<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-359361763705962299</id><updated>2024-10-31T23:31:42.613-07:00</updated><category term="incidente"/><category term="Ataques"/><category term="Noticias"/><category term="vulnerabilidades"/><category term="Malware"/><category term="Virus"/><category term="Arrestos"/><category term="Condenas"/><category term="parches"/><title type='text'>.:[- Cyberincidentes -]:.</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>20</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-5661202472943783610</id><published>2011-09-28T15:27:00.000-07:00</published><updated>2011-09-28T15:31:21.343-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Arrestos"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>La policía de Glendale arresta a una trabajadora de Citi Cards</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Le49yR7b2GKtp4CqAlW5a5MxW3YyicAJnpV7_4Psi2s9rci4sGAx3iZT-S8z13kNGZb9i7XSBdA20yIIEeJ5sKOHAYMUxW9jMs9lb_jyg3y2ljlua-24hJZuRi3tB0K38a3N3oZMrTt8/s1600/city.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Le49yR7b2GKtp4CqAlW5a5MxW3YyicAJnpV7_4Psi2s9rci4sGAx3iZT-S8z13kNGZb9i7XSBdA20yIIEeJ5sKOHAYMUxW9jMs9lb_jyg3y2ljlua-24hJZuRi3tB0K38a3N3oZMrTt8/s1600/city.jpg&quot; /&gt;&lt;/a&gt;La policía de Glendale arrestó a una trabajadora de la compañía de tarjetas de crédito y su novio como sospechosos de robo de identidad y el uso de tarjetas de crédito robadas, según un documento judicial. &lt;br /&gt;La detenida Amanda Shepherd es residente de Las Vegas, y&amp;nbsp; trabaja como representante de servicio al cliente de Citi Cards, fue arrestada el martes. George Nelson fue detenido el 2 de septiembre.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
La policía encontró una computadora portátil comprada con la tarjeta de crédito robada en SUV de Shepherd. También dice el documento, encontraron un cuaderno con una lista de información personal de la gente. En el apartamento Nelson, la policía encontró otro cuaderno de nombres de personas, la fecha de nacimiento, números de la seguridad social y otra información personal.&lt;br /&gt;(No está claro si el bloc de notas de los nombres, fechas de nacimiento, números de seguro social fueron adquiridos a través del trabajo en Citi Cards)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Fuente: &lt;a href=&quot;http://www.azcentral.com/news/articles/2011/09/23/20110923glendale-credit-card-worker-accused-identity-theft-abrk.html&quot;&gt;http://www.azcentral.com/&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;longtext&quot;&gt;&lt;a href=&quot;http://www.azcentral.com/news/articles/2011/09/23/20110923glendale-credit-card-worker-accused-identity-theft-abrk.html&quot;&gt;&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/5661202472943783610/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/09/la-policia-de-glendale-arresta-una.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5661202472943783610'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5661202472943783610'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/09/la-policia-de-glendale-arresta-una.html' title='La policía de Glendale arresta a una trabajadora de Citi Cards'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Le49yR7b2GKtp4CqAlW5a5MxW3YyicAJnpV7_4Psi2s9rci4sGAx3iZT-S8z13kNGZb9i7XSBdA20yIIEeJ5sKOHAYMUxW9jMs9lb_jyg3y2ljlua-24hJZuRi3tB0K38a3N3oZMrTt8/s72-c/city.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-7326789371367277378</id><published>2011-09-11T05:15:00.000-07:00</published><updated>2011-09-11T05:17:20.144-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Condenas"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>14 años de cárcel por el robo masivo de tarjetas de crédito</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQbeeRdJHM6C_cDj4f9EKFgfsy53IRl0JoENOsI5ymGFsn15VczUe8T93U67AZpv1SIkfndleDD-cXqbIyT4Xv7SrGa9j0Stua7x5_2HH0eFzxcSZhRHc2Z73fuGG5d8KS4ZUAQhEpz9E/s1600/14.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQbeeRdJHM6C_cDj4f9EKFgfsy53IRl0JoENOsI5ymGFsn15VczUe8T93U67AZpv1SIkfndleDD-cXqbIyT4Xv7SrGa9j0Stua7x5_2HH0eFzxcSZhRHc2Z73fuGG5d8KS4ZUAQhEpz9E/s200/14.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Un chico de 21 años de edad, ha sido condenado a una pena de prisión de 14 años el viernes por un negocio en línea en el que vendía tarjetas de crédito falsificadas. Se calcula que la perdida supera los 3 millones de dólares.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tony Pérez III, de Hammond, Indiana, se declaró culpable de los cargos el 4 de abril. En su declaración, Pérez dijo que vendió las tarjetas de crédito falsificadas codificadas con información de las cuentas robadas.&lt;br /&gt;
&lt;br /&gt;
Pérez encontró a los clientes a través de   &quot;foros de carding&quot;, grupo de discusión en Internet creado para ayudar en la compra y venta de información robada de las cuentas financieras y servicios conexos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Cuando los Servicio Secretos de  EE.UU. allanaron su apartamento en junio de 2010, se encontraron con los datos de 21.000 tarjetas de crédito robadas y equipo necesario para codificar en tarjetas en blanco. Las compañías de tarjetas de crédito dijeron que las pérdidas de los números de tarjetas en posesión de Pérez superaban los  3 millones de dólares.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Además de la pena de prisión, Liam O&#39;Grady  juez del Tribunal de Distrito para el Distrito Este de Virginia de los EE.UU ordenó a pagar a Pérez  2.8 millones de dólares en restitución y una multa de 250.000 dólares.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Fuente:&lt;a href=&quot;http://thehackernews.com/2011/09/14-years-in-jail-for-mass-credit-card.html&quot;&gt;The Hacker News&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/7326789371367277378/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/09/14-anos-de-carcel-por-el-robo-masivo-de.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7326789371367277378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7326789371367277378'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/09/14-anos-de-carcel-por-el-robo-masivo-de.html' title='14 años de cárcel por el robo masivo de tarjetas de crédito'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQbeeRdJHM6C_cDj4f9EKFgfsy53IRl0JoENOsI5ymGFsn15VczUe8T93U67AZpv1SIkfndleDD-cXqbIyT4Xv7SrGa9j0Stua7x5_2HH0eFzxcSZhRHc2Z73fuGG5d8KS4ZUAQhEpz9E/s72-c/14.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-5151549030116681529</id><published>2011-08-11T17:17:00.000-07:00</published><updated>2011-09-11T08:34:20.154-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>Cientos de cuentas bancaria a la perdidas en un pub de Londres</title><content type='html'>04 de agosto 2011 a las 14:40 &lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFBajUDuk8UG1HrXavux6x-8SUv40XXDDj0UbtL-k1SIBaIlDq0vxD408C-MXpr_pn4LPYBRQi9H8SA6ijCYUtkCZScaoK-p5m6MpNJxuT6SJN3SnIoVxEDeeIJd8oYR8hzqOFN6s7TqO/s1600/checkbook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFBajUDuk8UG1HrXavux6x-8SUv40XXDDj0UbtL-k1SIBaIlDq0vxD408C-MXpr_pn4LPYBRQi9H8SA6ijCYUtkCZScaoK-p5m6MpNJxuT6SJN3SnIoVxEDeeIJd8oYR8hzqOFN6s7TqO/s200/checkbook.jpg&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Un contratista pierde cientos de detalles de cuentas bancarias, dejándolos en un pub. Dos empresas se han encontrado en violación de la Ley de Protección de datos después de decenas de miles de inquilinos. detalles fueron dejados en un pub de Londres, junto a 800 registros con datos bancarios.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Un contratista perdió los datos de los inquilinos de dos de las empresas viviendas independientes Asociación de Vivienda Wandle y Casas Lewisham.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;El contratista estaba trabajando para la organización de esta última, cuando perdió una memoria USB sin encriptar, que contenía datos copiados de ambas compañías.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Los detalles del contenido de ldispositivo es de más de 20.000 inquilinos de casas Lewisham, 6200 de la Asociación de Vivienda Wandle. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Casi 800 de los registros que pertenecen a Casas de Lewisham también contenía los inquilinos y detalles de cuentas bancarias.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Fuente :&lt;a href=&quot;http://www.itpro.co.uk/635422/hundreds-of-bank-account-details-left-at-london-pub&quot;&gt;http://www.itpro.co.uk&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/5151549030116681529/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/08/cientos-de-cuentas-bancaria-la-perdidas.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5151549030116681529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5151549030116681529'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/08/cientos-de-cuentas-bancaria-la-perdidas.html' title='Cientos de cuentas bancaria a la perdidas en un pub de Londres'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMFBajUDuk8UG1HrXavux6x-8SUv40XXDDj0UbtL-k1SIBaIlDq0vxD408C-MXpr_pn4LPYBRQi9H8SA6ijCYUtkCZScaoK-p5m6MpNJxuT6SJN3SnIoVxEDeeIJd8oYR8hzqOFN6s7TqO/s72-c/checkbook.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-7193218571969243029</id><published>2011-05-21T05:52:00.000-07:00</published><updated>2012-01-08T13:31:24.476-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><category scheme="http://www.blogger.com/atom/ns#" term="Virus"/><title type='text'>Cuidado con el boton &quot;no me gusta&quot; de Facebook  es un engaño !!!</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;
Dada la Publicidad que se le ha hecho al botón &quot;no me gusta&quot; de face book, hemos decidido hacer un&amp;nbsp; pequeño estudio sobre este botón y sus consecuencias para aquel que lo instala en su Facebook.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fUTAKMZEKb-ouVbviUeq7XddN27jHn2M58C1UNKmjnKlPR0bfS2F_3-RlrMFXdMevJkUMXuE2EIxd-Cx1JFyMJH4qUL0nXD-jnsixfvJeVC9ruJSXcWvDbNduD27va-XbUqGsf9WYZ_g/s1600/nomegusta.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fUTAKMZEKb-ouVbviUeq7XddN27jHn2M58C1UNKmjnKlPR0bfS2F_3-RlrMFXdMevJkUMXuE2EIxd-Cx1JFyMJH4qUL0nXD-jnsixfvJeVC9ruJSXcWvDbNduD27va-XbUqGsf9WYZ_g/s1600/nomegusta.jpg&quot; /&gt;&lt;/a&gt;En primer lugar cuando clicamos en &quot;no me gusta&quot; en el Post de algun amigo, se nos abre una ventana que nos lleva a una web con las instrucciones para colocar dicho boton en nuestro &amp;nbsp;Facebook.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
De hacer lo que la web dice, estamos dando permiso a una aplicación cuyos objetivos son recolectar los datos de los Usuarios incautos, y además intentar que enviemos SMS a una compañía de micro pagos por SMS.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Desgranemos como está hecha esta trama.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Si accedemos a uno de los dominios que usan para dar la información sobre el botón y observamos su código fuente vemos varias cosas:&lt;/div&gt;
&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&amp;nbsp;hay un contador que ofrece estadísticas justo aquí =&amp;gt; http://whos.****.us/pro/stats/b3ps/&lt;/li&gt;
&lt;li&gt;&amp;nbsp;mirando el contador vemos que las stats guardan la IP del usuario, el referer de donde &amp;nbsp;viene es decir, al haber instalado el botón , el contador se queda con las URL donde se ve este botón , que en este caso el contador marca mas de 200.000 URL entre las cuales &amp;nbsp;ademas se ve que se queda con el ID de Facebook del usuario.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;El contador usa Geolocalización con lo cual , los atacantes también tienen , el pais de origen de&amp;nbsp; la persona infectada, la IP , y la localización aproximada de la victima.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;Resumiendo, relaciona la IP del usuario&amp;nbsp; con su localización y el ID de facebook... WoW.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Profundizando en cómo está hecho el engaño, vemos que en la web trampa se muestra un video, el cual , descompilando el Flash que se usa para reproducir el video, vemos que internamente usa librerías para leer supuestamente el archivo Json (Json decoder) del usuario de Facebook que visita la web. ( Json Hijacking ) o bien al leer tu Json y tener tu sesión podrían intentar otro tipo de ataque llamado &quot;session fitxation&quot;.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
El Flash también lleva incrustadas librerías para la compresión y descompresión de archivos zip con lo cual podría dar a pensar que podrían mas adelante o ya intentar descargar y descomprimir algún archivo en la máquina de la víctima o bien intentar subir algún archivo de la maquina victima, comprimido en zip, aunque en si seguramente lo que hacen es subir información al host que usan para los ataques.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Cual podría ser el objetivo aparte de la re-captación de datos?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-left: 0px; margin-right: 0px; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsIdnOXHp5Zhbo5I8ECxwJd_r7VX80mo3j5Bs84AbC6gfvdJltRja2wTVJRWNxQWY2C8Pkf_7UpRE-sx8ZWRMkssLmXXhJQeKUYWxWJHsjJzD9YBPcVLKjm9tdMXjDsZqj3O6fOTCZGKX3/s1600/Raiz.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;134&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsIdnOXHp5Zhbo5I8ECxwJd_r7VX80mo3j5Bs84AbC6gfvdJltRja2wTVJRWNxQWY2C8Pkf_7UpRE-sx8ZWRMkssLmXXhJQeKUYWxWJHsjJzD9YBPcVLKjm9tdMXjDsZqj3O6fOTCZGKX3/s320/Raiz.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Raiz Del host&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Mirando el código que dicen que pongamos en nuestra barra de direcciones vemos que se hace la llamada a un script en un host determinado, el host donde hace la llamada vemos los siguientes datos, hay una carpeta llamada &quot;nomegusta&quot; que es la que contiene todos los archivos de redirección y geolocalización de las víctimas.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9lS5GevckwabUuw_LOKsjX8G_5cD25aZBeU7QzbMN_KiBiW48lDqzfVcZgj7Q5Y1xeJ4Z_H7r4dvhsRiD4HNqa4wV0Ea4sHNRihX1VJcxSFzGjfSFql3p6xVBtJKm0dvHx-hcPHT9APRS/s1600/nomegusta.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;184&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9lS5GevckwabUuw_LOKsjX8G_5cD25aZBeU7QzbMN_KiBiW48lDqzfVcZgj7Q5Y1xeJ4Z_H7r4dvhsRiD4HNqa4wV0Ea4sHNRihX1VJcxSFzGjfSFql3p6xVBtJKm0dvHx-hcPHT9APRS/s320/nomegusta.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Dentro de &quot;nomegusta&quot;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
Examinando el host además vemos un curioso archivo dentro de la  carpeta Geoip que seguramente facilitara la localización de los  maleantes.&lt;br /&gt;
