Recursos Ciberseguridad
Uso seguro y responsable de las TIC Ciberacoso escolar Privacidad, identidad digital y reputación
Jornada de Ciberseguridad IES Juan de Garay #CIBERJDG TALKS
http://juandegaray.es/primera-jornada-de-ciberseguridad-ies-juan-de-garay/
Incibe
https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes
Podemos elegir entre 8 temáticas
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-mi-ordenador-es-un-zombie
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-fundamentos-analisis-web
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-analisis-malware-android
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-espionaje-cibervigilancia
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-programacion-segura-web
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-fundamentos-analisis-sistemas
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-seguridad-wifi
- https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-forense-windows
Enlaces
[Fuente: https://www.gdt.guardiacivil.es/webgdt/enlaces.php ]
Oficina de seguridad del internauta
http://www.osi.es |
Instituto Nacional de la Ciberseguridad
http://www.incibe.es/ |
Agencia de Protección de Datos
https://www.agpd.es |
Asociación Española de Usuarios de Internet
http://www.aui.es |
Asociación de Internautas
http://www.internautas.org |
Guia de seguridad de Facebook
Guia de seguridad |
Chaval.es
http://www.chaval.es |
Tú decides en internet
http://tudecideseninternet.es/agpd1 |
Pantallas amigas
http://www.pantallasamigas.net |
Páginas Web de entidades de gestión de derechos de propiedad intelectual e industrial
BSA – Business Software Alliance
http://www.bsa.org |
Sociedad General de Autores y Editores
http://www.sgae.es |
Productores de Música de España
http://www.promusicae.org |
Asociación Española de Videojuegos (aevi)
http://www.aevi.org.es |
Entidad de Gestión de Derechos de los Productores Audiovisuales (EGEDA)
http://www.egeda.es |
Federación para la Protección de la Propiedad Intelectual
http://www.fap.org.es |
Videos
Servicio AntiBotnet OSI https://www.youtube.com/watch?v=C-rtCZamKH0
Si todo estaba perfecto…¿Qué falló? Una entrevista de trabajo es importante para cualquier persona, mas aun para un joven que inicia su carrera laboral. https://www.youtube.com/watch?v=jtmQQEOHMNk
¿Por qué me vigilan, si no soy nadie? | Marta Peirano | TEDxMadrid https://www.youtube.com/watch?v=NPE7i8wuupk
#PrivacyNow (Español) El riesgo más grande para ti y la privacidad de tu compañía es tu Smartphone. https://www.youtube.com/watch?v=O4Jyf466ipU
Ciberacoso: Caso Sofia Maroni https://www.youtube.com/watch?v=TqRbo9JzaLY
Comunicarse bien en Internet – IS4K https://www.youtube.com/watch?v=vahkiJAh2No
is4k
Línea de ayuda 017
https://www.incibe.es/linea-de-ayuda-en-ciberseguridad
https://www.is4k.es/programas/cibercooperantes
https://www.is4k.es/programas/dia-de-internet-segura
https://www.is4k.es/programas/cybercamp-familias
https://www.is4k.es/programas/cyberolympics
https://www.is4k.es/programas/stand
https://www.is4k.es/programas/programa-de-jornadas-escolares
https://www.is4k.es/convivencia-y-respeto-en-internet
https://www.is4k.es/blog/detras-de-la-pantalla-siempre-hay-una-persona
https://www.is4k.es/de-utilidad/recursos/juegos-didacticos-interactivos
https://www.is4k.es/regalos-y-juguetes-conectados
https://www.is4k.es/vuelta-al-cole
https://www.is4k.es/de-utilidad/herramientas
https://www.is4k.es/de-utilidad/recursos
https://www.is4k.es/de-utilidad/test
