive any notices of inaccuracies or information we may have missed.