Siempre se olvidan de lo mas obvio y dejan detalles que podrian ser usados para localizarlos a ellos ya que el archivo &quot;redirije_promo.php&quot; curiosamente hace que nos salte un anuncio de pagos por SMS (cada numero de SMS esta asociado a una compañía o empresa) y además ni esconden, puede verse el prestatario del servicio, con lo cual bajo requerimiento judicial seguramente pueda saberse a quien se le ha prestado este servicio.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimOMH2OPYNJk33Y9u3Dwd6yI74J2syxl-JgLLAuZaVy_14AnM7nYcDUtce5Pl3PGxj6JBbkP4V6mlhSagHN3X6rEX039kqc6TKG8av7bXdKfYKebnJ2-XcZKQgKtnvWctE1eiNyB9U1o0L/s1600/geoip.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimOMH2OPYNJk33Y9u3Dwd6yI74J2syxl-JgLLAuZaVy_14AnM7nYcDUtce5Pl3PGxj6JBbkP4V6mlhSagHN3X6rEX039kqc6TKG8av7bXdKfYKebnJ2-XcZKQgKtnvWctE1eiNyB9U1o0L/s320/geoip.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;dentro de Geoip&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
El archivo JS que instalamos al poner el código que nos dicen, justamente lleva también a ese &quot;redirije_promo.php&quot;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
para la eliminación si la instalasteis por error y deseais deshabilitarla, simplemente debeis ir&amp;nbsp; a las opciones&amp;nbsp; Cuenta/Configuración de la privacidad/Aplicaciones y sitios web/Aplicaciones que utilizas/Eliminar.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimuS_62GJkG1G0-PTrJ63tINGg521f2wpfKvuvfbcCI06b4Be45KITbIoq1YNSbZo77dbsZM1kinO8QcV7cbpPZL3VnBZlfiHBOgMp4SZ2boACaH_sClMAbmnhDjM2fz-gfy4FNirVWH81/s1600/SMS.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;184&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimuS_62GJkG1G0-PTrJ63tINGg521f2wpfKvuvfbcCI06b4Be45KITbIoq1YNSbZo77dbsZM1kinO8QcV7cbpPZL3VnBZlfiHBOgMp4SZ2boACaH_sClMAbmnhDjM2fz-gfy4FNirVWH81/s320/SMS.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Después además cambiar vuestras contraseñas pues está claro que la aplicación ha podido tener acceso a ella. ( ahora que se de que va el engaño, YA NO ME GUSTA tanto).&lt;br /&gt;
&lt;br /&gt;
Gracias a &lt;a href=&quot;http://facebook.com/nikita.xime&quot;&gt;Nikita.xime&lt;/a&gt;&amp;nbsp; y a &lt;a href=&quot;http://lostmon.blogspot.com/&quot;&gt;Lostmon&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/7193218571969243029/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/05/cuidado-con-el-boton-no-me-gusta-de.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7193218571969243029'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7193218571969243029'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/05/cuidado-con-el-boton-no-me-gusta-de.html' title='Cuidado con el boton &quot;no me gusta&quot; de Facebook  es un engaño !!!'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fUTAKMZEKb-ouVbviUeq7XddN27jHn2M58C1UNKmjnKlPR0bfS2F_3-RlrMFXdMevJkUMXuE2EIxd-Cx1JFyMJH4qUL0nXD-jnsixfvJeVC9ruJSXcWvDbNduD27va-XbUqGsf9WYZ_g/s72-c/nomegusta.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-7783518615365511829</id><published>2011-05-19T17:30:00.000-07:00</published><updated>2011-05-19T17:30:46.670-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Virus"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilidades"/><title type='text'>Una variante del Malware Qakbot  culpable de una brecha y escape de datos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In Massachusetts, a Malware infection that spread to a possible 1,500&quot;&gt;En Massachusetts el dia &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;May 18 2011, 06:00&quot;&gt;18 de mayo 2011&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In Massachusetts, a Malware infection that spread to a possible 1,500&quot;&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In Massachusetts, a Malware infection that spread to a possible 1,500&quot;&gt;Una infección de malware ha podido propagarse a 1500 &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;systems within the Office of Labor and Workforce Development (OLWD) is to&quot;&gt;sistemas dentro de la Oficina de Trabajo y Desarrollo Laboral (OLWD) se &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;blame for a data breach assumed to have exposed 1,200 employer records, an&quot;&gt;supone que &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;systems within the Office of Labor and Workforce Development (OLWD) is to&quot;&gt;es el &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;blame for a data breach assumed to have exposed 1,200 employer records, an&quot;&gt;culpable de una violación de datos de 1.200 registros empleados.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;blame for a data breach assumed to have exposed 1,200 employer records, an&quot;&gt;La agencia en una declaración &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;agency statement says.&quot;&gt;, dice. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The Departments of Unemployment Assistance and Career Services were&quot;&gt;Los Departamentos de Asistencia de Desempleo y Servicio de Carreras Profesionales se han &lt;/span&gt;&lt;span title=&quot;infected sometime in April.&quot;&gt;infectado en algún momento del mes&amp;nbsp; abril. &lt;/span&gt;&lt;span title=&quot;On Monday, the OLWD discovered that the&quot;&gt;El lunes, el OLWD descubrió que el &lt;/span&gt;&lt;span title=&quot;initial cleanup efforts failed to remove the Qakbot Malware.&quot;&gt;los esfuerzos iniciales de limpieza no han quitar el malware Qakbot. &lt;/span&gt;&lt;span title=&quot;Because of&quot;&gt;Debido a &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;this, it.s possible that the Malware harvested confidential information.&quot;&gt;esto, es posible que el malware recolectado información confidencial. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;this, it.s possible that the Malware harvested confidential information.&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;this, it.s possible that the Malware harvested confidential information.&quot;&gt; &lt;/span&gt;&lt;span title=&quot;Qakbot has been around for some time.&quot;&gt;Qakbot ha estado dando vueltas&amp;nbsp; por algún tiempo. &lt;/span&gt;&lt;span title=&quot;First discovered in 2009, the&quot;&gt;Primero fué descubierto en 2009. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Malware spreads via several sources, including network shares.&quot;&gt;El malware se propaga a través de varias fuentes, incluyendo recursos compartidos de red, aprobechando también las ultimas &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;it leveraged vulnerabilities in Apple.s QuickTime and Internet Explorer to&quot;&gt;vulnerabilidades&amp;nbsp; en Apple.s QuickTime e Internet Explorer&lt;/span&gt;&lt;span title=&quot;target victims.&quot;&gt;. &lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Qakbot is able to gather various kinds of data on an infected system&quot;&gt;Qakbot es capaz de reunir diferentes tipos de datos en un sistema infectado &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;including OS and network information, keystrokes, stored FTP and email&quot;&gt;incluyendo sistema operativo y la información de la red, las pulsaciones de teclado, almacena datos de acceso de sitios FTP y correo electrónico &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;login details, targeted banking data, as well as usernames and passwords&quot;&gt;, y determinados datos bancarios, así como nombres de usuario y contraseñas &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;stored within a browser.&quot;&gt;almacenados dentro de un navegador.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;stored within a browser.&quot;&gt;&lt;b&gt;&amp;nbsp;Fuente:&lt;/b&gt; &lt;a href=&quot;http://www.thetechherald.com/article.php/201120/7173/Qakbot-family-of-malware-blamed-for-data-breach&quot;&gt;http://www.thetechherald.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/7783518615365511829/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/05/una-variante-del-malware-qakbot.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7783518615365511829'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7783518615365511829'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/05/una-variante-del-malware-qakbot.html' title='Una variante del Malware Qakbot  culpable de una brecha y escape de datos'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-3152759562711076957</id><published>2011-05-04T13:59:00.000-07:00</published><updated>2011-05-04T14:04:27.143-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>Hackers roban los datos de Factor X</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUqTCobWGjwmPe_p9hRQm_WgGNaoSQFc1qljFj1TV8uNLhH2hjxtRwS0N6-lOPAN1oeDt7ZApZTT_UEec99uzCNxqffUu6r6Y1xgM-YuUuSK1zh2p8ME6rdtpJ0aAiTu54VjkDGa1UHJNC/s1600/factorx.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUqTCobWGjwmPe_p9hRQm_WgGNaoSQFc1qljFj1TV8uNLhH2hjxtRwS0N6-lOPAN1oeDt7ZApZTT_UEec99uzCNxqffUu6r6Y1xgM-YuUuSK1zh2p8ME6rdtpJ0aAiTu54VjkDGa1UHJNC/s320/factorx.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The FBI is reportedly investigating after hackers broke into Simon&quot;&gt;El FBI está investigando después de que piratas informáticos entraran en&amp;nbsp; la red del equipo de Simón &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Cowell&#39;s computer network.&quot;&gt;Cowell.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Cowell&#39;s computer network.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Details of more than 250,000 X Factor entrants are said to have been&quot;&gt;Los detalles de más de 250.000 participantes del famoso programa &lt;b&gt;Factor X&lt;/b&gt;, se dice que han sido &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;stolen and Simon and bosses at American TV network Fox, are said to be&quot;&gt;robados y Simon y los jefes de la cadena americana de televisión &lt;b&gt;Fox&lt;/b&gt;, tienen &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;scared that the thieves will use the details to make money.&quot;&gt;miedo de que los ladrones sutilicen los detalles para hacer dinero.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;scared that the thieves will use the details to make money.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;An official investigation has been launched and an email, which was seen&quot;&gt;Una investigación oficial se ha puesto en marcha y un correo electrónico&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;by the Daily Star, was sent to all contestants to warn them about the&quot;&gt;, fue enviado a todos los participantes para advertirles sobre los &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;security breach.&quot;&gt;violaciones de la seguridad d&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;It read: &#39;This week, we learned that computer hackers illegally accessed&quot;&gt;ecía:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;It read: &#39;This week, we learned that computer hackers illegally accessed&quot;&gt;&quot;Esta semana, nos enteramos de que los piratas informáticos acceder ilegalmente &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;information you and others submitted to us to receive information about&quot;&gt;información que usted y otros que se nos presenta para recibir información acerca de &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The X Factor auditions&quot;&gt;las &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The X Factor auditions&quot;&gt;audiciones&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The X Factor auditions&quot;&gt; de Factor X&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The X Factor auditions&quot;&gt;&amp;nbsp;Fuente: &lt;a href=&quot;http://www.monstersandcritics.com/people/news/article_1636433.php/Hackers-steal-X-Factor-details&quot;&gt;http://www.monstersandcritics.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/3152759562711076957/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/05/hackers-roban-los-datos-de-factor-x.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/3152759562711076957'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/3152759562711076957'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/05/hackers-roban-los-datos-de-factor-x.html' title='Hackers roban los datos de Factor X'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUqTCobWGjwmPe_p9hRQm_WgGNaoSQFc1qljFj1TV8uNLhH2hjxtRwS0N6-lOPAN1oeDt7ZApZTT_UEec99uzCNxqffUu6r6Y1xgM-YuUuSK1zh2p8ME6rdtpJ0aAiTu54VjkDGa1UHJNC/s72-c/factorx.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-7751316982533252529</id><published>2011-04-27T07:01:00.000-07:00</published><updated>2011-04-27T14:22:40.840-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>70 millones de datos de usuarios robados de PlayStation Network</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.wired.com/images_blogs/gamelife/2011/04/psn.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;149&quot; src=&quot;http://www.wired.com/images_blogs/gamelife/2011/04/psn.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sony thinks an “unauthorized person” now has access to all PlayStation Network account information and passwords, and may have obtained the credit card numbers of the service&#39;s 70 million users.&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sony thinks an “unauthorized person” now has access to all PlayStation Network account information and passwords, and may have obtained the credit card numbers of the service&#39;s 70 million users.&quot;&gt;Sony  cree que una &quot;persona no autorizada&quot; ha tenido acceso a toda la  información de las cuentas &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sony thinks an “unauthorized person” now has access to all PlayStation Network account information and passwords, and may have obtained the credit card numbers of the service&#39;s 70 million users.&quot;&gt;y contraseñas&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sony thinks an “unauthorized person” now has access to all PlayStation Network account information and passwords, and may have obtained the credit card numbers of the service&#39;s 70 million users.&quot;&gt; de PlayStation Network, y puede  haber obtenido también el número de tarjeta de crédito de 70 millones de  usuarios del servicio.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Sony thinks an “unauthorized person” now has access to all PlayStation Network account information and passwords, and may have obtained the credit card numbers of the service&#39;s 70 million users.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The PlayStation maker said it believes hackers now have access to customers&#39; vital information, including names, birthdates, physical and e-mail addresses, and PlayStation Network/Qriocity passwords, logins, handles and online IDs.