https://www.is4k.es/kit-para-educadores
Otras referencias
- http://www.eldiario.es/hojaderouter/internet/internet-email-spam-correo_electronico-fraude_0_320918231.html
- http://www.genbeta.com/seguridad/el-phishing-como-un-servicio-esta-web-permite-hacerlo-a-cualquiera-sin-conocimientos-tecnicos
- https://motherboard.vice.com/read/meet-the-hackers-who-drive-the-porsches-you-paid-for
- https://heimdalsecurity.com/blog/most-vulnerable-software-2016/
- https://www.bleepingcomputer.com/news/security/chinese-crooks-use-fake-cellular-telephony-towers-to-spread-android-malware/
- http://securityaffairs.co/wordpress/57393/malware/malware-microsoft-apple-os.html
- https://blog.avast.com/the-malware-business-todays-top-get-rich-quick-scheme-funded-by-you
- https://threatpost.com/where-have-all-the-exploit-kits-gone/124241/
- https://www.bleepingcomputer.com/news/security/former-major-player-neutrino-exploit-kit-has-gone-dark/
- http://securityaffairs.co/wordpress/60054/apt/north-korea-hidden-cobra.html
- https://www.hackread.com/osxdok-malware-hits-macs-bypasses-apple-gatekeeper/
- http://securityaffairs.co/wordpress/60869/apt/dok-malware-operation-emmental.html
- https://www.bleepingcomputer.com/news/security/ransomware-was-the-most-prevalent-malware-payload-delivered-via-email-in-q2-2017/
- http://securityaffairs.co/wordpress/64119/apt/oilrig-isminjector-campaign.html
- https://www.fwhibbit.es/spectre-y-meltdown
- https://doublepulsar.com/important-information-about-microsoft-meltdown-cpu-security-fixes-antivirus-vendors-and-you-a852ba0292ec
- http://securityaffairs.co/wordpress/67709/malware/mami-malware-dns-changer.html
- https://www.bleepingcomputer.com/news/security/linux-and-windows-servers-targeted-with-rubyminer-malware/
- http://securityaffairs.co/wordpress/68022/data-breach/oneplus-security-breach.html
- https://www.bleepingcomputer.com/news/security/evrial-trojan-switches-bitcoin-addresses-copied-to-windows-clipboard/
- https://threatpost.com/word-based-malware-attack-doesnt-use-macros/129969/
- https://www.bleepingcomputer.com/news/security/multi-stage-word-attack-infects-users-without-using-macros/
- https://www.bleepingcomputer.com/news/security/destructive-malware-wreaks-havoc-at-pyeongchang-2018-winter-olympics/
- https://threatpost.com/olympic-destroyer-malware-behind-winter-olympics-cyberattack-researchers-say/129918/
- https://www.bleepingcomputer.com/news/security/virus-knocks-out-cash-registers-at-tim-hortons-franchisees/
- http://securityaffairs.co/wordpress/69762/hacking/github-largest-ddos-attack.html
- https://threatpost.com/word-based-malware-attack-doesnt-use-macros/129969/
- https://www.bleepingcomputer.com/news/security/amd-investigating-ryzenfall-masterkey-fallout-and-chimera-cpu-vulnerabilities/
- https://motherboard.vice.com/en_us/article/kzpm5x/amd-secure-processor-ryzen-epyc-vulnerabilities-and-backdoors
- https://threatpost.com/amd-investigating-reports-of-13-critical-vulnerabilities-found-in-ryzen-epyc-chips/130404/
- https://www.amdflaws.com/
- http://securityaffairs.co/wordpress/70214/hacking/samba-critical-vulnerabilities.html
- https://www.bleepingcomputer.com/news/microsoft/microsoft-march-patch-tuesday-fixes-74-security-issues/
- http://securityaffairs.co/wordpress/70224/hacking/credssp-flaw.html
- https://threatpost.com/microsoft-patches-15-critical-bugs-in-march-patch-tuesday-update/130424/
- http://securityaffairs.co/wordpress/70231/hacking/amd-vulnerabilities.html
