RSS
 

Arquivo para a ‘Security’ Categoria

Lockdown and frivolity

11 May

As the virus expands and begins to arrive more in the interior of Brazil and in many places life remains “normal”, while Europe is gradually trying to return to a new normality, that is, to return to trade and consumerism and the previous hectic life , which Sloterdijk calls frivolity (see in daily El país).

There are two scenarios, the Brazilian case while some bet that the curve reached the plateau, the new data point to an even greater expansion of the virus, betting that we can contain the serious pandemic situation with little radical measures is proving inefficient.

The reason for the pressure to open trade, more than economic, it is clear that it affects the economy of the whole planet, the real reason in the minds of many people is to return to the day to day of high stress, rush and consumerism to those who have the resources for this.

In Brazil, we have reached the level of 10,000 deaths, both in personal and social life, if we reach a seriousness of a disease or take radical measures or witness the total aggravation of the disease, in the social case, the viral expansion and the worsening of the pandemic.

In the reflection of Sloterdijk, who wrote, in my view, two emblematic books Spheres and Criticism of Cynical Reason, he presents two key concepts that are co-immunity and anthropotechnics.

The first concept of co-community means that we can establish an individual commitment towards mutual protection, which would mark a new worldwide way of facing problems and the concept of anthropotechnics means understanding that the techniques, in this case and is the main concept used by Sloterdijk, the biotechnology, this is genetic manipulation.

When launched, it generated a lot of controversy in Europe, due to the manipulation of genes for example, but now that the main researches in defense of the coronavirus show the importance of the use of antibodies for the production of the vaccine, and the first thing was the genetic sequencing.

The worsening of the Brazilian crisis will require a more serious confinement, or we will see the figures extrapolate and the Health System already practically exhausted.

Confinement is necessary and the return to frivolity must be rethought as a way not only to avoid a major economic crisis, but mainly fairer. 

 

#NoWar

06 Jan

General Qassem Soleimani killed in Baghdad, Iraq, was Iran’s second most powerful person and could break the fragile balance between international forces, and the danger of a war of world proportions becomes a fearful possibility.

Iran has countries like China and Russia as allies, in addition to the Arab and Muslim world, which today is a world-class religion, and this may have a global outline of terrorism another possibility.

The security agencies set off their alarms, social media was the most talked about subject of the week, and anyone who imagines this is not serious, does not know the horrors of war: death of innocent people, food shortages, energy breaks, travels and interchance breaks and mainly increased a climate of hatred and intolerance across the plane.

Peace must be desired, and the UN, OAS and international dialogue bodies need to act.

 

Web Summit in Lisbon

08 Nov

One of the biggest events of the Web was this week, it was a side event, I could only follow videos and news, undoubtedly the biggest star was the founder of the Web Tim-Berners Lee who already has a great new project, although he has spoken between the lines.

He started an interview, which in fact he spoke at will without many questions saying the beginning of the Web and how his growth was also surprising for him, he told technical details like “I wrote the code of the first server and the code of the first browser, it was called WorldWideWeb.app “and was on info.cern.ch.

He then said that his concern is the same as everyone, after 25 years we should deal with: cyberbullying, misinformation, hate speech, privacy issues and said what many are talking about, “What the hell could go wrong?” to the public: “in the first 15 years … great things have happened. We had Wikipedia, the Khan Academy, blogs, we had cats, “he said jokingly, adding:” Connected Humanity should be more constructive, more peaceful, than Humanity disconnected”, but jnt (just not).

“Because we are almost at the point where half of the world will be online”, explained the British engineer was referring to the ’50 / 50′ moment, that is half the connected humanity expected in 50 years, but it should reach this point in May 2019.

After trying to argue the responsibilities of governments and companies, I believe they can happen but they will be slow, he spoke indirectly of his SOLID (Social Linked Data) project, stating that “as individuals we have to hold corporations and governments accountable for what is happening on the internet ” and “the idea is, from now on, everyone is responsible for making the Web a better place, “said encouraging start-ups too to get into this process.

Thinking about the development of interfaces where users know people from different cultures, but above all ensure the universality of the Web, according to Berners-Lee the main aspect should be (speaking indirectly again of SOLID) that the popular intervention at global level and that made the Web “just a platform, without attitude, that should be independent, can be used for any kind of information, any culture, any language, any hardware, software”, linked data may help this.