&quot;&gt;El  fabricante de PlayStation dijo que cree que los hackers tienen ahora  acceso a la información vital de los clientes, incluyendo nombres,  fechas de nacimiento, direcciones fisicas y de correo electrónico,&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The PlayStation maker said it believes hackers now have access to customers&#39; vital information, including names, birthdates, physical and e-mail addresses, and PlayStation Network/Qriocity passwords, logins, handles and online IDs.&quot;&gt; contraseñas, nombres de usuarios&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The PlayStation maker said it believes hackers now have access to customers&#39; vital information, including names, birthdates, physical and e-mail addresses, and PlayStation Network/Qriocity passwords, logins, handles and online IDs.&quot;&gt;&amp;nbsp; e ID&amp;nbsp; de PlayStation Network / Qriocity. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Credit card information, purchase histories and other profile data stored on the PlayStation Network servers also could be compromised, the Japanese company said in a lengthy blog post Tuesday afternoon.&quot;&gt;La compañía japonesa dijo en un extenso Post. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Credit card information, purchase histories and other profile data stored on the PlayStation Network servers also could be compromised, the Japanese company said in a lengthy blog post Tuesday afternoon.&quot;&gt;que el historial de la información de tarjetas de crédito, de compra y otros datos de  perfil almacenado en los servidores de PlayStation Network también  podría haber sido comprometida.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“While there is no evidence at this time that credit card data was taken, we cannot rule out the possibility,” reads the post, which Sony says it will e-mail to all PlayStation Network account holders, as well as users of its Qriocity&quot;&gt;&quot;Si  bien no hay evidencia en este momento que los datos de tarjetas de  crédito fuese tomada, no podemos descartar la posibilidad&quot;, dice el  mensaje, que Sony dice que el correo electrónico a todos los titulares  de cuentas de PlayStation Network, así como los usuarios de Qriocity  &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;streaming-media service.&quot;&gt;streaming. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“If you have provided your credit card data through PlayStation Network or Qriocity, out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained.”&quot;&gt;&quot;Si  usted ha proporcionado datos de su tarjeta de crédito a través de  PlayStation Network o Qriocity, como medio de precaución le estamos  informando que el número de su tarjeta de crédito (excepto el código de  seguridad) y la fecha de caducidad pueden haber sido comprometidos.&quot; &lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The PlayStation Network, which provides online gameplay and digital game shopping for owners of PlayStation 3 and PSP devices, has been down since Wednesday, following what Sony called an “illegal intrusion” on its servers.&quot;&gt;&amp;nbsp;&lt;/span&gt;La compañía dice que espera recuperar &quot;algunos servicios&quot; dentro de una semana. S&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Sony said it has temporarily shut down the PlayStation Network and Qriocity services and hired an outside security firm “to conduct a full and complete investigation into what happened,” but refused to offer details on the hack.&quot;&gt;ony  dijo que ha cerrado temporalmente&amp;nbsp; PlayStation Network y los  servicios Qriocity y contrató a una empresa de seguridad externa &quot;para  llevar a cabo una investigación exhaustiva y completa en lo que ha pasado&quot;,  pero se negó a ofrecer detalles sobre el hack. &lt;/span&gt;&lt;span title=&quot;When the services go back online, Sony suggests users change their passwords.&quot;&gt;Cuando los servicios esten de nuevo en línea, Sony sugerirá a los usuarios el cambio de sus contraseñas. &lt;/span&gt;&lt;span title=&quot;But until then, the company warned about phishing scams.&quot;&gt;Pero hasta entonces, la compañía advirtió sobre posibles estafas de phishing. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;“For your security, we encourage you to be especially aware of e-mail, telephone, postal mail or other scams that ask for personal or sensitive information,” the company said in an Update on PSN Service Outages FAQ posted Tuesday.&quot;&gt;&quot;Para  su seguridad, le animamos a ser especialmente cautelosos en los&amp;nbsp; e-mail,  teléfono, correo postal o por otras estafas que solicitan información  personal o sensible&quot;, dijo la compañía en una actualización en PSN  publicada el martes. &lt;/span&gt;&lt;span title=&quot;“Sony will not contact you in any way, including by e-mail, asking for your credit card number, Social Security number or other personally identifiable information.&quot;&gt;&quot;Sony  no se comunicará con usted de ninguna manera, incluso ni por correo  electrónico, pidiendo su número de tarjeta de crédito, número de Seguro  Social u otra información de identificación personal. &lt;/span&gt;&lt;span title=&quot;If you are asked for this information, you can be confident Sony is not the entity asking.”&quot;&gt;Si se le solicita esta información, usted puede estar seguro de que Sony no es la entidad que lo esta pidiendo. &quot; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;If you are asked for this information, you can be confident Sony is not the entity asking.”&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;If you are asked for this information, you can be confident Sony is not the entity asking.”&quot;&gt; &lt;/span&gt;&lt;span title=&quot;“Although the breach occurred nearly a week ago, Sony has not notified customers of the intrusion, or provided information that is vital to allowing individuals to protect themselves from identity theft, such as informing users whether their personal or financial information may have been compromised,&quot;&gt;Aunque  la violación ocurrió hace casi una semana, Sony no ha notificado a los  clientes de la intrusión, o proporcionado información, que es vital, para  permitir a los usuarios protegerse del robo de identidad, tales como  informar a los usuarios si su información personal o financiera puede  estar en peligro, &lt;/span&gt;&lt;span title=&quot;” he wrote.&quot;&gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;In its FAQ, Sony said, “If you use the same user name or password for your PlayStation Network or Qriocity service account for other unrelated services or accounts, we strongly that you change them.”&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;However, there is currently no way a user can find out what password he or she was using for PlayStation Network if it&#39;s been forgotten, Sony told the website Giant Bomb.&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;However, there is currently no way a user can find out what password he or she was using for PlayStation Network if it&#39;s been forgotten, Sony told the website Giant Bomb.&quot;&gt;&lt;b&gt;Fuente:&lt;/b&gt; http://www.wired.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/7751316982533252529/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/70-millones-de-datos-de-usuarios.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7751316982533252529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7751316982533252529'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/70-millones-de-datos-de-usuarios.html' title='70 millones de datos de usuarios robados de PlayStation Network'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-8820799847074205160</id><published>2011-04-20T03:59:00.000-07:00</published><updated>2011-04-20T04:01:41.508-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>Informe Verizon 2.011 sobre investigaciones de brechas de datos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Data loss through cyber attacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the &amp;quot; Verizon 2011 Data Breach Investigations Report .&amp;quot;&quot;&gt;La  pérdida de datos a través de ataques cibernéticos disminuyó  considerablemente en 2010, pero el número total de infracciones fue  mayor que nunca, según el informe anual&amp;nbsp; &quot;&lt;/span&gt;&lt;/span&gt;Verizon 2011 Data Breach Investigations Report&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Data loss through cyber attacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the &amp;quot; Verizon 2011 Data Breach Investigations Report .&amp;quot;&quot;&gt;.&quot; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;These findings continue to demonstrate that businesses and consumers must remain vigilant in implementing and maintaining security practices.&quot;&gt;Estos  resultados siguen demostrando que las empresas y los consumidores deben  mantenerse vigilantes en la aplicación y el mantenimiento de prácticas  de seguridad.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEshhjkW_XTbBVtHxc0-Od9SiYPGiDvq0_SSr_EWweWGfIPy5HxVJk57gQQAjTGcR0M0NJia2VEORn1uVGosdKS11x5HtDY956VlGMHH2gaTkYGFyA7AgpxCGd7w8mi_9Qsuynbbl99q4D/s640/Untitled.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;254&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEshhjkW_XTbBVtHxc0-Od9SiYPGiDvq0_SSr_EWweWGfIPy5HxVJk57gQQAjTGcR0M0NJia2VEORn1uVGosdKS11x5HtDY956VlGMHH2gaTkYGFyA7AgpxCGd7w8mi_9Qsuynbbl99q4D/s320/Untitled.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;These findings continue to demonstrate that businesses and consumers must remain vigilant in implementing and maintaining security practices.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The number of compromised records involved in data breaches investigated by Verizon and the US Secret Service dropped from 144 million in 2009 to only 4 million in 2010, representing the lowest volume of data loss since the report&#39;s launch in 2008.&quot;&gt;El  número de registros comprometidos involucrados en violaciones de los  datos investigados por Verizon y los EE.UU&amp;nbsp; se redujo  de 144 millones en 2009 a sólo 4 millones en 2010, lo que representa el  volumen más bajo de pérdida de datos desde el lanzamiento del informe en  2008. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Yet this year&#39;s report covers approximately 760 data breaches, the largest caseload to date.&quot;&gt;Sin embargo, el informe de este año cubre aproximadamente 760 infracciones de datos, el mayor número de casos hasta la fecha.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Yet this year&#39;s report covers approximately 760 data breaches, the largest caseload to date.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;According to the report, the seeming contradiction between the low data loss and the high number of breaches likely stems from a significant decline in large-scale breaches, caused by a change in tactics by cybercriminals.&quot;&gt;Según  el informe, la aparente contradicción entre la baja pérdida de datos y  el alto número de infracciones probablemente se debe a una disminución  significativa de las violaciones a gran escala, causado por un cambio en  las tácticas de los cibercriminales. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;They are engaging in small, opportunistic attacks rather than large-scale, difficult attacks and are using relatively unsophisticated methods to successfully penetrate organizations.&quot;&gt;Ellos  están involucrados en ataques pequeños, oportunista en lugar de a  gran escala, están utilizando métodos relativamente  sencillos para penetrar con éxito en las organizaciones. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For example, only 3 percent of breaches were considered unavoidable without extremely difficult or expensive corrective action.&quot;&gt;Por  ejemplo, sólo el 3 por ciento de las infracciones se consideran  inevitable, sin necesidad de corrección muy difícil o demasiado costoso.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For example, only 3 percent of breaches were considered unavoidable without extremely difficult or expensive corrective action.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The report also found that outsiders are responsible for 92 percent of breaches, a significant increase from the 2010 findings.&quot;&gt;El  informe también encontró que los atacantes externos son responsables del 92  por ciento de las infracciones, un aumento significativo de los  resultados de 2010. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Although the percentage of insider attacks decreased significantly over the previous year&quot;&gt;Aunque el porcentaje de ataques internos disminuyó significativamente respecto al año anterior &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Although the percentage of insider attacks decreased significantly over the previous year&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;(16 percent versus 49 percent), this is largely due to the huge increase in smaller external attacks.&quot;&gt;(16 por ciento frente al 49 por ciento), esto es en gran parte debido al enorme aumento en pequeños ataques externos. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;As a result, the total number of insider attacks actually remained relatively constant.&quot;&gt;Como resultado, el número total de ataques internos en realidad se mantuvo relativamente constante.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;As a result, the total number of insider attacks actually remained relatively constant.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hacking (50 percent) and malware (49 percent) were the most prominent types of attack, with many of those attacks involving weak or stolen credentials and passwords.&quot;&gt;El hacking  (50 por ciento) y el malware (el 49 por ciento) fueron los tipos &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hacking (50 percent) and malware (49 percent) were the most prominent types of attack, with many of those attacks involving weak or stolen credentials and passwords.&quot;&gt;de ataque&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Hacking (50 percent) and malware (49 percent) were the most prominent types of attack, with many of those attacks involving weak or stolen credentials and passwords.&quot;&gt; más  importantes, muchos de los ataques fueron por credenciales  débiles o robadas y las contraseñas. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For the first time, physical attacks -- such as compromising ATMs -- appeared as one of the three most common ways to steal information, and&quot;&gt;Por  primera vez, los ataques físicos - como poner en peligro los cajeros  automáticos - apareció como una de las tres formas más comunes para  robar información, y &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;constituted 29 percent of all cases investigated.&quot;&gt;constituían el 29 por ciento de todos los casos investigados.