Recursos informativos para mantener la salud de una manera natural
T: Technology ID: 601 I: 964 P: 8.53 C: 0.0021
Tricks to keep criminals from stealing your info by @sushbaral
With just a few bits of information, sophisticated criminals can steal your identity. It's more common than you'd think: According to the United States Department of Justice, 7% of U.S. residents age 16 or older were victims of identity theft in 2014.
While one of the most common forms of identity theft is using someone's credit card information to make unauthorized charges, there are other, more serious crimes that can be committed, including applying for new credit cards, filing false taxes and medical identity theft, where health care services are accessed under a false identity.
Protecting yourself from all these forms of theft requires making sure your sensitive personal information is secure.
T: Technology ID: 588 I: 990 P: 8.61 C: 0.0020
Siemens SICAM PAS Information Disclosure Vulnerabilities (Update) by @ICSCERT
This updated advisory is a follow-up to the original advisory titled ICSA-16-182-02A Siemens SICAM PAS Vulnerabilities that was published November 29, 2016, on the NCCIC/ICS-CERT web site.
Positive Technologies’ Ilya Karpov and Dmitry Sklyarov have identified two vulnerabilities in the Siemens SICAM PAS (Power Automation System). Siemens has produced a new version and mitigation instructions to address these vulnerabilities
T: Technology ID: 431 I: 1034 P: 7.44 C: 0.0019
T: Technology ID: 459 I: 1071 P: 8.24 C: 0.0019
Brazen desktop locker campaign uses social media info to make its threat more compelling to victims.
A newly discovered form of ransomware scrapes the social media accounts and local files of victims in order to tailor a customised demand, and threatens court action if it isn't paid.
Dubbed 'Ransoc' by cybersecurity researchers at Proofpoint due to its connection with social media including Facebook, LinkedIn, and Skype, this ransomware represents yet another evolution of the malicious software which has boomed during 2016.
It isn't the first ransomware variant to use social engineering in an attempt to scare the victim into paying up, but Ransoc is unique in how it attempts to turn the users' files against them -- especially if illegally downloaded files are on the system.
Perhaps because it focuses on exploiting this fear, Ransoc doesn't encrypt the victims' files in the same way as ransomware like Locky does, but rather makes its demands via the desktop or browser after infecting the system through malvertising traffic aimed at Internet Explorer on Windows and Safari on OS X.