RSS
 

Arquivo para a ‘Security’ Categoria

Browser Safely

26 Mar

Avoid entering personal data, personal photos of children, telephones and numbers of documents in the media or in any services in which an unknown person can access your information, if they ask for personal data by telephone, say that they can not give in.
Data theft starts with some confidential personal information, a password or something. In this way, you prevent against the theft of information and personal data Make sure that the site address belongs to the service, especially the banking service and follow all bank-recommended security standards, rarely ask for documents, and never do it on public computers where passwords and addresses can be recorded.
Do not install software when requested by a site, unless it is exactly the service you requested or the sites of the equipment: Androids, Apple, Sun, Microsoft, etc.
Make purchases on reliable sites, public sales services where anyone can register to sell products are not reliable, if you really have to buy check the feedback from other customers and if there is no feedback is not reliable, false feedbacks are very similar and short , for example, very good, recommend it, worth it or something. The trusted site usually has the figure of a padlock.
Requests for online file storage is a common way to install viruses or harmful files to the connection.
Download only trusted sites or secure platform. Doubtful ads with huge advantages are largely responsible for viruses and loss of connection security, which can involve data theft and file contamination.
Banners and pop-up menus that appear at the bottom of the screen, whether on your computer or smartphone, should be ignored, usually malicious processes.
Last but not least, is the use of emails to send false files and reports about false services, may also send a link, which open may have different meanings than indicated.
Payment request of passwords and personal information by email should be spam or malwares.

This TED about cyber crimes is most viewing about Cyber Crimes:

 

To navigate is need, we must live too.

25 Mar

The phrase is not from Fernando Pessoa nor from a Brazilian composer, it was General Pompeu’s phrase to encourage his fearful sailors saying: “Navigare necesse, vivere non est necesse” and later it was also the Italian poet Petrarca in the fourteenth century.
The verses of Fernando Pessoa had the sense of confining his sense of way to creation, and in this sense of life is that we can make a parallel with the current Web browsers.
Besides the Web we have the GPS and numerous navigation instruments for ships, airplanes and spacecraft, which will soon also be tourist trips thanks to Tesla company (post).
Reflections for today must involve fears (there is a book by Martha Nussbaum), the options with many possible paths, the question of security and the transitions to a possible Web that fights the fake news, remembering that these are all problems previous to the Internet (1975) and the Web (1990), since it comes from the industrial revolution.
The issue of life that involves is the Society of Tiredness, put our mind and body under a barrage of stimuli that may seem beneficial but also lead to stress.
The modern man, the pause, the respite, or what Byung-Chull Han calls the “aroma of time”, I thank Portugal who gave me back this possibility for the rhythm of life, social security and especially the Portuguese lyrical soul.
All of this brings life back to life, but to put it in an agitated life without “aroma” is an effort that demands virtues, in the sense of virtue and in the sense of virtuous circles.
But navigating is necessary, almost for everything in life today and living, pausing and breathing as well.

This vídeo is commentary about tips for navigating a Websites:

 

Fake news with few days

12 Feb

False, malicious or biased news are old, we have already mentioned the allegations made by Karl Kraus, also news that actress Rita Hayworth (the stage name of Margarita Carmen Cansino, famous in the 50´s and 60´s), who would have lived another two years , or the misleading advertisement that Nike would be giving shirts of the Brazilian national team.
Now there is software developed by the research company Fraunhoffer-Gesellschaft, in Germany that has developed a system that automatically analyzes post of social media and filters false news and misinformation, we can predict a promising future.
It is worth mentioning that this was thanks to the new technologies, the tool does a machine learning that filters the news and through learning (in the sense of algorithms per machine) analyzes contents and metadata, verifying user interaction and optimizes results in real time.
The tool also checks the amount of data (viralization processes), with sending data graphs, frequency and follower networks.
Ulrich Schade, according to the Fraunhofer website, said: “Our software can be customized and trained to meet the needs of any customer. Our software can be customized and trained to meet the needs of any customer. For public agencies, it can be a useful early warning system.”
Metadata are used as markers, thus allowing fake postmarking, that is, it plays a crucial role in differentiating between authentic sources of information and false news.
So if a site with a certain frequency of posts is made, how often and how a tweet is scheduled and at what time? The time of a post can be very revealing, as well as the frequency of the tweet and the followers.
It should also reveal the country and the time zone of the originator of the news for its correct identification and location, therefore the hours are essential.
A high frequency of sending suggests bots, which increases the probability of a false news, can be easily detected and can signal a fake.
Social bots generally send their links to a large number of users, and this is an example of how to spread the uncertainty among the public, so never give in.
Connections and account followers can also be fertile ground for analysts, although well-intentioned people use it, the chance to be a fake is great, and now a tool can detect it, fake days are counted.

