Ransomware criminals chatting up victims, offering to delay deadlines, showing how to obtain Bitcoin, dispensing the kind of customer support that consumers lust for from their cable and mobile plan providers, PC and software makers? What's not to love? [ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]Finnish security vendor F-Secure yesterday released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The back-and-forth not only put a spotlight on the gang's customer support chops, but, said a company security advisor, illustrated the [...]
sex, fev , 2017
A lawsuit accuses a former Google engineer of taking confidential files before quitting. Waymo, formerly Google's self-driving car unit, is suing Uber and its autonomous truck unit, Otto, for allegedly using stolen technology. The suit accuses former Google engineer Anthony Levandowski, now leading Uber's self-driving efforts, of downloading thousands of confidential files before leaving to co-found Otto. Further complicating things, Waymo parent Alphabet is an investor in Uber. — [Johana Bhuiyan / Recode] Two prominent Uber seed investors, Freada Kapor Klein and Mitch Kapor, criticized the "toxic patterns" in the company's behavior and voiced doubts about the independence of the investigation [...]
sex, fev , 2017
Upthere CEO Chris Bourdon answers your questions about the cloud on Too Embarrassed to Ask. Seemingly every company wants to use their particular cloud to either back up your data or access it from multiple devices — but is that really worth the cost? It depends on how much you value convenience, Upthere CEO Chris Bourdon says. Speaking on the latest episode of Too Embarrassed to Ask, Bourdon said the different cloud storage services all have different strengths. “If you're looking for a place to keep your photos — other than Upthere — I think Google Photos does a great job,” Bourdon [...]
sex, fev , 2017
The company is continuing to expand the reach of its next-generation texting app. The next time you receive a text on an Android device saying your prescription is ready, you may notice a familiar calligraphic “W” in the icon bubble of the sender. Google has announced a new platform to provide businesses an upgraded alternative to traditional SMS texting, allowing them to brand text messages, alerts and other communications, in addition to giving them access to features not available through SMS, such as group texting, high-resolution photos, and read receipts. (Similar to Apple's built-in iMessage, or apps like Line and Facebook [...]
sex, fev , 2017
A new survey shows Bay Area residents are warier than before about its homegrown industry People living in California trust their homegrown tech industry a lot less than last year. They also think the rich get richer without helping anyone else and that tech needs more regulations and less tax breaks. And those surveyed want tech to do something about all the societal and local problems they cause, including retraining those whose jobs have been made obsolete by technology and even improving traffic. That's according to Edelman's new annual Trust Barometer of trends globally and in California, which was [...]
qui, fev , 2017
Krikorian joined Uber after more than five years at Twitter to head up the company's Pittsburgh headquarters. Uber is losing yet another top engineer from its self-driving arm in the aftermath of its acquisition of self-driving trucking startup Otto. Raffi Krikorian, the senior director of engineering at Uber's Advanced Technologies Center in Pittsburgh, is stepping down from his role at the company, sources told Recode. Krikorian, who was previously the vice president of engineering at Twitter, joined Uber's Advanced Technology Group in March 2015 to lead the more than 50 roboticists and engineers that the ride-hail company recruited from Carnegie Mellon [...]
qui, fev , 2017
But tech's protests against the discriminatory move are quieter than those against the immigration ban. Salesforce, the enterprise company that has taken high-profile stands against anti-LGBT initiatives in states like Indiana and North Carolina, was the third tech giant to come out against President Donald Trump's move this week to repeal guidelines around transgender bathroom use in public schools. Said Salesforce in a statement: “Every child deserves an opportunity to succeed free of fear, anxiety, and threats of discrimination. Salesforce strongly believes that all students, including transgender students, should be treated as equals, and we disagree with any effort to limit [...]
qui, fev , 2017
But the tool remains in wide use. Google researchers have cracked a key internet security tool, and hope their finding will spur an end to widespread use of the encryption method. The team announced Thursday that they had succeeded in breaking SHA-1, or Secure Hash Algorithm 1, encryption in a use case involving a pair of PDF documents. What this means is that a method of internet security that has for years been known to be theoretically vulnerable has now been proven vulnerable. And what that means is there's now a fire under the butts of entities still using the [...]
qui, fev , 2017
The Alphabet subsidiary is accusing its former employee, Otto co-founder Anthony Levandowski, of downloading 14,000 confidential files before he left the company. Waymo, formerly Google's self-driving car unit, is suing Otto — the self-driving trucking company co-founded by former Waymo employee Anthony Levandowski and quickly acquired by Uber — for allegedly stealing the company's proprietary design for its laser-based radar system. According to Waymo, before Levandowski left what was then a part of Google's moonshot labs, he downloaded 14,000 “highly confidential” files to an external hard drive, including the design for the company's lidar circuit board. The company decided to perform a [...]
