How they use Facebook information to manipulate us

Facebook information has been used to manipulate its users. This is the emphatic assertion that we can draw when knowing the details of the scandal in which Facebook and the British company Cambridge Analityca have been involved.

Cómo la información de Facebook se puede utilizar para manipularnos

The personal information of the profiles of Facebook has been used in mass by this company to elaborate advertising strategies with the purpose of influencing in the past presidential elections of the USA, at least that is what emerges from the investigations published in some media as this article from Xataka.

What was it?

[Read more…]

Mobile malware, the big business of cybercriminals

Mobile malware has been the threat that has provided the most money to cybercriminals in recent times, as attacks through this malicious software are able to remain hidden for longer periods of time, compared to attacks against computers (ransomware). This is the conclusion drawn by experts from the security firm Check Point, who point out that Judy, a virus that infected millions of Android smartphones last year, thanks to its presence in more than 40 applications of the Play Store, remained operational during one year, while WannaCry, for example, did not exceed the month.

Malware móvil, el gran negocio de los ciberdelincuentes

[Read more…]

ThisCrush, an anonymous social network that encourages cyberbullying

Although ThisCrush is, according to its creators, a social network aimed at messages that seek to flatter and enamor the recipient, the truth is that the possibility of sending comments anonymously causes the messages of offensive type, insults, threats, etc. to rocket there.

The ThisCrush social network is not even two years old and is already a reference among 12 year old teenagers or even minors.

ThisCrush, una red social anónima que incita al ciberacoso

A meaning of the term “Crush” refers to those Platonic loves that are not reciprocated. The social network ThisCrush is based on this, on being able to send to another person messages to initiate a loving relation of anonymous form or, if it is wanted, showing the real name.

[Read more…]

Beware of false job offers online

Although this type of scam had its peak during the worst moment of the last crisis, this system of deception, unfortunately, is still used today.

Cuidado con las falsas ofertas de trabajo por Internet

There are unscrupulous people who take advantage of the desperation of those who seek employment to profit from small scams. They offer job interviews or tempting false jobs to which, to gain access, they force us to disburse some amount of money in one way or another.

[Read more…]

Fallas and cybersecurity come together for the first time in history

The first cyber-falla in history or cybersecurity Falla is already a reality.

Since yesterday and coinciding with the day of the “plantá” of the Fallas, the Children’s Falla sponsored by S2 Grupo has been exhibited. This company, specialized in computer security and based in Valencia, is responsible for this blog.

La primera Falla sobre ciberseguridad

[Read more…]

Sweetie, the virtual girl who hunts cyber pedophiles, wants to collaborate with the Police

Terre des Hommes (Land of Men) is the Dutch NGO that in late 2013 created Sweetie, a computer program aimed at finding pedophiles on the Internet and to report the growing threat of child sex tourism through the Internet.

In just 10 weeks since its launch, 20,000 stalkers contacted this 10-year-old virtual Filipino girl. From that figure, and thanks to the information they provided while chatting with Sweetie, the Dutch organization located and identified about 1,000 pedophiles from 71 countries, and then provided all the data collected to Interpol.

Sweetie, la niña virtual que caza a pedófilos cibernéticos

[Read more…]

On the Internet, several cases of pedophilia continue to be discovered

We know that on the Internet you can find perverse contents of all kinds, such as information for manufacturing explosives, promoting the radicalization of terrorists or for making weapons with 3D printers. But one of the most striking, just to show the extent to which human degeneration arrives, is that of pedophilia.

The traffic of images and videos showing sexual content of and with minors is, apparently, much more common than we might think. In a police operation carried out in Spain last February a large number of people were arrested who shared, stored and even created this type of content.

En Internet sigue se siguen descubriendo numerosos casos de pedofilia

[Read more…]

Brussels orders Facebook to stop violating the privacy of its users

On February 16, the court of first instance in Brussels ordered Facebook to stop collecting information from its users in Belgium using tracking technologies, as this action violates Belgian legislation on data protection.

Bruselas ordena a Facebook dejar de violar la privacidad de sus usuarios

According to the official statement made by the court, Facebook must “stop tracking and registering the Internet use of people surfing in Belgium, until it complies with the Belgian privacy law.” In addition, they will also have to “destroy any personal data obtained illegally”.

[Read more…]

Check the Internet passwords you have saved in your browser

The browsers, with the intention of facilitating the navigation experience, provide us with the possibility of storing passwords so that we do not need to write them whenever they are requested, the browser itself will write them for us and access automatically.

Comprueba las contraseñas de Internet que has guardado en tu navegador

Obviously it is a function that provides comfort to the user but poses a risk to their security, since anyone who could use our computer could access the services we have saved without any problems.

[Read more…]

The most anticipated cyberattacks in 2018

The attacks of ransomware, a malicious software that infects users’ computers and hijacks their information and then asks for a monetary ransom, have left thousands of victims in 2017: the National Health System (NHS) in the United Kingdom saw how paralyzed phones were left and computers from 16 of its hospitals last May; the headquarters of Telefónica, located in Madrid, suffered a massive attack of this type that disabled their computers to later request a ransom in bitcoins, a virtual currency that allows online payments.

These were only two of those affected, since this ransomware, named WannaCry, managed to spread across all the continents in less than 24 hours, paralyzing the activity of companies and governments globally. The courier company FedEx, the Russian Ministry of the Interior or the manufacturer of Renault vehicles, among others, appeared on the list of victims.

Los ciberataques más esperados en 2018

[Read more…]