Operación “Octubre Rojo”

string(14) "attribute >>>>" array(0) { } string(14) "attribute >>>>" array(0) { }
news and informations automotive,business,crime,health,life,politics,science,technology,travelautomotive,business,crime,health,life,politics,science,technology,travel

Hace unos días hablaba en otro post:   Campo de Batalla: La Red   sobre el auge del malware a gran escala y diseñado para atacar infraestructuras críticas de países.  Hoy nos despertamos con el descubrimiento de una campaña de espionaje de proporciones internacionales a la que se le ha dado un nombre tan cinematrográfico […]

Se alquilan herramientas de hacking

string(14) "attribute >>>>" array(5) { ["width"]=> int(300) ["height"]=> int(225) ["file"]=> string(33) "2013/01/8301_hand_on_keyboard.jpg" ["sizes"]=> array(1) { ["thumbnail"]=> array(4) { ["file"]=> string(33) "8301_hand_on_keyboard-150x150.jpg" ["width"]=> int(150) ["height"]=> int(150) ["mime-type"]=> string(10) "image/jpeg" } } ["image_meta"]=> array(10) { ["aperture"]=> int(0) ["credit"]=> string(0) "" ["camera"]=> string(0) "" ["caption"]=> string(0) "" ["created_timestamp"]=> int(0) ["copyright"]=> string(0) "" ["focal_length"]=> int(0) ["iso"]=> int(0) ["shutter_speed"]=> int(0) ["title"]=> string(0) "" } } array(0) { } string(14) "attribute >>>>" array(5) { ["width"]=> int(300) ["height"]=> int(225) ["file"]=> string(33) "2013/01/8301_hand_on_keyboard.jpg" ["sizes"]=> array(1) { ["thumbnail"]=> array(4) { ["file"]=> string(33) "8301_hand_on_keyboard-150x150.jpg" ["width"]=> int(150) ["height"]=> int(150) ["mime-type"]=> string(10) "image/jpeg" } } ["image_meta"]=> array(10) { ["aperture"]=> int(0) ["credit"]=> string(0) "" ["camera"]=> string(0) "" ["caption"]=> string(0) "" ["created_timestamp"]=> int(0) ["copyright"]=> string(0) "" ["focal_length"]=> int(0) ["iso"]=> int(0) ["shutter_speed"]=> int(0) ["title"]=> string(0) "" } } array(0) { }
news and informations automotive,business,crime,health,life,politics,science,technology,travelautomotive,business,crime,health,life,politics,science,technology,travel

Ahora que el Cloud Computing empieza a ser algo habitual, nos resultan familiares términos como SaaS (Software as a Service), IaaS (Infrastructure as a Service) o PaaS (Platform as a Service).  Cualquiera de las tres modalidades se basa en pagar por el uso que hacemos de una serie de herramientas tanto hardware como software.  De […]