qui, fev , 2017
1,274 possible drone sightings were reported. The U.S. Federal Aviation Administration today released an update on the number of reported sightings of drones near airplanes or air traffic control facilities. Between February and September of last year, the FAA says pilots, air traffic control, law enforcement and members of the public reported possibly spotting 1,274 drones flying near air traffic control facilities — up from 874 during the same period in 2015. That's 400 more reported sightings, which is about a 45 percent increase from the amount of reported sightings in 2015. Still, the FAA says it has yet to count a [...]
qui, fev , 2017
Most major U.S. airports are already using AirMap's drone software. One of the biggest problems that still needs to be figured out before most people's Amazon orders are delivered by a drone is managing how aircraft will coordinate and communicate with other drones and humans on the ground. In other words, air traffic control for drones. One company, AirMap, a drone mapping and alert platform, has made some serious strides. The company announced today it raised $26 million from Microsoft, Airbus, Qualcomm, Yuneec and Sony. Microsoft led the Series B funding round. NASA and the U.S. Federal Aviation Administration are in [...]
qui, fev , 2017
It's official: The SHA-1 cryptographic algorithm has been "SHAttered." Google successfully broke SHA-1. Now what? After years of warning that advances in modern computing meant a successful collision attack against SHA-1 was imminent, a team of researchers from Google and Centrum Wiskunde & Informatica (CWI) in the Netherlands have successfully developed the first successful SHA-1 collision. In practical terms, SHA-1 should not be relied upon for practical security. [ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]Modern cryptographic hash functions depend on the fact that the algorithm generates a different cryptographic [...]
qui, fev , 2017
Ken Johnson, CTO of nVisium, and Chris Gates, Senior Security Engineer at Uber talk to CSO Online's Steve Ragan about working with devops tool chains. [...]
qui, fev , 2017
Bruce Schneier, CTO of IBM Resilient on the increasing importance of technologist's presence in education and policy-making. [...]
qui, fev , 2017
It doesn't matter what you do online: The internet knows a ton about you, and that information is a mouse click away. Search any people finder site—Spokeo, PeekYou, Whitepages, to name a few—and odds are you'll find a page listing your full name, date of birth, names of family members, current address, and phone number. Depending on the site's aggressiveness, it may offer (for a low membership fee or the price of registering an account) additional details such as past addresses, social media profiles, marital status, employment history, education, court cases such as bankruptcies, hobbies, and even a photo of where [...]
qui, fev , 2017
A new file-encrypting ransomware program for MacOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay. Crypto ransomware programs for MacOS are rare. This is the second such threat found in the wild so far, and it's a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it. [ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe [...]
qua, fev , 2017
Medical professionals use stethoscopes to help diagnose problems inside the body. With Netflix's newly open-sourced Stethoscope web application, users receive a security checkup for their mobile and computing devices without having to call IT. Although device management platforms like MobileIron or VMware AirWatch for mobile devices, JAMF for Macs, and LANdesk for Windows let IT teams apply security controls to employee devices, there are few tools available for users interested in securing their own personal devices, and most are focused on viruses or are platform-specific. To read this article in full or to leave a comment, please click here [...]
qua, fev , 2017
To keep private Wi-Fi networks secure, encryption is a must-have—and using strong passwords or passphrases is necessary to prevent the encryption from being cracked. But don't stop there! Many other settings, features and situations can make your Wi-Fi network as much or even more insecure as when you use a weak password. Make sure you're not leaving your network vulnerable by doing any of the following. To read this article in full or to leave a comment, please click here(Insider Story) [...]
qua, fev , 2017
Every business needs to have a process in place for handling security vulnerability reports, but some organizations take a much more proactive approach to dealing with security researchers. To read this article in full or to leave a comment, please click here(Insider Story) [...]
qua, fev , 2017
Microsoft has just released an old-fashioned Security Bulletin, MS 17-005, which shepherds a handful of patches for various versions of Windows. The patches, all called KB 4010250, implement the Flash Player fixes contained in Adobe's APSB17-04, which fixes 13 critical vulnerabilities. It took Microsoft a week to plug the holes. To read this article in full or to leave a comment, please click here [...]
ter, fev , 2017

