Recursos Ciberseguridad

https://haveibeenpwned.com/

Uso seguro y responsable de las TIC
Ciberacoso escolar
Privacidad, identidad digital y reputación

Jornada de Ciberseguridad IES Juan de Garay #CIBERJDG TALKS

https://youtu.be/8L0K2XIIZ2Y

http://juandegaray.es/primera-jornada-de-ciberseguridad-ies-juan-de-garay/

Incibe

https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes 

Podemos elegir entre 8 temáticas 

  1. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-mi-ordenador-es-un-zombie 
  2. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-fundamentos-analisis-web 
  3. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-analisis-malware-android 
  4. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-espionaje-cibervigilancia 
  5. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-programacion-segura-web 
  6. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-fundamentos-analisis-sistemas 
  7. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-seguridad-wifi 
  8. https://www.incibe.es/jornadas-incibe-espacios-ciberseguridad/estudiantes/programa-forense-windows 

Enlaces

[Fuente: https://www.gdt.guardiacivil.es/webgdt/enlaces.php ]

Oficina de seguridad del internauta 

http://www.osi.es   

Instituto Nacional de la Ciberseguridad 

http://www.incibe.es/   

Agencia de Protección de Datos 

https://www.agpd.es   

Asociación Española de Usuarios de Internet 

http://www.aui.es   

Asociación de Internautas 

http://www.internautas.org   
   
   

Guia de seguridad de Facebook 

Guia de seguridad   
   

Chaval.es 

http://www.chaval.es   

Tú decides en internet 

http://tudecideseninternet.es/agpd1   
   
   

Pantallas amigas 

http://www.pantallasamigas.net   

Páginas Web de entidades de gestión de derechos de propiedad intelectual e industrial 

BSA – Business Software Alliance 

http://www.bsa.org   

Sociedad General de Autores y Editores 

http://www.sgae.es   

Productores de Música de España 

http://www.promusicae.org   

Asociación Española de Videojuegos (aevi) 

http://www.aevi.org.es   

Entidad de Gestión de Derechos de los Productores Audiovisuales (EGEDA) 

http://www.egeda.es   

Federación para la Protección de la Propiedad Intelectual 

http://www.fap.org.es   

Videos 

Servicio AntiBotnet OSI https://www.youtube.com/watch?v=C-rtCZamKH0 

Si todo estaba perfecto…¿Qué falló? Una entrevista de trabajo es importante para cualquier persona, mas aun para un joven que inicia su carrera laboral.  https://www.youtube.com/watch?v=jtmQQEOHMNk  

¿Por qué me vigilan, si no soy nadie? | Marta Peirano | TEDxMadrid  https://www.youtube.com/watch?v=NPE7i8wuupk  

#PrivacyNow (Español) El riesgo más grande para ti y la privacidad de tu compañía es tu Smartphone. https://www.youtube.com/watch?v=O4Jyf466ipU  