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;constituted 29 percent of all cases investigated.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For the second year in a row, the US Secret Service collaborated with Verizon in preparing the report.&quot;&gt;Por segundo año consecutivo, los&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For the second year in a row, the US Secret Service collaborated with Verizon in preparing the report.&quot;&gt; Servicios Secreto&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For the second year in a row, the US Secret Service collaborated with Verizon in preparing the report.&quot;&gt;s de EE.UU. han colaborado con Verizon para preparar el informe. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In addition, the National High Tech Crime Unit of the Netherlands Policy Agency (KLPD) joined the team this year, allowing Verizon to provide more insight into cases originating in Europe.&quot;&gt;Además,  la Comisión Nacional Unidad de Delitos de Alta Tecnología de la Agencia  de Política de los Países Bajos (KLPD) se unió al equipo este año, lo  que permite a Verizon a ofrecer una visión más clara en los casos  procedentes de Europa. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Approximately one-third of Verizon&#39;s cases originated in either Europe or the Asia-Pacific region, reflecting the global nature of data breaches.&quot;&gt;Aproximadamente  un tercio de los casos de Verizon se originó en Europa o la región de  Asia-Pacífico, lo que refleja la naturaleza global de las violaciones de  datos.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Approximately one-third of Verizon&#39;s cases originated in either Europe or the Asia-Pacific region, reflecting the global nature of data breaches.&quot;&gt;El informe puede ser descargado completo aquí =&amp;gt;&amp;nbsp;&lt;a href=&quot;http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf&quot;&gt;http://www.verizonbusiness.com/&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Approximately one-third of Verizon&#39;s cases originated in either Europe or the Asia-Pacific region, reflecting the global nature of data breaches.&quot;&gt;&lt;b&gt;Fuente&lt;/b&gt;: http://www.thehackernews.com/&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/8820799847074205160/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/informe-verizon-2011-sobre.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/8820799847074205160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/8820799847074205160'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/informe-verizon-2011-sobre.html' title='Informe Verizon 2.011 sobre investigaciones de brechas de datos'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEshhjkW_XTbBVtHxc0-Od9SiYPGiDvq0_SSr_EWweWGfIPy5HxVJk57gQQAjTGcR0M0NJia2VEORn1uVGosdKS11x5HtDY956VlGMHH2gaTkYGFyA7AgpxCGd7w8mi_9Qsuynbbl99q4D/s72-c/Untitled.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-8440447854024455954</id><published>2011-04-13T07:47:00.000-07:00</published><updated>2011-04-13T08:32:58.318-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>Miles de Pilotos de EE.UU.  víctimas de una posible fuga de datos.</title><content type='html'>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Thousands Of US Airways Pilots Victims Of Possible Insider Data Breach&quot;&gt;&lt;/span&gt;&lt;span title=&quot;Apr 07, 2011 | 08:42 PM&quot;&gt;07 de abril 2011 | &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Apr 07, 2011 | 08:42 PM&quot;&gt;08:42 PM &lt;/span&gt;&lt;span title=&quot;By Kelly Jackson Higgins&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;By Kelly Jackson Higgins&quot;&gt;Por Higgins Jackson Kelly &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Darkreading&quot;&gt;DarkReading&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Darkreading&quot;&gt;Miles de Pilotos de EE.UU.&amp;nbsp; víctimas de una posible fuga de datos. Un empleado filtró datos personales de los 3.000 pilotos.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Darkreading&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Darkreading&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The US Airline Pilots Association (USAPA) said it has been working with&quot;&gt;Los Asociación de Pilotos de Líneas Aéreas (USAPA) de &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The US Airline Pilots Association (USAPA) said it has been working with&quot;&gt;EE.UU.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The US Airline Pilots Association (USAPA) said it has been working with&quot;&gt; dijo que ha estado trabajando con &lt;/span&gt;&lt;span title=&quot;the FBI for several months in the wake of a leak of personal information&quot;&gt;el FBI varios meses a raíz de una fuga de información personal &lt;/span&gt;&lt;span title=&quot;of 3,000 of the airline union&#39;s pilots.&quot;&gt;de 3.000 de los pilotos del sindicato de la aerolínea. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;of 3,000 of the airline union&#39;s pilots.&quot;&gt; &lt;/span&gt;&lt;span title=&quot;A spokesman for US Airways today declined to comment on specifics of the&quot;&gt;Un portavoz de EE.UU. hoy Airways se negó a comentar detalles del &lt;/span&gt;&lt;span title=&quot;case, but confirmed that some two-thirds of the airline&#39;s pilots -- 3,000&quot;&gt;caso, pero confirmó que alrededor de dos tercios de los pilotos de la aerolínea - 3000 &lt;/span&gt;&lt;span title=&quot;of its employees -- were affected by the breach.&quot;&gt;de sus empleados - se vieron afectados por la violación.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;of its employees -- were affected by the breach.&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span title=&quot;&amp;quot;We take any claim of the&quot;&gt;&quot;Nos tomamos cualquier demanda de la &lt;/span&gt;&lt;span title=&quot;breach of sensitive data very seriously,&amp;quot; the spokesman said. US Airways&quot;&gt;violación de los datos sensibles muy en serio &quot;, dijo el portavoz.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;breach of sensitive data very seriously,&amp;quot; the spokesman said. US Airways&quot;&gt;EE.UU. Airways &lt;/span&gt;&lt;span title=&quot;is offering 12 months of LifeLock&#39;s identity theft watch services to the&quot;&gt;está ofreciendo&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;is offering 12 months of LifeLock&#39;s identity theft watch services to the&quot;&gt; por el robo&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;is offering 12 months of LifeLock&#39;s identity theft watch services to the&quot;&gt;, 12 meses de servicios de identidad de LifeLock a la &lt;/span&gt;&lt;span title=&quot;pilots, he said.&quot;&gt;los pilotos.&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;The USAPA, a union that represents 5,200 US Airways pilots, yesterday&quot;&gt;El USAPA &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The USAPA, a union that represents 5,200 US Airways pilots, yesterday&quot;&gt;Airways&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The USAPA, a union that represents 5,200 US Airways pilots, yesterday&quot;&gt;, un sindicato que representa a 5.200 pilotos de EE.UU. E&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;publicly expressed its frustration with the airline&#39;s handling of the&quot;&gt;xpresó ayer públicamente su frustración con el manejo de la línea aérea de la &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;case.&quot;&gt;caso. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The USAPA said the airline recently revealed that a management-level&quot;&gt;El USAPA dijo que la aerolínea reveló recientemente que una gestión de nivel &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;pilot leaked a database of US Airways pilot names, addresses, Social&quot;&gt;piloto se filtró una base de datos de nombres de piloto de EE.UU. Direcciones, Sociales &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Security numbers, and possibly passport information to a third-party pilot&quot;&gt;Números de Seguro, y, posiblemente, información del pasaporte a un piloto de terceros &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;group.&quot;&gt;grupo.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;group.&quot;&gt;&lt;b&gt;Fuente:&lt;/b&gt; http://www.darkreading.com &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/8440447854024455954/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/miles-de-pilotos-de-ee.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/8440447854024455954'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/8440447854024455954'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/miles-de-pilotos-de-ee.html' title='Miles de Pilotos de EE.UU.  víctimas de una posible fuga de datos.'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-5492457121313870219</id><published>2011-04-05T15:16:00.000-07:00</published><updated>2011-04-05T15:31:40.439-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>Ataque al servicio de coreo electronico de la compañia Epsilon</title><content type='html'>&amp;nbsp;Las empresas usuarias de los servicios de marqueting por correo electronico de Epsilon han visto expuesta parte de sus listas correos.&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Son muchas las compañias afectadas por este escape de datos entre las que se encuentran las siguientes:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;blockquote&gt;1800-Flowers, Abe Books, Ameriprise Financial, Barclays Bank of Delaware, Bebe Stores Inc, Benefit Cosmetics, BestBuy&amp;nbsp;, Brookstone, Capital One, Citibank, City Market, The College Board, Dillons, Disney Vacations, Eurosport/Soccer.com. Eddie Bauer. Food 4 Less, Fred Meyer, Fry’s, Hilton Honors, The Home Shopping Network, Jay C JP Morgan Chase, King Soopers, Kroger. LL Bean&amp;nbsp;, Marriott Rewards, McKinsey Quarterly, New York &amp;amp; Co., QFC, Ralphs, Red Roof Inns Inc., Ritz Carlton, Robert Half, Smith Brands, Target. TD Ameritrade, TiVo, US Bank, Walgreens&lt;/blockquote&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;IRVING, TEXAS – April 1, 2011 - On March 30th, an incident was detected where a subset* of Epsilon clients&#39; customer data were exposed by an unauthorized entry into Epsilon&#39;s email system.&quot;&gt;IRVING, TEXAS - 1 de abril de 2011 - El 30 de marzo, se detectó un incidente donde un * subconjunto de datos de los clientes&amp;nbsp; de Epsilon&amp;nbsp;fue expuesta por una entrada no autorizada en el sistema de correo electrónico. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The information that was obtained was limited to email addresses and/or customer names only.&quot;&gt;La información que se obtuvo&amp;nbsp;esta limitada&amp;nbsp;a direcciones de correo electrónico y / o nombres de los clientes solamente. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;A rigorous assessment determined that no other personal identifiable information associated with those names was at risk.&quot;&gt;Una evaluación rigurosa determinó que ninguna otra información personal identificable asociada con los nombres estaba en riesgo. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;A full investigation is currently underway.&quot;&gt;Una investigación completa está en curso.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot; title=&quot;A full investigation is currently underway.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For Media Inquiries please contact Jessica Simon (212-457-7135, jsimon@epsilon.com)&quot;&gt;Para la prensa por favor contactar con Jessica Simón (212-457-7135, jsimon@epsilon.com)&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;For Consumer Inquiries please contact Sarah Branam (303-410-5369, sbranam@epsilon.com)&quot;&gt;Para consultas de los consumidores por favor contactar con Sarah Branam (303-410-5369, sbranam@epsilon.com)&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;* Updated April 4, 2011: The affected clients are approximately 2 percent of total clients and are a subset of clients for which Epsilon provides email services.&quot;&gt;* Actualización 04 de abril 2011: Los clientes afectados son aproximadamente un 2 por ciento del total de clientes y son un subconjunto de clientes para los que Epsilon ofrece servicios de correo electrónico&lt;/span&gt;&lt;br /&gt;
Fuente:&lt;a href=&quot;http://www.epsilon.com/News%20&amp;amp;%20Events/Press_Releases_2011/Epsilon_Notifies_Clients_of_Unauthorized_Entry_into_Email_System/p1057-l3&quot;&gt;http://www.epsilon.com/&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/5492457121313870219/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/ataque-al-servicio-de-coreo-electronico.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5492457121313870219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5492457121313870219'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/ataque-al-servicio-de-coreo-electronico.html' title='Ataque al servicio de coreo electronico de la compañia Epsilon'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-5878613485496074554</id><published>2011-04-02T14:53:00.000-07:00</published><updated>2011-04-02T14:54:11.748-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>Brookstone.com. ha visto comprometida la base de datos de correos electrónicos de sus clientes</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;On March 31, we were informed by our e-mail service provider that your&quot;&gt;El 31 de marzo, fuimos informados por nuestro proveedor de servicio de correo electrónico que su &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;e-mail address may have been exposed by unauthorized entry into their&quot;&gt;dirección de correo electrónico puede haber sido expuestos por la entrada no autorizada en sus &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;system.&quot;&gt;del sistema. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Our e-mail service provider deploys e-mails on our behalf to&quot;&gt;Nuestro correo electrónico despliega proveedor de servicios de e-mails en nuestro nombre para &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;customers in our e-mail database.&quot;&gt;los clientes de nuestra base de datos de correo electrónico.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;customers in our e-mail database.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;We want to assure you that the only information that may have been&quot;&gt;Queremos asegurarle que la única información que pudo haber sido &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;obtained was your first name and e-mail address.&quot;&gt;obtenida fue su primer nombre y la dirección de correo electrónico. &lt;/span&gt;&lt;span title=&quot;Your account and any&quot;&gt;Su cuenta y cualquier &lt;/span&gt;&lt;span title=&quot;other personally identifiable information are not stored in this&quot;&gt;otra información de identificación personal no se almacenan en este &lt;/span&gt;&lt;span title=&quot;system and were not at risk.