 Tim Berners-Lee presented the #ForTheWeb movement on the same day that his World Wide Web Foundation released the report “The Case for the Web”, the event had a superaudience, more than 30 thousand people, there are several videos, but the Opening Ceremony is one of the most outstanding and has Tim-Berners Lee as well, see on vídeo: https://www.youtube.com/watch?v=lkzNZKCxM

 

Are machines becoming humanized?

02 Nov

Summary of Lecture by prof. Dr. Teixeira Coelho from IEA – USP at the EBICCJoseTeixeiraCoelho event.

Are machines becoming humanized, or are they the human beings that are losing humanity and transforming into immediate, as valuable, as excessive and totally subdutable products of which the world is full?
The lecture presented as results of the study group Computational Humanities of the Institute of Studies
Advanced of USP a list of concepts, most with a critical view of technology, terms such as: digitization, mobility, automation, augmented reality, proxy effect, duplication, anonymity, perfectibility, rationality, coordination, unification and completeness, among others, like the result of an e-culture.
He discussed the contemporary reality of computational and digital cultures and their relation to cultural production, mediated or self-produced, in a context where the work of robots replaces the manual work of humans and goes to replace, through artificial intelligence, intellectual work .
Gregory Chaitin then gave his talk, already discussed in the previous post.

 

The world hacker attack

15 May

It is already the biggest worldwide attack, the numbers counted until WindowsUpdateSunday (14/05) already surpassed 200,000 infected computers in 150 countries, but like any digital virus there is no deadline for it to end unless the systems are permanently protected, because of this the update is so necessary.
The virus type ransonware, a malware that installs itself on your computer, encrypts all data and blocks them by requiring payment (in this case in bitcoins, digital currency) and does not allow you to access your own programs and data.
It was called by the Wanna Cry hackers themselves, considered a high-level malware distributed as Deep Web, and the information says that it was an adaptation of a US NCSA portlet (intelligence department) and this would be precisely to encrypt and capture data of citizens and businesses.
For those who have ease in using the Windows environment, going in settings you will find the Update and Security screen (Windows update) and must wait for the update that may take a while, but will also update Windows Defender, which in the current version already has the vaccine against this virus.
If the program does not fully upgrade, it is because your Windows is not original, so it means you will still not be safe.
However, researchers are not going to disclose the strategies, but they can basically be three: trace the historical origin of the attack, track where the current attacks are coming from, and unconventional mechanisms.

To verify the use of bitcoins, since they are pseudonyms (pseudo-currencies) that must be transformed into existing products or currencies to be rescued the values ​​of the hijacking of data made by the hackers.
It is increasingly important to keep data backups on cloud backups or an external hard drive.

 

The Next Step to Cognitive Intelligence

23 Feb

We are approaching a century of computing, if we think that Kurt Gödel’sSegurançaIBM paradox about a thinking “system” began what Alan Turing and Claude Shannon would talk about in secret Bell Laboratory projects during World War II, read The Information: a History, a theory and a flood of James Gleick, to understand what was done, until the first computer was created in valves.
Then we develop increasingly complex programs, and we can simulate genome sequencing, weather forecasting, sharing data around the world, but the most interesting pieces for us humans, such as creating a poem, recognizing an image of painting or even reading a Book, explaining it so that systems still fall short.
Now concerned with security systems, machines advance our desires and individualities, they finally seem to challenge the developers: to create a cognitive security capable of going beyond the machines, and to continue to give us security to work with them.
For decades, computers have been trained to recognize viruses, malware and exploits, and we have tried to make these services more accurate, but it is not enough, machines seem to discover our desires and offer things to make us offers and throw us on even stronger consumption Than at the beginning of the cinema and radio era.
Now your attacks and find creative ways to break the defenses, so what systems need is the ability to detect the most subtle change of activity and analyze it with as much context as possible to distinguish and eliminate new threats?
IBM promises to move forward on these smarter, now called cognitive, segregations, Samsung also promises advanced programs in this area, with two key points:
– traditional security is unable to analyze and apply this view in the way that an analyst can. That’s why the most challenging security issues still require people to make good decisions about how to act and how to know if it’s not a false alarm.
– the second is to build a kind of “security instincts” and expertise in new defenses that analyze search reports, Web text, threat data, and other structured and unstructured security-relevant data – just as security professionals do on a daily basis – but on a scale never seen before.
This is the essence of cognitive security, be it the IBM video above.