Ciberacoso: Caso Sofia Maroni https://www.youtube.com/watch?v=TqRbo9JzaLY 

Comunicarse bien en Internet – IS4K https://www.youtube.com/watch?v=vahkiJAh2No  

is4k

Línea de ayuda 017

https://www.incibe.es/linea-de-ayuda-en-ciberseguridad

https://www.is4k.es/programas/cibercooperantes 

https://www.is4k.es/programas/dia-de-internet-segura 

https://www.is4k.es/programas/cybercamp-familias 

https://www.is4k.es/programas/cyberolympics 

https://www.is4k.es/programas/stand 

https://www.is4k.es/programas/programa-de-jornadas-escolares 

https://www.is4k.es/convivencia-y-respeto-en-internet 

https://www.is4k.es/blog/detras-de-la-pantalla-siempre-hay-una-persona 

https://www.is4k.es/de-utilidad/recursos/juegos-didacticos-interactivos 

https://www.is4k.es/regalos-y-juguetes-conectados 

https://www.is4k.es/vuelta-al-cole 

https://www.is4k.es/de-utilidad/herramientas 

https://www.is4k.es/de-utilidad/recursos 

https://www.is4k.es/de-utilidad/test 

https://www.is4k.es/kit-para-educadores 

Otras referencias

  1. http://www.eldiario.es/hojaderouter/internet/internet-email-spam-correo_electronico-fraude_0_320918231.html
  2. http://www.genbeta.com/seguridad/el-phishing-como-un-servicio-esta-web-permite-hacerlo-a-cualquiera-sin-conocimientos-tecnicos
  3. https://motherboard.vice.com/read/meet-the-hackers-who-drive-the-porsches-you-paid-for
  4. https://heimdalsecurity.com/blog/most-vulnerable-software-2016/
  5. https://www.bleepingcomputer.com/news/security/chinese-crooks-use-fake-cellular-telephony-towers-to-spread-android-malware/
  6. http://securityaffairs.co/wordpress/57393/malware/malware-microsoft-apple-os.html
  7. https://blog.avast.com/the-malware-business-todays-top-get-rich-quick-scheme-funded-by-you
  8. https://threatpost.com/where-have-all-the-exploit-kits-gone/124241/
  9. https://www.bleepingcomputer.com/news/security/former-major-player-neutrino-exploit-kit-has-gone-dark/
  10. http://securityaffairs.co/wordpress/60054/apt/north-korea-hidden-cobra.html
  11. https://www.hackread.com/osxdok-malware-hits-macs-bypasses-apple-gatekeeper/
  12. http://securityaffairs.co/wordpress/60869/apt/dok-malware-operation-emmental.html
  13. https://www.bleepingcomputer.com/news/security/ransomware-was-the-most-prevalent-malware-payload-delivered-via-email-in-q2-2017/
  14. http://securityaffairs.co/wordpress/64119/apt/oilrig-isminjector-campaign.html
  15. https://www.fwhibbit.es/spectre-y-meltdown
  16. https://doublepulsar.com/important-information-about-microsoft-meltdown-cpu-security-fixes-antivirus-vendors-and-you-a852ba0292ec
  17. http://securityaffairs.co/wordpress/67709/malware/mami-malware-dns-changer.html
  18. https://www.bleepingcomputer.com/news/security/linux-and-windows-servers-targeted-with-rubyminer-malware/
  19. http://securityaffairs.co/wordpress/68022/data-breach/oneplus-security-breach.html
  20. https://www.bleepingcomputer.com/news/security/evrial-trojan-switches-bitcoin-addresses-copied-to-windows-clipboard/
  21. https://threatpost.com/word-based-malware-attack-doesnt-use-macros/129969/
  22. https://www.bleepingcomputer.com/news/security/multi-stage-word-attack-infects-users-without-using-macros/
  23. https://www.bleepingcomputer.com/news/security/destructive-malware-wreaks-havoc-at-pyeongchang-2018-winter-olympics/
  24. https://threatpost.com/olympic-destroyer-malware-behind-winter-olympics-cyberattack-researchers-say/129918/
  25. https://www.bleepingcomputer.com/news/security/virus-knocks-out-cash-registers-at-tim-hortons-franchisees/
  26. http://securityaffairs.co/wordpress/69762/hacking/github-largest-ddos-attack.html
  27. https://threatpost.com/word-based-malware-attack-doesnt-use-macros/129969/
  28. https://www.bleepingcomputer.com/news/security/amd-investigating-ryzenfall-masterkey-fallout-and-chimera-cpu-vulnerabilities/
  29. https://motherboard.vice.com/en_us/article/kzpm5x/amd-secure-processor-ryzen-epyc-vulnerabilities-and-backdoors
