Information Security in the new era (Hacktivism (Types (Web Sit-ins,…
Security in the new era
Is the legal or illegal use of digital tools for political and protest purposes.
Breaks websites securities to spread their messages
Bombardment of e-mail
Destruction of web pages
Is a form of malicious software (MALWARE)
How does it work?
It takes over the computer
Blocks access and encrypts device information
For the rescue, ask for a payment in Bitcoins
How to avoid?
Avoid browsing unsafe pages or with unverified content.
Don't open emails or files with unknown senders
Have a good antivirus installed
Keep our operating system updated
AI-Powered Automated Hacking
Use of artificial intelligence for criminal purposes
Drones and autonomous vehicles could be hacked using AI and turned into weapons
Traditional cybersecurity methods won’t know how to cope with new attacks carried out by smart machines.
They are DDoS attacks aimed at IoT devices
How to protect yourself?
Adopt a vulnerability disclosure policy (Technical Drivers)
Make secure software updates available for an explicitly
stated length of time.
Eliminate non-unique default passwords
Take advantage of vulnerabilities in Supply Chain Devices
It makes authentication much faster, easier and more secure
The data stored in a biometric database may be more vulnerable than any other kind of data
Any collection of data could eventually get hacked
Some pieces of your physical identity can be duplicated