 

Web Summit in Lisbon

08 Nov

One of the biggest events of the Web was this week, it was a side event, I could only follow videos and news, undoubtedly the biggest star was the founder of the Web Tim-Berners Lee who already has a great new project, although he has spoken between the lines.

He started an interview, which in fact he spoke at will without many questions saying the beginning of the Web and how his growth was also surprising for him, he told technical details like “I wrote the code of the first server and the code of the first browser, it was called WorldWideWeb.app “and was on info.cern.ch.

He then said that his concern is the same as everyone, after 25 years we should deal with: cyberbullying, misinformation, hate speech, privacy issues and said what many are talking about, “What the hell could go wrong?” to the public: “in the first 15 years … great things have happened. We had Wikipedia, the Khan Academy, blogs, we had cats, “he said jokingly, adding:” Connected Humanity should be more constructive, more peaceful, than Humanity disconnected”, but jnt (just not).

“Because we are almost at the point where half of the world will be online”, explained the British engineer was referring to the ’50 / 50′ moment, that is half the connected humanity expected in 50 years, but it should reach this point in May 2019.

After trying to argue the responsibilities of governments and companies, I believe they can happen but they will be slow, he spoke indirectly of his SOLID (Social Linked Data) project, stating that “as individuals we have to hold corporations and governments accountable for what is happening on the internet ” and “the idea is, from now on, everyone is responsible for making the Web a better place, “said encouraging start-ups too to get into this process.

Thinking about the development of interfaces where users know people from different cultures, but above all ensure the universality of the Web, according to Berners-Lee the main aspect should be (speaking indirectly again of SOLID) that the popular intervention at global level and that made the Web “just a platform, without attitude, that should be independent, can be used for any kind of information, any culture, any language, any hardware, software”, linked data may help this.

 Tim Berners-Lee presented the #ForTheWeb movement on the same day that his World Wide Web Foundation released the report “The Case for the Web”, the event had a superaudience, more than 30 thousand people, there are several videos, but the Opening Ceremony is one of the most outstanding and has Tim-Berners Lee as well, see on vídeo: https://www.youtube.com/watch?v=lkzNZKCxM

 

Are machines becoming humanized?

02 Nov

Summary of Lecture by prof. Dr. Teixeira Coelho from IEA – USP at the EBICCJoseTeixeiraCoelho event.

Are machines becoming humanized, or are they the human beings that are losing humanity and transforming into immediate, as valuable, as excessive and totally subdutable products of which the world is full?
The lecture presented as results of the study group Computational Humanities of the Institute of Studies
Advanced of USP a list of concepts, most with a critical view of technology, terms such as: digitization, mobility, automation, augmented reality, proxy effect, duplication, anonymity, perfectibility, rationality, coordination, unification and completeness, among others, like the result of an e-culture.
He discussed the contemporary reality of computational and digital cultures and their relation to cultural production, mediated or self-produced, in a context where the work of robots replaces the manual work of humans and goes to replace, through artificial intelligence, intellectual work .
Gregory Chaitin then gave his talk, already discussed in the previous post.

 

The world hacker attack

15 May

It is already the biggest worldwide attack, the numbers counted until WindowsUpdateSunday (14/05) already surpassed 200,000 infected computers in 150 countries, but like any digital virus there is no deadline for it to end unless the systems are permanently protected, because of this the update is so necessary.
The virus type ransonware, a malware that installs itself on your computer, encrypts all data and blocks them by requiring payment (in this case in bitcoins, digital currency) and does not allow you to access your own programs and data.
It was called by the Wanna Cry hackers themselves, considered a high-level malware distributed as Deep Web, and the information says that it was an adaptation of a US NCSA portlet (intelligence department) and this would be precisely to encrypt and capture data of citizens and businesses.
For those who have ease in using the Windows environment, going in settings you will find the Update and Security screen (Windows update) and must wait for the update that may take a while, but will also update Windows Defender, which in the current version already has the vaccine against this virus.
If the program does not fully upgrade, it is because your Windows is not original, so it means you will still not be safe.
However, researchers are not going to disclose the strategies, but they can basically be three: trace the historical origin of the attack, track where the current attacks are coming from, and unconventional mechanisms.

To verify the use of bitcoins, since they are pseudonyms (pseudo-currencies) that must be transformed into existing products or currencies to be rescued the values ​​of the hijacking of data made by the hackers.
It is increasingly important to keep data backups on cloud backups or an external hard drive.