Campo de Batalla: La Red

string(14) "attribute >>>>" array(5) { ["width"]=> int(500) ["height"]=> int(409) ["file"]=> string(33) "2013/01/5280529990_f00a41c28a.jpg" ["sizes"]=> array(2) { ["thumbnail"]=> array(4) { ["file"]=> string(33) "5280529990_f00a41c28a-150x150.jpg" ["width"]=> int(150) ["height"]=> int(150) ["mime-type"]=> string(10) "image/jpeg" } ["medium"]=> array(4) { ["file"]=> string(33) "5280529990_f00a41c28a-300x245.jpg" ["width"]=> int(300) ["height"]=> int(245) ["mime-type"]=> string(10) "image/jpeg" } } ["image_meta"]=> array(10) { ["aperture"]=> int(0) ["credit"]=> string(0) "" ["camera"]=> string(0) "" ["caption"]=> string(0) "" ["created_timestamp"]=> int(0) ["copyright"]=> string(0) "" ["focal_length"]=> int(0) ["iso"]=> int(0) ["shutter_speed"]=> int(0) ["title"]=> string(0) "" } } array(0) { } string(14) "attribute >>>>" array(5) { ["width"]=> int(500) ["height"]=> int(409) ["file"]=> string(33) "2013/01/5280529990_f00a41c28a.jpg" ["sizes"]=> array(2) { ["thumbnail"]=> array(4) { ["file"]=> string(33) "5280529990_f00a41c28a-150x150.jpg" ["width"]=> int(150) ["height"]=> int(150) ["mime-type"]=> string(10) "image/jpeg" } ["medium"]=> array(4) { ["file"]=> string(33) "5280529990_f00a41c28a-300x245.jpg" ["width"]=> int(300) ["height"]=> int(245) ["mime-type"]=> string(10) "image/jpeg" } } ["image_meta"]=> array(10) { ["aperture"]=> int(0) ["credit"]=> string(0) "" ["camera"]=> string(0) "" ["caption"]=> string(0) "" ["created_timestamp"]=> int(0) ["copyright"]=> string(0) "" ["focal_length"]=> int(0) ["iso"]=> int(0) ["shutter_speed"]=> int(0) ["title"]=> string(0) "" } } array(0) { }
news and informations automotive,business,crime,health,life,politics,science,technology,travelautomotive,business,crime,health,life,politics,science,technology,travel

En un mundo hiperconectado como el actual donde nuestra dependencia de la tecnología es cada vez mayor, e incluso total en algunos casos, es de esperar que haya quien quiera sacar provecho usando cualquier medio que tenga a su alcance.

Bring Your Own Device (2/2)

string(14) "attribute >>>>" array(5) { ["width"]=> int(492) ["height"]=> int(287) ["file"]=> string(21) "2012/12/WordCloud.jpg" ["sizes"]=> array(2) { ["thumbnail"]=> array(4) { ["file"]=> string(21) "WordCloud-150x150.jpg" ["width"]=> int(150) ["height"]=> int(150) ["mime-type"]=> string(10) "image/jpeg" } ["medium"]=> array(4) { ["file"]=> string(21) "WordCloud-300x175.jpg" ["width"]=> int(300) ["height"]=> int(175) ["mime-type"]=> string(10) "image/jpeg" } } ["image_meta"]=> array(10) { ["aperture"]=> int(0) ["credit"]=> string(0) "" ["camera"]=> string(0) "" ["caption"]=> string(0) "" ["created_timestamp"]=> int(0) ["copyright"]=> string(0) "" ["focal_length"]=> int(0) ["iso"]=> int(0) ["shutter_speed"]=> int(0) ["title"]=> string(0) "" } } array(0) { } string(14) "attribute >>>>" array(5) { ["width"]=> int(492) ["height"]=> int(287) ["file"]=> string(21) "2012/12/WordCloud.jpg" ["sizes"]=> array(2) { ["thumbnail"]=> array(4) { ["file"]=> string(21) "WordCloud-150x150.jpg" ["width"]=> int(150) ["height"]=> int(150) ["mime-type"]=> string(10) "image/jpeg" } ["medium"]=> array(4) { ["file"]=> string(21) "WordCloud-300x175.jpg" ["width"]=> int(300) ["height"]=> int(175) ["mime-type"]=> string(10) "image/jpeg" } } ["image_meta"]=> array(10) { ["aperture"]=> int(0) ["credit"]=> string(0) "" ["camera"]=> string(0) "" ["caption"]=> string(0) "" ["created_timestamp"]=> int(0) ["copyright"]=> string(0) "" ["focal_length"]=> int(0) ["iso"]=> int(0) ["shutter_speed"]=> int(0) ["title"]=> string(0) "" } } array(0) { }
news and informations automotive,business,crime,health,life,politics,science,technology,travelautomotive,business,crime,health,life,politics,science,technology,travel

En el anterior post sobre BYOD estuve hablando sobre las ventajas y los riesgos que esta práctica supone para las empresas. Bring Your Own Device (1/2)  En esta ocasión trataremos la adaptación de las políticas empresariales para la implementación de Bring Your Own Device y cuáles son algunas de las herramientas que pueden ayudar en […]