  30. https://threatpost.com/amd-investigating-reports-of-13-critical-vulnerabilities-found-in-ryzen-epyc-chips/130404/
  31. https://www.amdflaws.com/
  32. http://securityaffairs.co/wordpress/70214/hacking/samba-critical-vulnerabilities.html
  33. https://www.bleepingcomputer.com/news/microsoft/microsoft-march-patch-tuesday-fixes-74-security-issues/
  34. http://securityaffairs.co/wordpress/70224/hacking/credssp-flaw.html
  35. https://threatpost.com/microsoft-patches-15-critical-bugs-in-march-patch-tuesday-update/130424/
  36. http://securityaffairs.co/wordpress/70231/hacking/amd-vulnerabilities.html
  37. https://www.bleepingcomputer.com/news/security/heres-a-list-of-29-different-types-of-usb-attacks/
  38. http://securityaffairs.co/wordpress/70129/apt/sofacy-apt-operations.html
  39. http://securityaffairs.co/wordpress/70140/hacking/apt15-uk-gov-contractor.html
  40. https://securelist.com/apt-slingshot/84312/
  41. http://www.zdnet.com/article/hacking-operation-uses-malicious-word-documents-to-target-aid-organisations/
  42. https://securelist.com/masha-and-these-bears/84311/
  43. https://threatpost.com/gandcrab-ransomware-crooks-take-agile-development-approach/130490/
  44. https://www.bleepingcomputer.com/news/security/400k-malware-outbreak-caused-by-backdoored-russian-torrenting-client/
  45. https://securityaffairs.co/wordpress/71351/cyber-crime/gatsoev-hacking.html
  46. https://www.bleepingcomputer.com/news/security/microsoft-sees-24-percent-rise-in-tech-support-scam-complaints/
  47. https://securityaffairs.co/wordpress/71837/malware/necurs-evasion-technique.html
  48. https://www.bleepingcomputer.com/news/microsoft/poc-code-published-for-triggering-an-instant-bsod-on-all-recent-windows-versions/
  49. https://hotforsecurity.bitdefender.com/blog/reports-of-tech-support-scams-rocket-earning-handsome-returns-for-fraudsters-19816.html
  50. https://threatpost.com/rubella-crimeware-kit-cheap-easy-and-gaining-traction/131474/
  51. https://www.bleepingcomputer.com/news/security/ddos-attacks-go-down-60-percent-across-europe-following-webstressers-takedown/
  52. https://threatpost.com/boutique-shops-offering-rewards-points-pop-up-on-the-dark-web/131636/
  53. https://www.bleepingcomputer.com/news/security/chinese-cyberspies-appear-to-be-preparing-supply-chain-attacks/
  54. https://www.bleepingcomputer.com/news/security/chinese-cyberspies-appear-to-be-preparing-supply-chain-attacks/
  55. https://securityaffairs.co/wordpress/72072/apt/fancy-bear-abuses-lojack.html
  56. https://securityaffairs.co/wordpress/72208/apt/analyzing-winnti-umbrella.html
  57. https://www.bleepingcomputer.com/news/security/poc-developed-for-coinhive-mining-in-excel-using-custom-javascript-functions/
  58. https://securityaffairs.co/wordpress/72330/hacking/cve-2018-8174-analysis.html
  59. https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/
  60. https://www.bleepingcomputer.com/news/security/users-warned-of-critical-email-encryption-security-flaw/
  61. https://securelist.com/synack-targeted-ransomware-uses-the-doppelganging-technique/85431/
  62. https://www.bleepingcomputer.com/news/security/phishing-roundup-caracal-stealth-mango-tangelo-apple-dhl-efax-and-more/
  63. https://www.bleepingcomputer.com/news/security/hackers-find-new-method-of-installing-backdoored-plugins-on-wordpress-sites/
  64. https://threatpost.com/bypass-glitch-allows-malware-to-masquerade-as-legit-apple-files/132758/
  65. https://securityaffairs.co/wordpress/73498/apt/emissary-panda-campaign.html
  66. https://securityaffairs.co/wordpress/73505/hacking/exploit-kits-evolution.html
  67. https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ
  68. http://blog.segu-info.com.ar/2015/11/los-8-mayores-ciberataques-de-los.html
  69. http://www.welivesecurity.com/la-es/2017/01/17/falsos-aniversarios-nuevo-senuelo/
  70. https://www.securityartwork.es/2017/01/26/libro-recomendado-pequeno-libro-rojo-del-activista-la-red/