 

The Next Step to Cognitive Intelligence

23 Feb

We are approaching a century of computing, if we think that Kurt Gödel’sSegurançaIBM paradox about a thinking “system” began what Alan Turing and Claude Shannon would talk about in secret Bell Laboratory projects during World War II, read The Information: a History, a theory and a flood of James Gleick, to understand what was done, until the first computer was created in valves.
Then we develop increasingly complex programs, and we can simulate genome sequencing, weather forecasting, sharing data around the world, but the most interesting pieces for us humans, such as creating a poem, recognizing an image of painting or even reading a Book, explaining it so that systems still fall short.
Now concerned with security systems, machines advance our desires and individualities, they finally seem to challenge the developers: to create a cognitive security capable of going beyond the machines, and to continue to give us security to work with them.
For decades, computers have been trained to recognize viruses, malware and exploits, and we have tried to make these services more accurate, but it is not enough, machines seem to discover our desires and offer things to make us offers and throw us on even stronger consumption Than at the beginning of the cinema and radio era.
Now your attacks and find creative ways to break the defenses, so what systems need is the ability to detect the most subtle change of activity and analyze it with as much context as possible to distinguish and eliminate new threats?
IBM promises to move forward on these smarter, now called cognitive, segregations, Samsung also promises advanced programs in this area, with two key points:
– traditional security is unable to analyze and apply this view in the way that an analyst can. That’s why the most challenging security issues still require people to make good decisions about how to act and how to know if it’s not a false alarm.
– the second is to build a kind of “security instincts” and expertise in new defenses that analyze search reports, Web text, threat data, and other structured and unstructured security-relevant data – just as security professionals do on a daily basis – but on a scale never seen before.
This is the essence of cognitive security, be it the IBM video above.

 

Facebook goes down

28 Sep

An instability that occurred in much of FacebookFacebookOut worldwide on 28/09 in Brazil near the time of 16:05 p.m. Brazil (14:05 p.m. USA), paralyzed the services leaving the API (the service login interface) down.

The Facebook said: “A broad question with Facebook is leaving the API Facebook unavailable search engine We are working with our central infrastructure teams to identify the issue and we will update them when we have. More information”, said the Benjamin Golub Facebook enginner.

The fall of the service had already taken place last week, but was shorter, now users reported longer instability for both accessing the social network via computers as by the application, the 17h17 pm (15h15 USA) was still unstable service

 

WhatsApp falha e crimes acontecem

10 Sep

Uma falha detectada no dia em 21 de agosto, por usuários que alertaram o WhatsAppransonware que conseguiu só na seguinte um patch (remendo) para corrigir a falha.

A Check Point recomentou recomendou imediatamente aos usuários que atualizem suas versões para que o ajuste funcionasse, o aplicativo já tem hoje no mundo todo mais de de 900 milhões usuários, com 200 milhões também usando PCs.

Segundo a empresa, a vulnerabilidade foi desenvolvida a partir da versão para computadores do WhatsApp, que permitiu aos hackers distribuíram programas maliciosas com um tipo de vírus chamado ransomware – usados para “sequestrar” computadores e extorquir usuários por “resgate” de sua própria conta.

O aplicativo foi desenvolvido a partir de uma versão de programa de computador adaptado para o uso em telefones celulares ao redor do mundo, inclusive no Brasil, onde é o app mais usado para o envio de mensagens instantâneas.

O número de usuários globais em smartphones é de 900 milhões, com 200 milhões também usando PCs.

O programa entretanto não é seguro, é o que afirmou o especialista em segurança Mark James, da empresa ESET: “O Whatsapp é uma plataforma cruzada para o envio de mensagens instantâneas, então a chance de alguém abrir um vCard é bem grande”.

Todo cuidado é pouco, evitar cadastrar pessoas desconhecidas e cuidado com grupos onde muitas pessoas podem entrar sem critérios.

 

 

Windows 10 e cuidados

06 Aug

A Microsoft anuncia que já passou de 14 milhões de downloads (gratuitos)Windows10 do Windows 10, há pouca análise do software ainda, o meu é recém instalado, mas já aparecem alguns problemas que requerem cuidados do usuário.

A Talos da Cisco, afirma que já há alguns crimes se aproveitando da novidade para sequestrar arquivos usando um tipo de ataque de vírus conhecido como ransomware.

Os ataques vem com e-mails que prometem uma atualizada agilizada e que precisaria entrar numa fila para obter o sistema gratuito para Windows 7 e 8.1, e então tiram proveito que vem em um arquivo escondido na resposta da Microsoft pelo email update@microsoft.com, e é tão inteligente que vem com um texto que imita garantias de escaneamento antivírus.

A única maneira de conseguir o o Windows 10 é pelos canais oficiais da Microsoft, que não está distribuindo o sistema por e-mail.

Na dúvida, ao receber qualquer e-mail do tipo, delete a mensagem.