T:  ID: 93 I: 961 P: 4.07 C: 0.0021

   Twitter Google Facebook LinkedIn Tumblr StumbleUpon Reddit Pinterest
Tienda naturista

Recursos informativos para mantener la salud de una manera natural



tezAD2  


T: Technology ID: 601 I: 964 P: 8.53 C: 0.0021

   Twitter Google Facebook LinkedIn Tumblr StumbleUpon Reddit Pinterest
Personal, Security

Tricks to keep criminals from stealing your info by @sushbaral

 Personal, SecurityWith just a few bits of information, sophisticated criminals can steal your identity. It's more common than you'd think: According to the United States Department of Justice, 7% of U.S. residents age 16 or older were victims of identity theft in 2014.

While one of the most common forms of identity theft is using someone's credit card information to make unauthorized charges, there are other, more serious crimes that can be committed, including applying for new credit cards, filing false taxes and medical identity theft, where health care services are accessed under a false identity.

Protecting yourself from all these forms of theft requires making sure your sensitive personal information is secure.




tezAD2   


T: Technology ID: 588 I: 990 P: 8.61 C: 0.0020

   Twitter Google Facebook LinkedIn Tumblr StumbleUpon Reddit Pinterest
SICAM-PAS

Siemens SICAM PAS Information Disclosure Vulnerabilities (Update) by @ICSCERT

 SICAM-PAS

OVERVIEW


This updated advisory is a follow-up to the original advisory titled ICSA-16-182-02A Siemens SICAM PAS Vulnerabilities that was published November 29, 2016, on the NCCIC/ICS-CERT web site.
Positive Technologies’ Ilya Karpov and Dmitry Sklyarov have identified two vulnerabilities in the Siemens SICAM PAS (Power Automation System). Siemens has produced a new version and mitigation instructions to address these vulnerabilities



tezAD2  


T: Technology ID: 431 I: 1034 P: 7.44 C: 0.0019

   Twitter Google Facebook LinkedIn Tumblr StumbleUpon Reddit Pinterest
Javascript power

A history of JavaScript across the stack

 Javascript powerDid you know that JavaScript was created in 10 days? In May 1995, Brendan Eich wrote the first version of JavaScript in 10 days while working at Netscape.

For the first 10 years of JavaScript's life, professional programmers denigrated JavaScript because its target audience consisted of "amateurs". That changed in 2004 with the launch of Gmail. Gmail was the first popular web application that really showed off what was possible with client-side JavaScript. Competing e-mail services such as Yahoo! Mail and Hotmail featured extremely slow interfaces that used server-side rendering almost exclusively, with almost every action by the user requiring the server to reload the entire web page. Gmail began to work around these limitations by using XMLHttpRequest for asynchronous data retrieval from the server. Gmail's use of JavaScript caught the attention of developers around the world. Today, Gmail is the classic example of a single-page JavaScript app; it can respond immediately to user interactions and no longer needs to make roundtrips to the server just to render a new page.





T: Technology ID: 459 I: 1071 P: 8.24 C: 0.0019

   Twitter Google Facebook LinkedIn Tumblr StumbleUpon Reddit Pinterest
New ransomware

Brazen desktop locker campaign uses social media info to make its threat more compelling to victims.

 New ransomwareA newly discovered form of ransomware scrapes the social media accounts and local files of victims in order to tailor a customised demand, and threatens court action if it isn't paid.

Dubbed 'Ransoc' by cybersecurity researchers at Proofpoint due to its connection with social media including Facebook, LinkedIn, and Skype, this ransomware represents yet another evolution of the malicious software which has boomed during 2016.

It isn't the first ransomware variant to use social engineering in an attempt to scare the victim into paying up, but Ransoc is unique in how it attempts to turn the users' files against them -- especially if illegally downloaded files are on the system.

Perhaps because it focuses on exploiting this fear, Ransoc doesn't encrypt the victims' files in the same way as ransomware like Locky does, but rather makes its demands via the desktop or browser after infecting the system through malvertising traffic aimed at Internet Explorer on Windows and Safari on OS X.




Holywood   

Contactos

Teléfonos: +58 212 578 1145
Fax: +58 212 576 3892