&quot;&gt;sistema y no estaban en riesgo.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;system and were not at risk.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Please note, it is possible you may receive spam e-mail messages as a&quot;&gt;Tenga en cuenta, es posible que usted puede recibir mensajes de spam en su correo electrónico como &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;result.&quot;&gt;resultado de esta incidencia. &lt;/span&gt;&lt;span title=&quot;We want to urge you to be cautious when opening links or&quot;&gt;Nos dirigimos a usted para avisarle de que ha de ser cauteloso al abrir enlaces en su correo cuya procendencia sea&amp;nbsp;&lt;/span&gt;&lt;span title=&quot;attachments from unknown third parties.&quot;&gt; de terceros desconocidos.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;attachments from unknown third parties.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;In keeping with best industry security practices, Brookstone will&quot;&gt;De acuerdo con las mejores prácticas de la industria de seguridad, Brookstone &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;never ask you to provide or confirm any information, including credit&quot;&gt;nunca le pedirá que proporcione o confirme la información, incluido &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;card numbers, unless you are on our secure e-commerce site,&quot;&gt;números de tarjeta de crédito, a menos que esté en nuestro sitio de comercio electrónico seguro, &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Brookstone.com.&quot;&gt;Brookstone.com.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Brookstone.com.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Our service provider has reported this incident to the appropriate authorities.&quot;&gt;Nuestro proveedor de servicios ha informado de este incidente a las autoridades competentes.&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;We regret this has taken place and for any inconvenience this may have&quot;&gt; Lamentamos esta situación y por cualquier inconveniente que esto pueda haber &lt;/span&gt;&lt;span title=&quot;caused you.&quot;&gt;causado. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;We take your privacy very seriously, and we will continue&quot;&gt;Tomamos su privacidad muy en serio, y&amp;nbsp; continuaremos trabajando&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;to work diligently to protect your personal information.&quot;&gt; con diligencia para proteger su información personal.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;to work diligently to protect your personal information.&quot;&gt;&lt;b&gt;Fuente :&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Brookstone.com.&quot;&gt;Brookstone.com.&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/5878613485496074554/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/brookstonecom-ha-visto-comprometida-la.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5878613485496074554'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5878613485496074554'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/brookstonecom-ha-visto-comprometida-la.html' title='Brookstone.com. ha visto comprometida la base de datos de correos electrónicos de sus clientes'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-1564441174209901960</id><published>2011-04-01T15:27:00.000-07:00</published><updated>2011-04-01T15:27:13.840-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>Miembros IEEE victimas de sofisticados ataques</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;IEEE, la sociedad líder en el mundo de los profesionales técnicos, ha advertido que los numeros de tarjeta de crédito e información personal de unos 800 miembros puede haber sido robado . El FBI ha sido notificado de esta circunstancia&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;El grupo anunció en noviembre de 2010 de la brecha en una carta al nuevo pocurador General de&amp;nbsp; Hampshire, fechada el dia&amp;nbsp; 24 de febrero, de acuerdo con ese estado y la ley de protección de datos. Si bien la fuente y el propósito&amp;nbsp;e incumplimiento de la seguridad no se conocen, la pertenencia a IEEE plantea&amp;nbsp;preocupaciones a los profesionales técnicos acerca de si los miembros del grupo podrían ser los objetivos de sofisticados ataques de ingeniería, de phishing y ataques sociales a partir de los datos robados. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;IEEE no respondió de inmediato a las solicitudes de correo electrónico y teléfono para alegaciones o comentarios.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Fuente&lt;/strong&gt;: http://threatpost.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/1564441174209901960/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/miembros-ieee-victimas-de-sofisticados.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/1564441174209901960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/1564441174209901960'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/04/miembros-ieee-victimas-de-sofisticados.html' title='Miembros IEEE victimas de sofisticados ataques'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-7736680895145646953</id><published>2011-03-31T15:23:00.000-07:00</published><updated>2011-03-31T15:23:43.655-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>La academia Maryville pierde tres ficheros informáticos con datos personales</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;A Des Plaines-based social service agency that serves abused children&quot;&gt;Una agencia de servicios sociales con sede en Des Plaines, que atiende a niños maltratados &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;A Des Plaines-based social service agency that serves abused children&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;announced today that computer files containing personal and medical&quot;&gt;anunció hoy que los ficheros informáticos que contenian &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;information on almost 4,000 children who lived at agency facilities dating&quot;&gt;información sobre &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;announced today that computer files containing personal and medical&quot;&gt;datos personales y médicos&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;information on almost 4,000 children who lived at agency facilities dating&quot;&gt;de casi 4.000 niños que vivían en las instalaciones de la agencia &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;back to 1992 are missing.&quot;&gt;desde 1992 han desaparecido.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;back to 1992 are missing.&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;back to 1992 are missing.&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Maryville Academy, which last year worked with about 1,600 children in&quot;&gt;La academia Maryville, que el año pasado trabajó con cerca de 1.600 niños en &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;residential, shelter and hospital programs, lost three files with&quot;&gt;vivienda residencial, y los programas de hospital, perdió tres archivos con &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;information on about 3,900 people, the agency said in an email this&quot;&gt;información sobre cerca de 3.900 personas, dijo la agencia en un correo electrónico &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;afternoon.&quot;&gt;por la tarde. &lt;/span&gt;&lt;span title=&quot;The files were either stolen or misplaced.&quot;&gt;Los archivos fueron robados.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The files were either stolen or misplaced.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The files were in a locked storage room in Maryville?s facility in Des&quot;&gt;Los archivos se encontraban en una habitación bajo llave en las instalaciones de Maryville&amp;nbsp; en Des &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Plaines.&quot;&gt;Plaines. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The agency is investigating how they may have disappeared, Sister&quot;&gt;La agencia &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Catherine F. Ryan, Maryville?s executive director, said in the statement.&quot;&gt;dijo en un comunicado dijo que &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The agency is investigating how they may have disappeared, Sister&quot;&gt;está investigando la forma en que pueden haber desaparecido, la hermana &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Catherine F. Ryan, Maryville?s executive director, said in the statement.&quot;&gt;Catherine F. Ryan, Maryville director ejecutivo. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Data in the files may include birth dates, relatives?&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Data in the files may include birth dates, relatives?&quot;&gt;Los datos de los archivos puede incluir fechas de nacimiento, familiares, &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;names, Social&quot;&gt;nombres, numeros de la seguridad social&lt;/span&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;Security numbers, medical treatment and other information.&quot;&gt;, informaciones sobre el tratamiento médico seguido en el centro&amp;nbsp; y otra información.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;Security numbers, medical treatment and other information.&quot;&gt;&lt;b&gt;Fuente:&lt;/b&gt; http://www.chicagobreakingnews.com&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: #ebeff9;&quot; title=&quot;Security numbers, medical treatment and other information.&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/7736680895145646953/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/la-academia-maryville-pierde-tres.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7736680895145646953'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7736680895145646953'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/la-academia-maryville-pierde-tres.html' title='La academia Maryville pierde tres ficheros informáticos con datos personales'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-7728799582329702106</id><published>2011-03-30T13:04:00.000-07:00</published><updated>2011-03-30T13:08:58.705-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>La NSA investigara el Hack al indice Nasdaq</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglcn4anUmqQSjKtd6wlv2AxHTTNa-VsQtuXK8uTVyaG9Zvrg1bIqH8w6O5dkhBoZgo4JyVQrBsJKuPte7cfMl_V9JDdlz_sdxkp740B_PIuZ_chfJbs6G_Khu1adCOXVEdNARzlYe9eQiA/s1600/nsa_logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglcn4anUmqQSjKtd6wlv2AxHTTNa-VsQtuXK8uTVyaG9Zvrg1bIqH8w6O5dkhBoZgo4JyVQrBsJKuPte7cfMl_V9JDdlz_sdxkp740B_PIuZ_chfJbs6G_Khu1adCOXVEdNARzlYe9eQiA/s1600/nsa_logo.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The National Security Agency has been called in to help investigate recent hack attacks against the company that runs the Nasdaq stock market, according to a news report.&quot;&gt;La  Agencia de Seguridad Nacional ha sido llamada para ayudar a investigar  los recientes ataques de hackers contra la empresa que gestiona la bolsa  de valores Nasdaq, según un informe de prensa.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The National Security Agency has been called in to help investigate recent hack attacks against the company that runs the Nasdaq stock market, according to a news report.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The agency&#39;s precise role in the investigation hasn&#39;t been disclosed, but its involvement suggests the October 2010 attacks may have been more severe than Nasdaq OMX Group has admitted, or it could have involved a nation-state, according to sources that spoke with Businessweek&quot;&gt;El papel  exacto de la agencia en la investigación no ha sido divulgado, pero su  participación sugiere que los ataques de &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The agency&#39;s precise role in the investigation hasn&#39;t been disclosed, but its involvement suggests the October 2010 attacks may have been more severe than Nasdaq OMX Group has admitted, or it could have involved a nation-state, according to sources that spoke with Businessweek&quot;&gt;octubre de 2010&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The agency&#39;s precise role in the investigation hasn&#39;t been disclosed, but its involvement suggests the October 2010 attacks may have been more severe than Nasdaq OMX Group has admitted, or it could have involved a nation-state, according to sources that spoke with Businessweek&quot;&gt; pueden haber sido más  graves de lo que Nasdaq OMX ha admitido, de acuerdo a las fuentes que hablaron con Businessweek &lt;/span&gt;&lt;span title=&quot;.&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;He added that the agency rarely gets involved in investigations of company breaches.&quot;&gt; la agencia rara vez se involucra en las investigaciones de violaciones de la empresa. &lt;/span&gt;&lt;span title=&quot;Last year, the NSA was called in by Google to help the company secure its network after it was targeted in a sophisticated attack.&quot;&gt;El  año pasado, la NSA fue llamada por Google para ayudar a la compañía  asegurar su red después de haber sido blanco de un ataque sofisticado.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Last year, the NSA was called in by Google to help the company secure its network after it was targeted in a sophisticated attack.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Regarding the Nasdaq breach, in addition to the Secret Service, the FBI and the NSA, unidentified foreign intelligence agencies are also reportedly assisting in the probe.&quot;&gt;En  cuanto a la violación Nasdaq, además del Servicio Secreto, el FBI y la  NSA,&amp;nbsp; las agencias de inteligencia &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Regarding the Nasdaq breach, in addition to the Secret Service, the FBI and the NSA, unidentified foreign intelligence agencies are also reportedly assisting in the probe.&quot;&gt;sin identificar&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Regarding the Nasdaq breach, in addition to the Secret Service, the FBI and the NSA, unidentified foreign intelligence agencies are also reportedly assisting in the probe.&quot;&gt; extranjeras están  también en los informes de la investigación. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In February, the Wall Street Journal reported that Nasdaq OMX Group had been repeatedly breached last year.&quot;&gt;En febrero, The Wall Street Journal informó de que Nasdaq OMX Group había sido repetidamente violada el año pasado.