- https://www.bleepingcomputer.com/news/security/heres-a-list-of-29-different-types-of-usb-attacks/
- http://securityaffairs.co/wordpress/70129/apt/sofacy-apt-operations.html
- http://securityaffairs.co/wordpress/70140/hacking/apt15-uk-gov-contractor.html
- https://securelist.com/apt-slingshot/84312/
- http://www.zdnet.com/article/hacking-operation-uses-malicious-word-documents-to-target-aid-organisations/
- https://securelist.com/masha-and-these-bears/84311/
- https://threatpost.com/gandcrab-ransomware-crooks-take-agile-development-approach/130490/
- https://www.bleepingcomputer.com/news/security/400k-malware-outbreak-caused-by-backdoored-russian-torrenting-client/
- https://securityaffairs.co/wordpress/71351/cyber-crime/gatsoev-hacking.html
- https://www.bleepingcomputer.com/news/security/microsoft-sees-24-percent-rise-in-tech-support-scam-complaints/
- https://securityaffairs.co/wordpress/71837/malware/necurs-evasion-technique.html
- https://www.bleepingcomputer.com/news/microsoft/poc-code-published-for-triggering-an-instant-bsod-on-all-recent-windows-versions/
- https://hotforsecurity.bitdefender.com/blog/reports-of-tech-support-scams-rocket-earning-handsome-returns-for-fraudsters-19816.html
- https://threatpost.com/rubella-crimeware-kit-cheap-easy-and-gaining-traction/131474/
- https://www.bleepingcomputer.com/news/security/ddos-attacks-go-down-60-percent-across-europe-following-webstressers-takedown/
- https://threatpost.com/boutique-shops-offering-rewards-points-pop-up-on-the-dark-web/131636/
- https://www.bleepingcomputer.com/news/security/chinese-cyberspies-appear-to-be-preparing-supply-chain-attacks/
- https://www.bleepingcomputer.com/news/security/chinese-cyberspies-appear-to-be-preparing-supply-chain-attacks/
- https://securityaffairs.co/wordpress/72072/apt/fancy-bear-abuses-lojack.html
- https://securityaffairs.co/wordpress/72208/apt/analyzing-winnti-umbrella.html
- https://www.bleepingcomputer.com/news/security/poc-developed-for-coinhive-mining-in-excel-using-custom-javascript-functions/
- https://securityaffairs.co/wordpress/72330/hacking/cve-2018-8174-analysis.html
- https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/
- https://www.bleepingcomputer.com/news/security/users-warned-of-critical-email-encryption-security-flaw/
- https://securelist.com/synack-targeted-ransomware-uses-the-doppelganging-technique/85431/
- https://www.bleepingcomputer.com/news/security/phishing-roundup-caracal-stealth-mango-tangelo-apple-dhl-efax-and-more/
- https://www.bleepingcomputer.com/news/security/hackers-find-new-method-of-installing-backdoored-plugins-on-wordpress-sites/
- https://threatpost.com/bypass-glitch-allows-malware-to-masquerade-as-legit-apple-files/132758/
- https://securityaffairs.co/wordpress/73498/apt/emissary-panda-campaign.html
- https://securityaffairs.co/wordpress/73505/hacking/exploit-kits-evolution.html
- https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ
- http://blog.segu-info.com.ar/2015/11/los-8-mayores-ciberataques-de-los.html
- http://www.welivesecurity.com/la-es/2017/01/17/falsos-aniversarios-nuevo-senuelo/
- https://www.securityartwork.es/2017/01/26/libro-recomendado-pequeno-libro-rojo-del-activista-la-red/
- http://blog.segu-info.com.ar/2017/03/dark-matter-programa-de-la-cia-para.html
- https://www.wired.com/2017/03/russian-hacker-spy-botnet/
- http://blog.segu-info.com.ar/2017/04/listas-de-hacking-y-de-todo.html
- https://www.welivesecurity.com/la-es/2017/06/08/viajes-gratis-suscripciones-enganosas-iberia/
