Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.
anyone who claims to be
at least 13 years old
worldwide to become a
registered user of the
website.After registering
to us...
P Á G I N A 2
Windows 10 in
your computer
screen.
Mobile Threat Monday: Fake AdBlock
App Infiltrates Google Play
How to Ge...
What Are Hackers Thinking?
P Á G I N A 3V O L U M E N 3 , N º 1
ter a specially generated six-
digit PIN generated by the ...
dar in the grille and a monocu-
lar video camera in the winds-
hield sense pedestrians in
front and alongside the road.
In...
Próxima SlideShare
Cargando en…5
×

La pecera 3

2.136 visualizaciones

Publicado el

  • Inicia sesión para ver los comentarios

  • Sé el primero en recomendar esto

La pecera 3

  1. 1. anyone who claims to be at least 13 years old worldwide to become a registered user of the website.After registering to use the site, users may create a personal profile, add other users as friends, exchange messages, post status updates and photos, share videos and receive notifications when others update their profiles. Fa- cebook had over 1.3 bi- llion active users as of June 2014. Mark Zuckerberg is an American computer program- mer and Internet en- trepreneur.He is known as one of five co-founders of the social networ- king website Faceboo k. His personal wealth, is estimated to be $33.1 billion.Together with his college room- mates and fe- llow Harvard Universi- ty students Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes, Zuckerberg launched Facebook from Harvard's dormi- tory rooms. In 2007, at the age of 23, Zucker- berg became a billionaire as a result of Facebook's success. Facebook now allows keep functioning, but stop getting signature upda- tes. And you may find that the antivirus just stops working. Mark Zuckerberg in a coference Mark Zuckerberg C O N T E N I D O : How to Get and Install Windows 10 2 Mobile Threat Mon- day: Fake AdBlock App Infiltrates Goo- gle Play 2 What Are Hackers Thinking? 3 Criminals Use Tyup- kin Malware to Emp- ty ATMs of Cash 3 Ford and Honda Stop Collisions Before They Happen With Pedestrian Detection 4 Is Your Antivirus Running? I . E . S . P A R Q U E D E L I S B O A LA PECERA F E B R E R O 2 0 1 5V O L U M E N 3 , N º 1 PUNTOS DE INTERÉS ESPECIAL:  Todos los días usas Facebook, pero. ¿sabes quién lo creó?  Jose Luís Belmonte, (profesor de ma- temáticas en el IES Parque de Lisboa) nos habla sobre Geogebra. Don't be so sure. Most pre-loaded antivirus pro- ducts require renewal in three or six months. If you don't renew, the pro- duct expires, and your protection takes a nose- dive. Just what happens when your antivirus expires va- ries by product. Vendors who offer a free product may smoothly downgrade your protection to the free edition; that's the best- case scenario. Others may
  2. 2. P Á G I N A 2 Windows 10 in your computer screen. Mobile Threat Monday: Fake AdBlock App Infiltrates Google Play How to Get and Install Windows 10 Installing Windows 10 Technical Preview Getting and installing the new OS was sur- prisingly simple, it took less than 20 minutes. Ready? Lets begin! 1. Choose a PC you don't need for every- day use. Windows 10 Technical Preview is a very preliminary build, so you should not ins- tall it on a PC you ne- ed to use regularly. On that note, don't expect privacy on the test Windows 10 PC: Mi- crosoft will examine system files in trying to rectify the problem co- de. Back up any files on the test PC that you may need. The OS doesn't require a touch screen, though it does support them, albeit Microsoft claims touch support is unpolished. Also note that you may not be able to revert to an earlier version of Windows after this installation. 2. Check the specs for your test PC. If you're running Windows 8.1, there should be no pro- blem. You can test for compatibility by downloa- ding and running theWindows 8.1 Upgrade Assistant. In general, requirements aren't at all arduous. Trojan Virus L A P E C E R A When the app first appeared on Google Play, it was called "AdBlock Free Kas- persky Edition," apparently trying to get a boost by using the trusted antivirus na- me.. The fake AdBlock app was a typical Android Trojan. Malwarebytes reports that in addition to the basic AdBlock capabilities, the fake app included numerous advertising libraries. Researchers noted that while AdBlock is meant to block ads, this app included banners and pop-up ads.
  3. 3. What Are Hackers Thinking? P Á G I N A 3V O L U M E N 3 , N º 1 ter a specially generated six- digit PIN generated by the mal- ware in order to withdraw money. They can take up to 40 bills at a time without having to swipe an ATM card or enter any account information. A unique six-digit combination key based on random numbers is freshly generated for every session. This ensures that no person outside the gang could accidentally profit from the fraud. Then the malicious op- erator receives instructions by phone from another member of the gang who knows the algo- rithm and is able to gen- erate a session key based on the number shown. Interestingly, if the wrong key is entered, the malware disables the entire network. Kaspersky researchers were not sure why the network was disabled. It could be a way to delay remote investigators from analyzing the malware. Cyber-criminals have infected ATMs in Russia, Europe, United States, India, and China with malware to empty cash stored in the machines. With a default master key, and use a bootable CD to infect the machine with the Tyupkin mal- ware. The malware is designed to accept commands in the middle of the night Sundays and Mondays, and quiet the rest of the week, making it diffi- cult to detect. Once the malware is loaded onto the ATM, attackers can see how much money is still in the cassettes in the machine. The attacker has to be physi- cally in front of the ATM to en- Criminals Use Tyupkin Malware to Empty ATMs of Cash Apparently, money isn't always the ans- wer. Only 18 percent of the hackers sur- veyed claimed that financial gain was a direct motivation while over half said that they were simply bored and searching for thrills. Despite the advancement of cyber- attacks, over 99 percent of the hackers confirmed that simple hacking tactics like phishing are still effective. Are hackers afraid of getting hacked? They are, and very much so indeed. Eighty-eight percent of the respondents think their own personal information is at risk. If hackers are concerned about their own data, then companies, businesses, and normal folks should be even more concerned. It's a good idea to start using a password manager, to generate and store hard-to- crack passwords. Companies in particu- lar should enforce strict access to privile- ged accounts and frequently change sys- tem level passwords.
  4. 4. dar in the grille and a monocu- lar video camera in the winds- hield sense pedestrians in front and alongside the road. In the case of roadside pedes- trians too close for comfort, The Ford system is called Pre- Collision Assist with Pedestrian Detection. It combines radar and optical (camera) technology. As with most other systems, the same sensors also warn of rapidly decreasing distance from the car in front, then brake to avoid a crash, or reduce the force. Honda says it’s bringing out a system a system to deal safely with pedestrians and close- ahead vehicles, under the term Honda Sensing. The safety component is called Pedestrian Collision Mitigation Steering System. A millimeter wave ra- the car will veer away from the pedestrian, apparently after ma- king sure there’s no oncoming car.  Calle de la Paz, 6, 28924 Alcorcón, Madrid Teléfono: 91611 8712 Correo: ParqueLisboa@gmail.com Honda´s Pedestrian System Lapecera.com Ford and Honda Stop Collisions Before They Happen With Pedestrian Detection Hecho y producido por: Guillermo López y Pablo Íscar

×