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In February, the Wall Street Journal reported that Nasdaq OMX Group had been repeatedly breached last year.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;Nasdaq later confirmed the report but insisted that computers involved in its trading platform were not compromised in the attacks.&quot;&gt;Nasdaq  después confirmó el informe, pero insistió en que los equipos que  participan en su plataforma de operaciones no se vieron comprometidos en  los ataquess. &lt;/span&gt;&lt;span title=&quot;The company said the attacks were limited to a web application known as Directors Desk that allows board members of Nasdaq companies to hold online meetings and exchange confidential information — data that attackers would conceivably find useful to trade on.&quot;&gt;La  compañía dijo que los ataques estaban limitados a una aplicación web  conocida como Mesa de Directores, que permite los miembros del consejo  de las compañías Nasdaq celebrar reuniones en línea y el  intercambio de información confidencial - Datos que &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The company said the attacks were limited to a web application known as Directors Desk that allows board members of Nasdaq companies to hold online meetings and exchange confidential information — data that attackers would conceivably find useful to trade on.&quot;&gt;serían&amp;nbsp; de utilidad&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The company said the attacks were limited to a web application known as Directors Desk that allows board members of Nasdaq companies to hold online meetings and exchange confidential information — data that attackers would conceivably find useful to trade on.&quot;&gt; para los atacantes  posiblemente&amp;nbsp; para el comercio.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The company said the attacks were limited to a web application known as Directors Desk that allows board members of Nasdaq companies to hold online meetings and exchange confidential information — data that attackers would conceivably find useful to trade on.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;The system also includes “a useful contacts section that includes detailed information about all board members and key company executives” and their relevant contact information – a wealth of information for an attacker aiming to conduct a spear-phishing attack against company executives in order to gain&quot;&gt;El  sistema también incluye &quot;una sección de contactos útiles que incluye  información detallada sobre todos los miembros de la junta y los  ejecutivos clave de la compañía&quot; y su información de contacto relevante -  una gran cantidad de información que un atacante podria aprobechar con el objetivo de  realizar un ataque de phishing contra los ejecutivos de la empresa para  ganar &lt;/span&gt;&lt;span title=&quot;login credentials to their networks.&quot;&gt;credenciales de acceso a sus redes.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;login credentials to their networks.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;The Directors Desk, however, may not have been the target but simply an entry point for the hackers to gain further penetration into Nasdaq OMX&#39;s network.&quot;&gt;El  Centro de Administración, sin embargo, no puede haber sido el objetivo,  sino simplemente un punto de entrada para los hackers para obtener una  mayor penetración en la red de Nasdaq OMX. &lt;/span&gt;&lt;span title=&quot;According to Businessweek, investigators have acknowledged they still have no idea how far into the network the attack reached or what data the attackers may have stolen.&quot;&gt;Según  Businessweek, los investigadores han reconocido que todavía no tienen  idea de hasta qué punto ha podido llegar el ataque &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;According to Businessweek, investigators have acknowledged they still have no idea how far into the network the attack reached or what data the attackers may have stolen.&quot;&gt;en la red &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;According to Businessweek, investigators have acknowledged they still have no idea how far into the network the attack reached or what data the attackers may have stolen.&quot;&gt; o los datos que  los atacantes pueden haber robado. &lt;/span&gt;&lt;span title=&quot;The attack prompted the House Financial Services Committee to launch a review in February into the security of the nation&#39;s financial infrastructure.&quot;&gt;El  ataque llevó al Comité de Servicios Financieros de la Cámara para  iniciar un examen en febrero de la seguridad de la infraestructura  financiera del país.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;The attack prompted the House Financial Services Committee to launch a review in February into the security of the nation&#39;s financial infrastructure.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;The NSA&#39;s involvement in the investigation is bound to raise concerns among civil libertarians, since the agency has been accused of trying to strong-arm its way into monitoring critical infrastructure networks.&quot;&gt;La  participación de la NSA en la investigación está planteando  problemas entre los defensores de las libertades civiles, desde que la  agencia ha sido acusada de tratar de mano dura su papel en las redes de  vigilancia de infraestructuras críticas. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;In 2009, National Cyber Security Center (NCSC) Director Rod Beckstrom raised a ruckus when he told the House intelligence committee that the NSA, rather than the Department of Homeland Security which currently oversees cybersecurity for the government, should be in charge of securing cyberspace for&quot;&gt;En  2009, National Cyber ​​Security Center (NCSC) El director Rod Beckstrom  levantó un alboroto cuando le llamo al comité de inteligencia de la  Cámara de la NSA, en lugar de al Departamento de Seguridad Nacional, que  actualmente supervisa la seguridad cibernética para el gobierno.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;government and privately-owned critical infrastructure networks.&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;government and privately-owned critical infrastructure networks.&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span title=&quot;“The National Security Agency has the greatest repository of cybertalent,” Blair said.&quot;&gt;&quot;La Agencia de Seguridad Nacional tiene el mayor depósito de cybertalent&quot;.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“[T]here are some wizards out there at Fort Meade who can do stuff.”&quot;&gt; &lt;/span&gt;&lt;span title=&quot;Blair, commenting on the Google hack in 2010, said that cyberspace could not be secured without a “collaborative effort that incorporates both the US private sector and our international partners.”&quot;&gt;Blair, sobre el hack de Google en el 2010, dijo que el  ciberespacio no puede ser asegurado sin un &quot;esfuerzo de colaboración que  incorpora tanto el sector privado de EE.UU. y nuestros socios  internacionales&quot;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Blair, commenting on the Google hack in 2010, said that cyberspace could not be secured without a “collaborative effort that incorporates both the US private sector and our international partners.”&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span title=&quot;The NSA, however, has been embroiled since 2005 in allegations that the agency violated federal laws in conducting illegal surveillance of Americans&#39; phone and internet communications with the help of telecommunications companies.&quot;&gt;La  NSA, sin embargo, se ha visto envuelta desde 2005 en las acusaciones de  que la agencia violó leyes federales en la realización de la vigilancia  ilegal de los teléfonos de los estadounidenses y las comunicaciones por  Internet con la ayuda de las empresas de telecomunicaciones. &lt;/span&gt;&lt;span title=&quot;Giving the agency an entree into an investigation of Nasdaq could help the government make a case for allowing the NSA to monitor financial networks to ensure their security.&quot;&gt;Dar  a la agencia una entrada en una investigación de Nasdaq podría ayudar  al gobierno a hacer un caso para permitir que la NSA para vigilar las  redes financieras para garantizar su seguridad.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Giving the agency an entree into an investigation of Nasdaq could help the government make a case for allowing the NSA to monitor financial networks to ensure their security.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The NSA referred all questions about the Nasdaq investigation to the FBI, which did not immediately respond to a call for comment from Threat Level.&quot;&gt;La  NSA se refiere a todas las preguntas sobre la investigación en el  Nasdaq con el FBI, que no respondió de inmediato a una llamada para  hacer comentarios del Nivel de la amenaza.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The NSA referred all questions about the Nasdaq investigation to the FBI, which did not immediately respond to a call for comment from Threat Level.&quot;&gt;&lt;b&gt;Fuente:&lt;/b&gt; http://www.thehackernews.com &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/7728799582329702106/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/la-nsa-investigara-el-hack-al-indice.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7728799582329702106'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/7728799582329702106'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/la-nsa-investigara-el-hack-al-indice.html' title='La NSA investigara el Hack al indice Nasdaq'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglcn4anUmqQSjKtd6wlv2AxHTTNa-VsQtuXK8uTVyaG9Zvrg1bIqH8w6O5dkhBoZgo4JyVQrBsJKuPte7cfMl_V9JDdlz_sdxkp740B_PIuZ_chfJbs6G_Khu1adCOXVEdNARzlYe9eQiA/s72-c/nsa_logo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-4445585673092625106</id><published>2011-03-30T02:49:00.000-07:00</published><updated>2011-03-30T02:51:45.611-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilidades"/><title type='text'>Redes de la NASA tienen agujeros de seguridad  potencialmente catastróficos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu9Y4J1Hht6ZKY6Hd8tT7wFkEYghC_wgcoTEKn8XZzHFmJ7TUDF5K4_CYW5o03_gRCNi70GT0pELd0ZdiaNtVzgUUyoQl72o7BVbJA_C_Wmei1Sg3LXyAe0rRG98xCc-hOshkMLHFdkIfW/s320/s-NASA-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu9Y4J1Hht6ZKY6Hd8tT7wFkEYghC_wgcoTEKn8XZzHFmJ7TUDF5K4_CYW5o03_gRCNi70GT0pELd0ZdiaNtVzgUUyoQl72o7BVbJA_C_Wmei1Sg3LXyAe0rRG98xCc-hOshkMLHFdkIfW/s320/s-NASA-large.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span lang=&quot;ES&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;&quot;&gt;Una auditoría realizada por la Oficina del Inspector General ha encontrado que la red informática interna de la NASA está llena de agujeros y es extremadamente vulnerable a un ataque cibernético externo. Lo que es peor, parece que varias de las vulnerabilidades se conocían desde hace meses, aunque siguen sin parchear. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&quot;Seis servidores asociados con TI activos, usados para controlar y contener los datos críticos son vulnerabilidades y podrian permitir a un atacante remoto tomar el control de o hacer que no estén disponibles,&quot; el informe de auditoría, publicado hoy (28 de marzo) por el Inspector General Pablo K. Martin dijo. &lt;br /&gt;
&lt;br /&gt;
&quot;El atacante podría utilizar los ordenadores comprometidos para explotar las debilidades que hemos identificado, una situación que podría degradar gravemente o paralizar las operaciones de la NASA&quot;, continúa el informe. &quot;También se encuentran afectados los servidores de red que podrían revelar las claves de cifrado, contraseñas encriptadas, e información de las cuentas de usuario a atacantes remotos.&quot; &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;No es inusual que los agujeros&amp;nbsp; puedan encontrarse en grandes organizaciones. En ese sentido, la auditoría de Martin pudo haber sido vista como positiva para revelar las vulnerabilidades. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;Pero es bien sabido que la seguridad en las redes de la NASA es débil. la oficina de Martin publicó un informe de auditoría anterior, hace casi un año, y desde entonces nada se ha hecho para remediar la situación. &lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&quot;En un informe de auditoría de mayo de 2010, se recomienda que la NASA inmediatamente a establecer un programa de supervisión de seguridad de TI para esta clave de la red&quot;, dice el informe de hoy. &quot;Sin embargo, a pesar de que la Agencia estaba de &amp;nbsp;acuerdo con la recomendación esta, seguía sin aplicarse en febrero de 2011.&quot; &lt;br /&gt;
&lt;br /&gt;
&quot;Hasta que la NASA se ocupe de estas deficiencias críticas y mejora de sus prácticas de seguridad de TI,&quot; dijo, &quot;la Agencia es vulnerable a posibles incidentes, que podría tener un severo efecto catastrófico en el patrimonio de la Agencia, las operaciones y el personal.&quot; &lt;br /&gt;
&lt;br /&gt;
Un informe de la Oficina de Contabilidad del Gobierno en octubre de 2009 fue igualmente crítico de la agencia, contrastaba &amp;nbsp;que &quot;La NASA todavía no ha aplicado plenamente las actividades clave de su programa de seguridad de la información para asegurar que los controles están adecuadamente diseñados y operando de manera efectiva.&quot; &lt;br /&gt;
&lt;br /&gt;
Los servidores de la NASA se han dividido en muchas ocasiones antes. Un nuevo informe de Martin menciona dos infracciones graves en 2009, durante una de los cuales los intrusos robaron &quot;22 gigabytes de datos restringidos para exportación de un sistema informático Jet Propulsion Laboratory (JPL).&quot; &lt;br /&gt;
&lt;br /&gt;
El hacker británico Gary McKinnon está a la espera de extradición a los EE.UU. por la presunta piratería en las redes de la NASA, así como los del Departamento de Defensa, en 2001 y 2002. &lt;br /&gt;
&lt;br /&gt;