- https://nakedsecurity.sophos.com/2017/06/14/infection-by-mouseover-what-you-need-to-know-about-powerpoint-spam/
- http://www.seguridadapple.com/2017/07/osxdok-un-nuevo-malware-portado-de.html
- http://www.hacking4badpentesters.com/2018/01/papersinfopocs-meltdown-spectre.html
- https://blog.segu-info.com.ar/2018/01/apple-actualiza-contra-meltdown-y.html
- http://unaaldia.hispasec.com/2018/01/mami-el-nuevo-spyware-para-macos.html
- http://unaaldia.hispasec.com/2018/02/evolucion-de-los-ataques-que-usan.html
- http://blog.talosintelligence.com/2018/02/olympic-destroyer.html
- http://unaaldia.hispasec.com/2018/02/evolucion-de-los-ataques-que-usan.html
- http://www.seguridadapple.com/2018/03/conoce-coldroot-un-troyano-de-mac-que.html
- https://thehackernews.com/2018/03/credssp-rdp-exploit.html
- https://krebsonsecurity.com/2018/03/flash-windows-users-its-time-to-patch/
- http://www.seguridadapple.com/2018/03/el-malware-en-mac-sigue-aumentando.html
- https://thehackernews.com/2018/03/windows-malware-hacking.html
- https://www.securityartwork.es/2018/03/22/deteccion-de-explotacion-del-editor-de-ecuaciones-de-office/
- https://blog.segu-info.com.ar/2018/04/crecen-los-ataques-documentos-word-sin.html
- http://unaaldia.hispasec.com/2018/04/fallo-en-outlook-permite-usar-ficheros.html
- https://blog.segu-info.com.ar/2018/04/crecen-los-ataques-documentos-word-sin.html
- https://krebsonsecurity.com/2018/04/deleted-facebook-cybercrime-groups-had-300000-members/
- https://blog.segu-info.com.ar/2018/04/double-kill-vulnerabilidad-zero-day.html
- https://www.welivesecurity.com/la-es/2018/04/09/las-estafas-a-traves-de-whatsapp-mas-populares-de-los-ultimos-anos/
- https://thehackernews.com/2018/05/javascript-function-excel.html
- https://thehackernews.com/2018/05/microsoft-safelinks-phishing.html
- https://unaaldia.hispasec.com/2018/05/detectado-backdoor-en-el-modulo-python.html
- https://unaaldia.hispasec.com/2018/06/esto-es-codigo-firmado-por-apple-o-no.html
- https://www.fireeye.com/blog/threat-research/2018/05/deep-dive-into-rig-exploit-kit-delivering-grobios-trojan.html
- https://thehackernews.com/2018/05/signal-messenger-vulnerability.html
- https://unaaldia.hispasec.com/2018/05/millones-de-routers-fibra-gpon-nuevos.html
- https://arstechnica.com/information-technology/2018/05/malicious-chrome-extensions-infect-more-than-100000-users-again/
- https://www.welivesecurity.com/2018/05/24/losses-bec-scams-rising-fast-furious/
- https://threatpost.com/fbi-cyber-fraud-losses-rise-to-reach-1-4b/131783/
Camaras IP
- https://www.pabloyglesias.com/shodan-camaras-ip/
- https://www.shodan.io/search?query=+%22Anonymous+access+allowed%22
- https://www.shodan.io/search?query=port%3A554+has_screenshot%3Atrue+country%3Aes&language=en
- https://www.shodan.io/search?query=port%3A554+has_screenshot%3Atrue
- https://www.youtube.com/watch?feature=player_embedded&v=5cWck_xcH64
- https://cnnespanol.cnn.com/2013/04/08/shodan-el-buscador-mas-terrorifico-de-internet/
- https://www.nytimes.com/2012/01/23/technology/flaws-in-videoconferencing-systems-put-boardrooms-at-risk.html?pagewanted=all&_r=2&
- https://noticiasseguridad.com/tutoriales/shodan-se-vuelve-mas-simple-con-el-uso-de-shodansploit/
- https://conference.hitb.org/hitbsecconf2013ams/materials/D2T2%20-%20Dan%20Tentler%20-%20The%20Shodan%20Computer%20Search%20Engine.pdf
- https://arstechnica.com/information-technology/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/