Vivemos em um mundo globalizado, com o espaço geográfico fragmentado, porém fortemente articulado pelas redes, onde a Segurança tem um papel fundamental nestes processos.

Nos últimos anos as tecnologias de informação e comunicação têm evoluído de forma rápida, fazendo com que as organizações tenham maior eficiência e rapidez nas tomadas de decisão, devido a este fato as chances de uma empresa não usar sistemas de informação tornou-se praticamente nula. Neste contexto a importância de se utilizar mecanismos de segurança e de armazenamento das informações é vital para a sobrevivência e competitividade destas organizações.

As organizações devem zelar pelo seu bem maior, a informação, não é possível acabar com as ameaças mas devemos minimizar os riscos em que a empresa está exposta. As ameaças podem partir de dentro ou de fora das organizações, alguns exemplos são: acesso indevido, roubo de informação, espionagem industrial, fraudes, erros, etc., podendo gerar prejuízos e até interrupção total das atividades da organização dependendo do impacto no negócio.

A implementação efetiva da Segurança da Informação demanda conjuntos de fatores completos, adequados e ajustados às necessidades da organização, compreendendo política, diretrizes, processos, mecanismos, ferramentas, documentação e ações planejadas.

O que aconteceria se uma empresa perdesse todas as informações relativas aos seus clientes, fornecedores ou mesmo sobre os registros funcionais de seus empregados? As consequências seriam enormes, acarretando em prejuízos financeiros ou até mesmo na descontinuidade do negócio.

Para garantir a segurança da informação de qualquer empresa, é necessário que hajam normas e procedimentos claros, que deverão ser seguidos por todos os usuários da empresa.

A maior dificuldade das grandes organizações é assegurar que todos os seus funcionários conheçam e sigam corretamente as normas e políticas de segurança, entendendo a sua importância.

O primeiro passo a ser observado é que não existe risco zero. O que existem são vários níveis de segurança e cada nível tem que estar de acordo com a informação que se quer proteger e a natureza do negócio da empresa. 


Mais o que é a Segurança da Informação?

A Segurança da Informação se refere à proteção existente sobre as informações de uma determinada empresa ou pessoa, isto é, aplica-se tanto as informações corporativas quanto às pessoais. Entende-se por informação todo e qualquer conteúdo ou dado que tenha valor para alguma organização ou pessoa. Ela pode estar guardada para uso restrito ou exposta ao público para consulta ou aquisição.

Podem ser estabelecidas métricas (com o uso ou não de ferramentas) para a definição do nível de segurança existente e, com isto, serem estabelecidas as bases para análise da melhoria ou piora da situação de segurança existente. A segurança de uma determinada informação pode ser afetada por fatores comportamentais e de uso de quem se utiliza dela, pelo ambiente ou infraestrutura que a cerca ou por pessoas mal intencionadas que têm o objetivo de furtar, destruir ou modificar tal informação.

A tríade CIA (Confidentiality, Integrity and Availability) — Confidencialidade, Integridade e Disponibilidade — representa os principais atributos que, atualmente, orientam a análise, o planejamento e a implementação da segurança para um determinado grupo de informações que se deseja proteger. Outros atributos importantes são a irretratabilidade e a autenticidade. Com a evolução do comércio eletrônico e da sociedade da informação, a privacidade é também uma grande preocupação.

Portanto os atributos básicos, segundo os padrões internacionais (ISO/IEC 17799:2005) são os seguintes:

Confidencialidade – propriedade que limita o acesso a informação tão somente às entidades legítimas, ou seja, àquelas autorizadas pelo proprietário da informação.
Integridade – propriedade que garante que a informação manipulada mantenha todas as características originais estabelecidas pelo proprietário da informação, incluindo controle de mudanças e garantia do seu ciclo de vida (nascimento,manutenção e destruição).
Disponibilidade – propriedade que garante que a informação esteja sempre disponível para o uso legítimo, ou seja, por aqueles usuários autorizados pelo proprietário da informação.
Autenticidade – propriedade que garante que a informação é proveniente da fonte anunciada e que não foi alvo de mutações ao longo de um processo.
Irretratabilidade ou não repúdio – propriedade que garante a impossibilidade de negar a autoria em relação a uma transação anteriormente feita

Para a montagem desta política, deve-se levar em conta:

Riscos associados à falta de segurança;
Custos de implementação dos mecanismos.

A segurança da informação está diretamente relacionada com proteção de um conjunto de informações, no sentido de preservar o valor que possuem para um indivíduo ou uma organização. São características básicas da segurança da informação os atributos de confidencialidade, integridade, disponibilidade e autenticidade, não estando esta segurança restrita somente a sistemas computacionais, informações eletrônicas ou sistemas de armazenamento. O conceito se aplica a todos os aspectos de proteção de informações e dados. O conceito de Segurança Informática ou Segurança de Computadores está intimamente relacionado com o de Segurança da Informação, incluindo não apenas a segurança dos dados/informação, mas também a dos sistemas em si.

Atualmente o conceito de Segurança da Informação está padronizado pela norma ISO/IEC 17799:2005, influenciada pelo padrão inglês (British Standard) BS 7799. A série de normas ISO/IEC 27000 foram reservadas para tratar de padrões de Segurança da Informação, incluindo a complementação ao trabalho original do padrão inglês. A ISO/IEC 27002:2005 continua sendo considerada formalmente como 17799:2005 para fins históricos.

Fonte: Wikipedia



Atualizado por em .

The following two tabs change content below.

Alexandre Queiroz

Alexandre Queiroz é Carioca legítimo,amante de sua cidade (Rio de Janeiro), muito bem casado, amante de novas Tecnologias, Música Eletrônica, Carros, Viajar, Cachorros e etc. Este site/blog é utilizado somente para compartilhar notícias, guardar soluções próprias, dicas e sem fins lucrativos... É utilizado como hobbie e para armazenar conhecimento.