la oficina de Martin recomienda a la NASA &quot;acelerar la aplicación de nuestras 05 2010 recomendaciones y a establecer un programa informático de supervisión de seguridad para la red de la NASA.&quot;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;ES&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;ES&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;ES&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span lang=&quot;ES&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br style=&quot;mso-special-character: line-break;&quot; /&gt; &lt;b&gt;Informe Completo:&lt;/b&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://oig.nasa.gov/audits/reports/FY11/IG-11-017.pdf&quot;&gt;http://oig.nasa.gov/audits/reports/FY11/IG-11-017.pdf&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Fuente:&lt;/b&gt; http://www.thehackernews.com &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/4445585673092625106/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/redes-de-la-nasa-tienen-agujeros-de.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/4445585673092625106'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/4445585673092625106'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/redes-de-la-nasa-tienen-agujeros-de.html' title='Redes de la NASA tienen agujeros de seguridad  potencialmente catastróficos'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu9Y4J1Hht6ZKY6Hd8tT7wFkEYghC_wgcoTEKn8XZzHFmJ7TUDF5K4_CYW5o03_gRCNi70GT0pELd0ZdiaNtVzgUUyoQl72o7BVbJA_C_Wmei1Sg3LXyAe0rRG98xCc-hOshkMLHFdkIfW/s72-c/s-NASA-large.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-770461121730799410</id><published>2011-03-28T13:50:00.000-07:00</published><updated>2011-03-28T13:53:57.440-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ataques"/><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>hackers chinos sospechosos en el compromiso de equipos parlamentarios australianos</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The parliamentary computers of Prime Minister Julia Gillard and at least two other senior ministers are suspected of being hacked.&quot;&gt;Las ordenadores parlamentarios del primer ministro Julia Gillard y al menos otros dos ministros estan en sospechas de&amp;nbsp; haber sido hackeados.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm8u_uNPVddnW2SG28YJhA0yXDjm1FRPlCUG7RJMH8B1xpkox1YMYTAV0-20Byc3HXwMFChSl6vn7BujX2Mnmn-Rcsw_WkmcunoqJvilFJeRBgKZRy4AAlb9acokWocpfals4eR127mtHm/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;205&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm8u_uNPVddnW2SG28YJhA0yXDjm1FRPlCUG7RJMH8B1xpkox1YMYTAV0-20Byc3HXwMFChSl6vn7BujX2Mnmn-Rcsw_WkmcunoqJvilFJeRBgKZRy4AAlb9acokWocpfals4eR127mtHm/s320/images.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The parliamentary computers of Prime Minister Julia Gillard and at least two other senior ministers are suspected of being hacked.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Ms Gillard&#39;s parliamentary computer, along with those of several cabinet ministers including Foreign Minister Kevin Rudd and Defence Minister Stephen Smith were believed to have been compromised, News Ltd newspapers report.&quot;&gt;El equipo  parlamentario de Sra. Gillard, junto con&amp;nbsp; varios de los ministros del  gabinete, como el del&amp;nbsp; ministro de ausntos exteriores, Kevin Rudd, y el  ministro de defensa, Stephen Smith, se cree que han sido comprometidos,  segun informa News Ltd. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of emails are believed to have been accessed in the cyber attacks.&quot;&gt;Se cree que &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of emails are believed to have been accessed in the cyber attacks.&quot;&gt;se ha accedido a miles de correos electrónicos &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of emails are believed to have been accessed in the cyber attacks.&quot;&gt;durante los ataques cibernéticos. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Four Australian government sources confirmed with the newspapers they had been told Chinese intelligence agencies were part of a list of suspected hackers.&quot;&gt;Cuatro  fuentes del gobierno australiano confirmaron a la prensa que habían dicho que&amp;nbsp; los organismos de inteligencia chinos eran parte de una lista de  presuntos hackers que participaron en el ataque.&amp;nbsp; F&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;US intelligence officials alerted their Australian counterparts and News Ltd believes ASIO has started an investigation.&quot;&gt;uncionarios de inteligencia de EE.UU. alertaron a sus homólogos de Australia y News Ltd. Se cree que ASIO ha iniciado una investigación. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The newspaper reports senior sources in the government confirmed the computers were subjected to the espionage for more than a month from sometime last month.&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Attorney-General Robert McClelland would neither confirm nor deny the attacks.&quot;&gt;El fiscal general Robert McClelland no confirmó ni negó los ataques.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Attorney-General Robert McClelland would neither confirm nor deny the attacks.&quot;&gt;&lt;b&gt;Fuente:&lt;/b&gt; http://www.thehackernews.com &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/770461121730799410/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/hackers-chinos-sospechosos-en-el.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/770461121730799410'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/770461121730799410'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/hackers-chinos-sospechosos-en-el.html' title='hackers chinos sospechosos en el compromiso de equipos parlamentarios australianos'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm8u_uNPVddnW2SG28YJhA0yXDjm1FRPlCUG7RJMH8B1xpkox1YMYTAV0-20Byc3HXwMFChSl6vn7BujX2Mnmn-Rcsw_WkmcunoqJvilFJeRBgKZRy4AAlb9acokWocpfals4eR127mtHm/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-5144673765790689282</id><published>2011-03-26T13:58:00.000-07:00</published><updated>2011-03-26T14:05:42.037-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>Bank of America miles de cuentas en peligro</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyv5hDciKujMnd9nIbL8i_bfjSEftz7UZWLA14h_6nrz2oyGSFWxOAmqTKusvpDGzLzpR9Z-_HWJN-kndYRq9dXtgy7w2bPgoqqL8dPl_ofg0fPR_Ca9nacuCEMXRjx-Z9gLIIosF_pgwZ/s1600/Bank-of-America-Online-Banking-Down-Its-not-a-hacking...-300x200.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyv5hDciKujMnd9nIbL8i_bfjSEftz7UZWLA14h_6nrz2oyGSFWxOAmqTKusvpDGzLzpR9Z-_HWJN-kndYRq9dXtgy7w2bPgoqqL8dPl_ofg0fPR_Ca9nacuCEMXRjx-Z9gLIIosF_pgwZ/s320/Bank-of-America-Online-Banking-Down-Its-not-a-hacking...-300x200.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of Bank of America customers&#39; account information could be in jeopardy after a major security breach.&quot;&gt;Miles de cuentas &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of Bank of America customers&#39; account information could be in jeopardy after a major security breach.&quot;&gt;de los clientes&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of Bank of America customers&#39; account information could be in jeopardy after a major security breach.&quot;&gt; del banco &lt;b&gt;Bank of America&lt;/b&gt;&amp;nbsp; podría  estar en peligro después de un fallo de seguridad importante.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Thousands of Bank of America customers&#39; account information could be in jeopardy after a major security breach.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Christy Clark went to a Royal Oak drug store Friday, but when her debit card was declined, she knew something was wrong.&quot;&gt;Christy  Clark fue a la farmacia de Royal Oak el viernes, pero su tarjeta de  débito fué rechazada, entonces ella supo que algo andaba mal. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“I was very embarrassed,” Clark said.&quot;&gt;&quot;Me sentí muy avergonzada&quot;, dijo Clark. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;She went straight to the Bank of America branch near 12 Mile Road near Woodward Avenue in Royal Oak to report the problem.&quot;&gt;Ella  fue directamente a la sucursal de Bank of America, cerca de 12 Mile  Road, cerca de la avenida Woodward en Royal Oak para informar del  problema. &lt;/span&gt;&lt;span title=&quot;When she arrived, she was surprised to see the lobby packed with customers who experienced the same issue.&quot;&gt;Cuando ella llegó, se sorprendió al ver el vestíbulo lleno de clientes que han experimentado el mismo problema. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“When I entered the branch, that&#39;s when I realized this was a bigger problem,” Clark told Local 4.&quot;&gt;&quot;Cuando entré en la sucursal, es cuando me di cuenta de esto era un problema mayor&quot;, dijo Clark. &lt;/span&gt;&lt;span title=&quot;Bank of America told Local 4 this involves more than $100,000 worth of transitions.&quot;&gt;Bank of America dijo que se manejaron más de $100,000 en las transiciones. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bank employees told Clark they issued a number of temporary debit cards to customers who discovered money was missing from their account.&quot;&gt;Los  empleados del Banco, dijo Clark,emitieron una serie de tarjetas de  débito temporal a los clientes que descubrieron que faltaba dinero de sus  cuentas. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Two bank staffers said they were also victims of this crime.&quot;&gt;Dos empleados de banco también fueron víctimas de este delito.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Two bank staffers said they were also victims of this crime.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;A spokesperson for Bank of America said they are trying to figure out exactly how widespread the problem is.&quot;&gt;Un portavoz de Bank of America dijo que estan tratando de averiguar exactamente el alcance de la brecha. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;The bank issued this statement to Local 4, “In the event that a skimming device has been used, we are reaching out to those customers to block their cards.” Christy Clarke is grateful the bank is taking action to protect customers&#39; money.&quot;&gt;El  banco emitió este comunicado: &quot;En el caso de que un  dispositivo de duplicado se ha utilizado, estamos llegando a los  clientes para bloquear sus tarjetas.&quot; Christy Clarke agradece a el banco las medidas que esta tomando para proteger el dinero de los clientes. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“They could have cleaned out my account.”&quot;&gt;&quot;Podrían haber limpiado mi cuenta.&quot;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;“They could have cleaned out my account.”&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;It remains unclear if these accounts were hacked into internally, or if someone outside the company committed the crime.&quot;&gt;No está claro si estas cuentas fueron atacadas desde el interior, o si alguien fuera de la compañía cometió el crimen. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;It is also unclear if this problem is limited to Michigan, or customers across the nation are impacted.&quot;&gt;Tampoco está claro si este problema se limita a Michigan, o clientes si en todo el país hay afectados. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bank of America is investigating all possibilities to see where the money went.&quot;&gt;Bank of America está investigando todas las posibilidades para ver dónde fue el dinero. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Bank of America is investigating all possibilities to see where the money went.&quot;&gt; &lt;/span&gt;&lt;span title=&quot;Bank of America said if any suspicious activity is flagged on your account, it will be shutdown immediately.&quot;&gt;Bank of America dijo que si alguna actividad sospechosa seobservara en su cuenta, esta seria cerrada inmediatamente.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Bank of America said if any suspicious activity is flagged on your account, it will be shutdown immediately.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;Bank of America said if any suspicious activity is flagged on your account, it will be shutdown immediately.&quot;&gt;&lt;b&gt;Fuente:&lt;/b&gt; http://www.thehackernews.com&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/5144673765790689282/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/bank-of-america-miles-de-cuentas-en.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5144673765790689282'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5144673765790689282'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/bank-of-america-miles-de-cuentas-en.html' title='Bank of America miles de cuentas en peligro'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyv5hDciKujMnd9nIbL8i_bfjSEftz7UZWLA14h_6nrz2oyGSFWxOAmqTKusvpDGzLzpR9Z-_HWJN-kndYRq9dXtgy7w2bPgoqqL8dPl_ofg0fPR_Ca9nacuCEMXRjx-Z9gLIIosF_pgwZ/s72-c/Bank-of-America-Online-Banking-Down-Its-not-a-hacking...-300x200.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-5130298115511091325</id><published>2011-03-26T04:42:00.000-07:00</published><updated>2011-03-27T13:12:30.253-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="parches"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerabilidades"/><title type='text'>Google parchea seis vulnerabilidades graves en Chrome</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE68KisKq42TYYVl9HQKWNACrjGx66dY7WpCT4QL5XBvTXrgWZidHDPKwbzLHXMkkNE9WQ4Rg95vBdbDCjaehMrixWrG3Wb5tPWYxyt6lyZzAVVQcHgXtHnBRsBy-KvME1Mf1YleCUurhyphenhyphen/s1600/Google-Chrome-300x200.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE68KisKq42TYYVl9HQKWNACrjGx66dY7WpCT4QL5XBvTXrgWZidHDPKwbzLHXMkkNE9WQ4Rg95vBdbDCjaehMrixWrG3Wb5tPWYxyt6lyZzAVVQcHgXtHnBRsBy-KvME1Mf1YleCUurhyphenhyphen/s320/Google-Chrome-300x200.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span class=&quot;longtext&quot;&gt;&lt;span lang=&quot;ES&quot; style=&quot;background: none repeat scroll 0% 0% white; color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Google el jueves parcheó seis vulnerabilidades en Chrome, y como siempre, en silencio emitió actualizaciones del navegador.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;ES&quot; style=&quot;background: none repeat scroll 0% 0% white; color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;
