RSS
 

Arquivo para a ‘Security’ Categoria

Are machines becoming humanized?

02 Nov

Summary of Lecture by prof. Dr. Teixeira Coelho from IEA – USP at the EBICCJoseTeixeiraCoelho event.

Are machines becoming humanized, or are they the human beings that are losing humanity and transforming into immediate, as valuable, as excessive and totally subdutable products of which the world is full?
The lecture presented as results of the study group Computational Humanities of the Institute of Studies
Advanced of USP a list of concepts, most with a critical view of technology, terms such as: digitization, mobility, automation, augmented reality, proxy effect, duplication, anonymity, perfectibility, rationality, coordination, unification and completeness, among others, like the result of an e-culture.
He discussed the contemporary reality of computational and digital cultures and their relation to cultural production, mediated or self-produced, in a context where the work of robots replaces the manual work of humans and goes to replace, through artificial intelligence, intellectual work .
Gregory Chaitin then gave his talk, already discussed in the previous post.

 

The world hacker attack

15 May

It is already the biggest worldwide attack, the numbers counted until WindowsUpdateSunday (14/05) already surpassed 200,000 infected computers in 150 countries, but like any digital virus there is no deadline for it to end unless the systems are permanently protected, because of this the update is so necessary.
The virus type ransonware, a malware that installs itself on your computer, encrypts all data and blocks them by requiring payment (in this case in bitcoins, digital currency) and does not allow you to access your own programs and data.
It was called by the Wanna Cry hackers themselves, considered a high-level malware distributed as Deep Web, and the information says that it was an adaptation of a US NCSA portlet (intelligence department) and this would be precisely to encrypt and capture data of citizens and businesses.
For those who have ease in using the Windows environment, going in settings you will find the Update and Security screen (Windows update) and must wait for the update that may take a while, but will also update Windows Defender, which in the current version already has the vaccine against this virus.
If the program does not fully upgrade, it is because your Windows is not original, so it means you will still not be safe.
However, researchers are not going to disclose the strategies, but they can basically be three: trace the historical origin of the attack, track where the current attacks are coming from, and unconventional mechanisms.

To verify the use of bitcoins, since they are pseudonyms (pseudo-currencies) that must be transformed into existing products or currencies to be rescued the values ​​of the hijacking of data made by the hackers.
It is increasingly important to keep data backups on cloud backups or an external hard drive.

 

The Next Step to Cognitive Intelligence

23 Feb

We are approaching a century of computing, if we think that Kurt Gödel’sSegurançaIBM paradox about a thinking “system” began what Alan Turing and Claude Shannon would talk about in secret Bell Laboratory projects during World War II, read The Information: a History, a theory and a flood of James Gleick, to understand what was done, until the first computer was created in valves.
Then we develop increasingly complex programs, and we can simulate genome sequencing, weather forecasting, sharing data around the world, but the most interesting pieces for us humans, such as creating a poem, recognizing an image of painting or even reading a Book, explaining it so that systems still fall short.
Now concerned with security systems, machines advance our desires and individualities, they finally seem to challenge the developers: to create a cognitive security capable of going beyond the machines, and to continue to give us security to work with them.
For decades, computers have been trained to recognize viruses, malware and exploits, and we have tried to make these services more accurate, but it is not enough, machines seem to discover our desires and offer things to make us offers and throw us on even stronger consumption Than at the beginning of the cinema and radio era.
Now your attacks and find creative ways to break the defenses, so what systems need is the ability to detect the most subtle change of activity and analyze it with as much context as possible to distinguish and eliminate new threats?
IBM promises to move forward on these smarter, now called cognitive, segregations, Samsung also promises advanced programs in this area, with two key points:
– traditional security is unable to analyze and apply this view in the way that an analyst can. That’s why the most challenging security issues still require people to make good decisions about how to act and how to know if it’s not a false alarm.
– the second is to build a kind of “security instincts” and expertise in new defenses that analyze search reports, Web text, threat data, and other structured and unstructured security-relevant data – just as security professionals do on a daily basis – but on a scale never seen before.
This is the essence of cognitive security, be it the IBM video above.

 

Facebook goes down

28 Sep

An instability that occurred in much of FacebookFacebookOut worldwide on 28/09 in Brazil near the time of 16:05 p.m. Brazil (14:05 p.m. USA), paralyzed the services leaving the API (the service login interface) down.

The Facebook said: “A broad question with Facebook is leaving the API Facebook unavailable search engine We are working with our central infrastructure teams to identify the issue and we will update them when we have. More information”, said the Benjamin Golub Facebook enginner.