 

Facebook goes down

28 Sep

An instability that occurred in much of FacebookFacebookOut worldwide on 28/09 in Brazil near the time of 16:05 p.m. Brazil (14:05 p.m. USA), paralyzed the services leaving the API (the service login interface) down.

The Facebook said: “A broad question with Facebook is leaving the API Facebook unavailable search engine We are working with our central infrastructure teams to identify the issue and we will update them when we have. More information”, said the Benjamin Golub Facebook enginner.

The fall of the service had already taken place last week, but was shorter, now users reported longer instability for both accessing the social network via computers as by the application, the 17h17 pm (15h15 USA) was still unstable service

 

WhatsApp falha e crimes acontecem

10 Sep

Uma falha detectada no dia em 21 de agosto, por usuários que alertaram o WhatsAppransonware que conseguiu só na seguinte um patch (remendo) para corrigir a falha.

A Check Point recomentou recomendou imediatamente aos usuários que atualizem suas versões para que o ajuste funcionasse, o aplicativo já tem hoje no mundo todo mais de de 900 milhões usuários, com 200 milhões também usando PCs.

Segundo a empresa, a vulnerabilidade foi desenvolvida a partir da versão para computadores do WhatsApp, que permitiu aos hackers distribuíram programas maliciosas com um tipo de vírus chamado ransomware – usados para “sequestrar” computadores e extorquir usuários por “resgate” de sua própria conta.

O aplicativo foi desenvolvido a partir de uma versão de programa de computador adaptado para o uso em telefones celulares ao redor do mundo, inclusive no Brasil, onde é o app mais usado para o envio de mensagens instantâneas.

O número de usuários globais em smartphones é de 900 milhões, com 200 milhões também usando PCs.

O programa entretanto não é seguro, é o que afirmou o especialista em segurança Mark James, da empresa ESET: “O Whatsapp é uma plataforma cruzada para o envio de mensagens instantâneas, então a chance de alguém abrir um vCard é bem grande”.

Todo cuidado é pouco, evitar cadastrar pessoas desconhecidas e cuidado com grupos onde muitas pessoas podem entrar sem critérios.

 

 

Windows 10 e cuidados

06 Aug

A Microsoft anuncia que já passou de 14 milhões de downloads (gratuitos)Windows10 do Windows 10, há pouca análise do software ainda, o meu é recém instalado, mas já aparecem alguns problemas que requerem cuidados do usuário.

A Talos da Cisco, afirma que já há alguns crimes se aproveitando da novidade para sequestrar arquivos usando um tipo de ataque de vírus conhecido como ransomware.

Os ataques vem com e-mails que prometem uma atualizada agilizada e que precisaria entrar numa fila para obter o sistema gratuito para Windows 7 e 8.1, e então tiram proveito que vem em um arquivo escondido na resposta da Microsoft pelo email update@microsoft.com, e é tão inteligente que vem com um texto que imita garantias de escaneamento antivírus.

A única maneira de conseguir o o Windows 10 é pelos canais oficiais da Microsoft, que não está distribuindo o sistema por e-mail.

Na dúvida, ao receber qualquer e-mail do tipo, delete a mensagem.

 

Fooling hackers and viruses on Facebook

11 Jun

VirusFaceAn Israeli company has released a software called Illusive Networks developed software that tricks hackers into believing they have found a way to steal data but without knowing whether they are true or false.
Although not directly related, a virus spreads through a Facebook post that invites you to do some bold poses of a beautiful young woman.
The virus spreads saying that you are over 19 friends and were tagged in this video? You should not create this link because it will choose 19 of his friends to continue spreading the virus and so on expanding into snowball.
The virus appears with a notification in your timeline, but stop there, you have not “contracted” the virus, one of your relationship contracted and sent to you if you do click contracting and spreading addiction, then DO NOT DO THIS.
Facebook says it is working to try to prevent this virus in the environment itself.
You could create something like the Illusive software where “targeted attacks” or “advanced persistent threats” are identified and pass false customer data in the case of this software credit cards and bank accounts.