&lt;span title=&quot;The update to Chrome 10.0.648.204 also included two more blacklisted SSL certificates that may be related to last week&#39;s theft of nine digital certificates from a Comodo reseller.&quot;&gt;En la actualización de Chrome 10.0.648.204 también se incluyen dos listas negras de certificados SSL, que puede estar relacionado con el robo, de la semana pasada de nueve certificados digitales de un distribuidor de Comodo.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span lang=&quot;ES&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;span title=&quot;All six bugs were rated &amp;quot;high,&amp;quot; Google&#39;s second-most-serious ranking in its threat scoring system.&quot;&gt;Los seis errores fueron calificados de &quot;alto&quot;, ocupando el segundo el mayor peligro calificándolo Google como el segundo en&amp;nbsp; amenaza en su sistema de puntuación. U&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;no tipo de error de administración de memoria que puede ser explotado para inyectar código de ataque -, mientras que un segundo par se situaban por Google como &quot;vieja puntero&quot; vulnerabilidades, otro tipo &lt;/span&gt;&lt;/span&gt;&lt;span title=&quot;of memory allocation flaw.&quot;&gt;de error de asignación de memoria.&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;ES&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span title=&quot;As is Google&#39;s practice, the company locked down its bug-tracking database, blocking access to the technical details of the patched vulnerabilities.&quot;&gt;Como práctica habitual de Google, la compañía ha bloqueado el acceso a los detalles técnicos de las vulnerabilidades parcheadas. &lt;/span&gt;&lt;/span&gt;&lt;span title=&quot;Google usually unlocks the bug entries several weeks, sometimes months later, to give users time to update before the information goes public.&quot;&gt;Google usualmente abre las entradas meses más tarde, cuanod ya han sido parcheadas, para dar a los usuarios antes de tiempo a actualizar antes de que la información sea pública.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;span title=&quot;Google paid out $8,500 in bounties to three different researchers for finding and reporting the six vulnerabilities.&quot;&gt;Google pagó $ 8.500 en primas a tres diferentes investigadores por la búsqueda y presentación de informes de las seis vulnerabilidades. &lt;/span&gt;&lt;span title=&quot;So far this year, Google has cut bounty checks totaling $58,145.&quot;&gt;En lo que va de este año, Google ha reducido los controles de recompensas por un total de 58.145 dólares.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background: none repeat scroll 0% 0% white;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span title=&quot;Frequent-contributor Sergey Glazunov took home $7,000 for reporting four of the bugs patched Thursday, bringing his 2011 bounty total to $20,634.&quot;&gt;El colaborador frecuente, Sergey Glazunov, se llevó a casa $ 7,000 por la presentación de informes de cuatro de los bugs parcheados jueves, llevando su total de recompensas de 2011 a la suma de $ 20.634. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;longtext&quot;&gt;Glazunov se ha convertido en el más prolífico de los investigadores independientes que se especializan en la erradicación de defectos en Chrome.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;ES&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;
&lt;span title=&quot;Yesterday was the sixth time Google patched security vulnerabilities in its browser this year.&quot;&gt;Ayer fue la sexta vez que Google parchea su navegador este año. Google dijo que la actualización también añade soporte para el administrador de contraseñas del navegador en Linux, e incluye correcciones de rendimiento y estabilidad. &lt;/span&gt;&lt;span title=&quot;According to the Chrome change list, it also blacklisted two additional SSL (secure socket layer) certificates, the digital certificates that encrypt traffic between users and sites.&quot;&gt;De acuerdo con la lista de cambios de Chrome, también a la lista negra se añaden otros dos certificados &amp;nbsp;SSL (Secure Socket Layer).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;ES&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;longtext&quot;&gt;&lt;/span&gt;&lt;span title=&quot;The additions to the SSL blacklist may be connected to last week&#39;s theft of several certificates from a Comodo reseller, an event that prompted Comodo to revoke the stolen certificates.&quot;&gt;Las adiciones a la lista negra SSL se puede conectar con el robo de la semana pasada de varios certificados de un distribuidor de Comodo, un incidente que llevó a Comodo para revocar los certificados robados. &lt;/span&gt;&lt;span title=&quot;Since then, Google, Mozilla and Microsoft have each issued updates -- Google was the first off the mark -- to block the certificates and warn users if they tried to connect to fake sites.&quot;&gt;Desde entonces, Google, Mozilla y Microsoft han publicado actualizaciones de cada uno - Google fue el primero fuera de lugar - para bloquear los certificados y advertir a los usuarios que trataron de conectarse a estos sitios falsos.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span title=&quot;Comodo has cited circumstantial evidence that points to Iran, perhaps the Iranian government, being involved in the certificate theft.&quot;&gt;Comodo ha citado que apunta a Irán la evidencia circunstancial, tal vez el gobierno iraní, podría estar involucrado en el robo de certificados. &lt;/span&gt;&lt;span title=&quot;Google did not immediately reply to questions Friday about whether the newest additions to Chrome&#39;s blacklist were related to the Comodo theft.&quot;&gt;Google no respondió de inmediato a las preguntas del viernes sobre si las últimas incorporaciones a la lista negra de Chrome se relacionaron con el robo de Comodo.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;longtext&quot;&gt;&lt;/span&gt;&lt;span title=&quot;Chrome 10 can be downloaded for Windows, Mac OS X and Linux from Google&#39;s Web site.&quot;&gt;Chrome 10 puede ser descargado para Windows, Mac OS X y Linux desde el sitio Web de Google. &lt;/span&gt;&lt;span title=&quot;Users already running the browser will be updated automatically.&quot;&gt;Los usuarios que ya estan ejecutando el navegador, este se actualizará automáticamente.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span lang=&quot;ES&quot; style=&quot;color: black; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;span title=&quot;Users already running the browser will be updated automatically.&quot;&gt;&lt;b&gt;Fuente: &lt;/b&gt;http://www.thehackernews.com/&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/5130298115511091325/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/google-parchea-seis-vulnerabilidades.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5130298115511091325'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/5130298115511091325'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/google-parchea-seis-vulnerabilidades.html' title='Google parchea seis vulnerabilidades graves en Chrome'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE68KisKq42TYYVl9HQKWNACrjGx66dY7WpCT4QL5XBvTXrgWZidHDPKwbzLHXMkkNE9WQ4Rg95vBdbDCjaehMrixWrG3Wb5tPWYxyt6lyZzAVVQcHgXtHnBRsBy-KvME1Mf1YleCUurhyphenhyphen/s72-c/Google-Chrome-300x200.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-9173552270199240840</id><published>2011-03-25T14:55:00.000-07:00</published><updated>2011-03-26T04:43:54.177-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="incidente"/><title type='text'>TripAdvisor perdida de correos electronicos</title><content type='html'>&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Travel site TripAdvisor on Thursday said that a portion of its member&quot;&gt;El sitio de viajes TripAdvisor dijo el jueves que una parte de la &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;e-mail list had been stolen, though member passwords were not&quot;&gt;lista de correo electrónico &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Travel site TripAdvisor on Thursday said that a portion of its member&quot;&gt;de sus miembros&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;e-mail list had been stolen, though member passwords were not&quot;&gt;había sido robado, aunque el escape de datos no comprometio las contraseñas &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;compromised.&quot;&gt;de los usuarios. &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;&amp;quot;We&#39;ve confirmed the source of the vulnerability and shut it down,&amp;quot;&quot;&gt;&quot;Hemos confirmado la fuente de la vulnerabilidad y ha sido cerrada&quot; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;&amp;quot;We&#39;ve confirmed the source of the vulnerability and shut it down,&amp;quot;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Steve Kaufer, co-founder and CEO of TripAdvisor, said in an e-mail to&quot;&gt;Steve Kaufer, co-fundador y CEO de TripAdvisor, dijo en un correo electrónico a &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;users.&quot;&gt;usuarios. &lt;/span&gt;&lt;span title=&quot;&amp;quot;We&#39;re taking this incident very seriously and are actively&quot;&gt;&quot;Estamos tomando este incidente muy en serio y estamos activamente &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;pursuing the matter with law enforcement.&amp;quot;&quot;&gt;investigando el asunto con la policía. &quot; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;pursuing the matter with law enforcement.&amp;quot;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kaufer said only a &amp;quot;portion&amp;quot; of its e-mail addresses were taken, and&quot;&gt;Kaufer dijo que sólo una &quot;porción&quot; de sus direcciones de correo electrónico fueron tomadas, y &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;most users will not be affected.&quot;&gt;mayoría de los usuarios no se verán afectados. &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;&amp;quot;You may receive some unsolicited&quot;&gt;&quot;Es posible que reciba algunos &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;emails (spam) as a result of this incident,&amp;quot; he wrote.&quot;&gt;correos electrónicos&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;&amp;quot;You may receive some unsolicited&quot;&gt; no solicitados&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;emails (spam) as a result of this incident,&amp;quot; he wrote.&quot;&gt; (spam)&amp;nbsp; como resultado de este incidente &quot;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;emails (spam) as a result of this incident,&amp;quot; he wrote.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;Kaufer said he is reaching out to users because &amp;quot;we think it&#39;s the&quot;&gt;Kaufer dijo que está avisando a los usuarios porque &quot;creemos que es &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;right thing to do.&amp;quot; He said that the site does not collect credit card&quot;&gt;lo correcto.&quot; Él mismo&amp;nbsp; dijo que el sitio no&amp;nbsp; recoge números de tarjeta de crédito &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;or financial information, or sell or rent its member list.&quot;&gt;u otra información financiera, en su lista de miembros.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;or financial information, or sell or rent its member list.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;or financial information, or sell or rent its member list.&quot;&gt; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;&amp;quot;We will continue to take all appropriate measures to keep your&quot;&gt;&quot;Vamos a seguir adoptando todas las medidas apropiadas y necesarias. para mantener su &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;personal information secure at TripAdvisor,&amp;quot; he wrote. &amp;quot;I sincerely&quot;&gt;información&amp;nbsp; personal segura en TripAdvisor. Sinceramente &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;apologize for this incident and appreciate your membership in our&quot;&gt;disculpas por este incidente y agradecemos &lt;/span&gt;&lt;/span&gt;su&amp;nbsp;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;apologize for this incident and appreciate your membership in our&quot;&gt; pertenencia a nuestra&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;travel community.&amp;quot;&quot;&gt;comunidad de viajes &quot;. &lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;travel community.&amp;quot;&quot;&gt; &lt;/span&gt;&lt;span title=&quot;The news comes the same day that potential TripAdvisor rival Gogobot&quot;&gt;La noticia llega el mismo día que el potencial rival de TripAdvisor, &lt;b&gt;Gogobot&lt;/b&gt;, &lt;/span&gt;&lt;span title=&quot;announced plans to integrate with Expedia, Kayak, Hotels.com, Orbitz,&quot;&gt;anunció planes para integrarse con Expedia, Kayak, Hotels.com, Orbitz, &lt;/span&gt;&lt;span title=&quot;and Priceline so that users can directly book flights and hotels on&quot;&gt;y Priceline para que los usuarios puedan directamente reservar vuelos y hoteles en &lt;/span&gt;&lt;span title=&quot;the site.&quot;&gt;el sitio.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;the site.&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;In September, TripAdvisor launched SniqueAway.com, a site that&quot;&gt;&lt;b&gt;TripAdvisor&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span title=&quot;In September, TripAdvisor launched SniqueAway.com, a site that&quot;&gt;en septiembre, lanzó SniqueAway.com , un sitio que &lt;/span&gt;&lt;span title=&quot;combines the company&#39;s highly-reviewed hotels with special deals on&quot;&gt;combina hoteles altamente revisados y con ofertas especiales&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;those properties.&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;long_text&quot; id=&quot;result_box&quot;&gt;&lt;span style=&quot;background-color: white;&quot; title=&quot;those properties.&quot;&gt;&lt;b&gt;Mas Informacion:&lt;/b&gt; http://www.tripadvisor.com/vpages/more_information.html &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/9173552270199240840/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/tripadvisor-perdida-de-correos.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/9173552270199240840'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/9173552270199240840'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/tripadvisor-perdida-de-correos.html' title='TripAdvisor perdida de correos electronicos'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-359361763705962299.post-3372002748379388865</id><published>2011-03-25T14:17:00.000-07:00</published><updated>2011-03-25T14:17:14.447-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Noticias"/><title type='text'>Presentacion</title><content type='html'>Empezamos este Blog con ilusion y con ganas !!&lt;br /&gt;
En el trataremos de publicar cada dia los incidentes informaticos que resultan en perdida de datos o en intrusiones en compañias que dia a dia se ven atacadas por diferentes colectivos con el fin de obtener los posibles datos sensibles de las bases de datos.</content><link rel='replies' type='application/atom+xml' href='http://cyberincidentes.blogspot.com/feeds/3372002748379388865/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/presentacion.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/3372002748379388865'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/359361763705962299/posts/default/3372002748379388865'/><link rel='alternate' type='text/html' href='http://cyberincidentes.blogspot.com/2011/03/presentacion.html' title='Presentacion'/><author><name>Lostmon</name><uri>http://www.blogger.com/profile/12070694315455553235</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>