The fall of the service had already taken place last week, but was shorter, now users reported longer instability for both accessing the social network via computers as by the application, the 17h17 pm (15h15 USA) was still unstable service

 

WhatsApp falha e crimes acontecem

10 Sep

Uma falha detectada no dia em 21 de agosto, por usuários que alertaram o WhatsAppransonware que conseguiu só na seguinte um patch (remendo) para corrigir a falha.

A Check Point recomentou recomendou imediatamente aos usuários que atualizem suas versões para que o ajuste funcionasse, o aplicativo já tem hoje no mundo todo mais de de 900 milhões usuários, com 200 milhões também usando PCs.

Segundo a empresa, a vulnerabilidade foi desenvolvida a partir da versão para computadores do WhatsApp, que permitiu aos hackers distribuíram programas maliciosas com um tipo de vírus chamado ransomware – usados para “sequestrar” computadores e extorquir usuários por “resgate” de sua própria conta.

O aplicativo foi desenvolvido a partir de uma versão de programa de computador adaptado para o uso em telefones celulares ao redor do mundo, inclusive no Brasil, onde é o app mais usado para o envio de mensagens instantâneas.

O número de usuários globais em smartphones é de 900 milhões, com 200 milhões também usando PCs.

O programa entretanto não é seguro, é o que afirmou o especialista em segurança Mark James, da empresa ESET: “O Whatsapp é uma plataforma cruzada para o envio de mensagens instantâneas, então a chance de alguém abrir um vCard é bem grande”.

Todo cuidado é pouco, evitar cadastrar pessoas desconhecidas e cuidado com grupos onde muitas pessoas podem entrar sem critérios.

 

 

Windows 10 e cuidados

06 Aug

A Microsoft anuncia que já passou de 14 milhões de downloads (gratuitos)Windows10 do Windows 10, há pouca análise do software ainda, o meu é recém instalado, mas já aparecem alguns problemas que requerem cuidados do usuário.

A Talos da Cisco, afirma que já há alguns crimes se aproveitando da novidade para sequestrar arquivos usando um tipo de ataque de vírus conhecido como ransomware.

Os ataques vem com e-mails que prometem uma atualizada agilizada e que precisaria entrar numa fila para obter o sistema gratuito para Windows 7 e 8.1, e então tiram proveito que vem em um arquivo escondido na resposta da Microsoft pelo email update@microsoft.com, e é tão inteligente que vem com um texto que imita garantias de escaneamento antivírus.

A única maneira de conseguir o o Windows 10 é pelos canais oficiais da Microsoft, que não está distribuindo o sistema por e-mail.

Na dúvida, ao receber qualquer e-mail do tipo, delete a mensagem.

 

Fooling hackers and viruses on Facebook

11 Jun

VirusFaceAn Israeli company has released a software called Illusive Networks developed software that tricks hackers into believing they have found a way to steal data but without knowing whether they are true or false.
Although not directly related, a virus spreads through a Facebook post that invites you to do some bold poses of a beautiful young woman.
The virus spreads saying that you are over 19 friends and were tagged in this video? You should not create this link because it will choose 19 of his friends to continue spreading the virus and so on expanding into snowball.
The virus appears with a notification in your timeline, but stop there, you have not “contracted” the virus, one of your relationship contracted and sent to you if you do click contracting and spreading addiction, then DO NOT DO THIS.
Facebook says it is working to try to prevent this virus in the environment itself.
You could create something like the Illusive software where “targeted attacks” or “advanced persistent threats” are identified and pass false customer data in the case of this software credit cards and bank accounts.

 

(Português) Falha do HeartBleed foi explorada pelo NSA

14 Apr

Sorry, this entry is only available in Brazilian Portuguese.

 

(Português) Trocar senhas, falha em dispositivo

10 Apr

Sorry, this entry is only available in Brazilian Portuguese.

 

Towards privacity in internet

09 Nov

aQuanticEnvelopeApparently , the big problem of the networks , preserving data privacy is becoming a possibility, something like putting in an “envelope ” and ensure that it is not open is being researched .

The work using quantum cryptography is being done by researchers from Cambridge University say they have achieved a breakthrough in quantum cryptography , using a system that can be encoded and then decoded safely , according to ” This is the first time that the commitment bit perfectly safe, using only the laws of physics and nothing else , has been demonstrated ” .

The tests were done using encrypted data between Geneva and Singapore , with data being kept ” perfectly safe ” around 15 milliseconds , using a protocol called ” bit – commitment.”

Such a system can be a first step towards information networks controlled by totally safe where ” the power of Einstein’s relativity combined gift quantum theory ” , according to the researchers would be a mathematical version of a securely sealed envelope .

The news came out in the online journal of Cambridge and was published in Physical Reviews Letters.