Trabajando como arquitecto de soluciones de ciberseguridad, Alisa se enfoca en la protección de datos y la seguridad de datos empresariales. Antes de unirse a nosotros, ocupó varios puestos de investigador de ciberseguridad dentro de una variedad de empresas de seguridad cibernética. También tiene experiencia en diferentes industrias como finanzas, salud médica y reconocimiento facial.
Envía tips de noticias a firstname.lastname@example.org o www.instagram.com/iicsorg/
También puedes encontrarnos en Telegram www.t.me/noticiasciberseguridad
BlackEnergy was first identified several years ago. Initially, BlackEnergy’s custom plugins were used for launching distributed denial-of-service attacks (DDoS). As time went on however, Kaspersky Lab researchers noted, BlackEnergy2 was
Samsung was replaced by the iPhone maker as No. 1 in China’s mobile sector this year, according to the China Brand Research Center’s 2014 China Brand Power Index ranking report
Newcastle University researchers have found a security flaw in Visa’s contactless payment card system that allows hackers to bypass the £20 limit and take out up to 1 million of
With so many security breaches in the headlines from Home Depot to JP Morgan to Dairy Queen, it would appear that cybercriminals are winning the arms race against security professionals.
That begins with laying a foundation for security, starting with conducting a security assessment, creating a roadmap and getting board-level support. Unfortunately however, more than half those surveyed by Ernst
Forking is “absolutely necessary in the FOSS world,” said Google+ blogger Rodolfo Saenz. “Without it, Linux and every FOSS project would not advance as they should.” Of course, “too much
Several hackers going with the handle of Nigeria Cyber Army hacked and defaced the official web site of State of Indiana Department of Education, Monday morning. The house page associated with the DOE website
Mozilla Firefox and Thunderbird are prone to a remote memory-corruption vulnerability. Successfully exploiting this issue will allow an attacker to obtain sensitive information. Failed exploit attempts will likely result in
Counter-terrorism police are investigating the hacking of a West Yorkshire Rugby League club’s website. Keighley Cougars website was replaced on Sunday with a page featuring the message: “I love you
The BlackEnergy malware is crimeware turned APT tool and is used in significant geopolitical operations lightly documented over the past year. An even more interesting part of the BlackEnergy story