  71. http://blog.segu-info.com.ar/2017/03/dark-matter-programa-de-la-cia-para.html
  72. https://www.wired.com/2017/03/russian-hacker-spy-botnet/
  73. http://blog.segu-info.com.ar/2017/04/listas-de-hacking-y-de-todo.html
  74. https://www.welivesecurity.com/la-es/2017/06/08/viajes-gratis-suscripciones-enganosas-iberia/
  75. https://nakedsecurity.sophos.com/2017/06/14/infection-by-mouseover-what-you-need-to-know-about-powerpoint-spam/
  76. http://www.seguridadapple.com/2017/07/osxdok-un-nuevo-malware-portado-de.html
  77. http://www.hacking4badpentesters.com/2018/01/papersinfopocs-meltdown-spectre.html
  78. https://blog.segu-info.com.ar/2018/01/apple-actualiza-contra-meltdown-y.html
  79. http://unaaldia.hispasec.com/2018/01/mami-el-nuevo-spyware-para-macos.html
  80. http://unaaldia.hispasec.com/2018/02/evolucion-de-los-ataques-que-usan.html
  81. http://blog.talosintelligence.com/2018/02/olympic-destroyer.html
  82. http://unaaldia.hispasec.com/2018/02/evolucion-de-los-ataques-que-usan.html
  83. http://www.seguridadapple.com/2018/03/conoce-coldroot-un-troyano-de-mac-que.html
  84. https://thehackernews.com/2018/03/credssp-rdp-exploit.html
  85. https://krebsonsecurity.com/2018/03/flash-windows-users-its-time-to-patch/
  86. http://www.seguridadapple.com/2018/03/el-malware-en-mac-sigue-aumentando.html
  87. https://thehackernews.com/2018/03/windows-malware-hacking.html
  88. https://www.securityartwork.es/2018/03/22/deteccion-de-explotacion-del-editor-de-ecuaciones-de-office/
  89. https://blog.segu-info.com.ar/2018/04/crecen-los-ataques-documentos-word-sin.html
  90. http://unaaldia.hispasec.com/2018/04/fallo-en-outlook-permite-usar-ficheros.html
  91. https://blog.segu-info.com.ar/2018/04/crecen-los-ataques-documentos-word-sin.html
  92. https://krebsonsecurity.com/2018/04/deleted-facebook-cybercrime-groups-had-300000-members/
  93. https://blog.segu-info.com.ar/2018/04/double-kill-vulnerabilidad-zero-day.html
  94. https://www.welivesecurity.com/la-es/2018/04/09/las-estafas-a-traves-de-whatsapp-mas-populares-de-los-ultimos-anos/
  95. https://thehackernews.com/2018/05/javascript-function-excel.html
  96. https://thehackernews.com/2018/05/microsoft-safelinks-phishing.html
  97. https://unaaldia.hispasec.com/2018/05/detectado-backdoor-en-el-modulo-python.html
  98. https://unaaldia.hispasec.com/2018/06/esto-es-codigo-firmado-por-apple-o-no.html
  99. https://www.fireeye.com/blog/threat-research/2018/05/deep-dive-into-rig-exploit-kit-delivering-grobios-trojan.html
  100. https://thehackernews.com/2018/05/signal-messenger-vulnerability.html
  101. https://unaaldia.hispasec.com/2018/05/millones-de-routers-fibra-gpon-nuevos.html
  102. https://arstechnica.com/information-technology/2018/05/malicious-chrome-extensions-infect-more-than-100000-users-again/
  103. https://www.welivesecurity.com/2018/05/24/losses-bec-scams-rising-fast-furious/
  104. https://threatpost.com/fbi-cyber-fraud-losses-rise-to-reach-1-4b/131783/

Camaras IP

  1. https://www.pabloyglesias.com/shodan-camaras-ip/ 
  2. https://www.shodan.io/search?query=+%22Anonymous+access+allowed%22 
  3. https://www.shodan.io/search?query=port%3A554+has_screenshot%3Atrue+country%3Aes&language=en 
  4. https://www.shodan.io/search?query=port%3A554+has_screenshot%3Atrue 
  5. https://www.youtube.com/watch?feature=player_embedded&v=5cWck_xcH64 
  6. https://cnnespanol.cnn.com/2013/04/08/shodan-el-buscador-mas-terrorifico-de-internet/ 
  7. https://www.nytimes.com/2012/01/23/technology/flaws-in-videoconferencing-systems-put-boardrooms-at-risk.html?pagewanted=all&_r=2& 
  8. https://noticiasseguridad.com/tutoriales/shodan-se-vuelve-mas-simple-con-el-uso-de-shodansploit/ 
  9. https://conference.hitb.org/hitbsecconf2013ams/materials/D2T2%20-%20Dan%20Tentler%20-%20The%20Shodan%20Computer%20Search%20Engine.pdf 
  10. https://arstechnica.com/information-technology/2016/01/how-to-search-the-internet-of-things-for-photos-of-sleeping-babies/