R3D (2023) Guía de defensa contra la violencia digital

O: Hada de recursos de Seguridad Digital
Derechos Digitales [2013] Como funciona internet.pdf
Article 19 [2020] - How the Internet Really Works - An Illustrated Guide.pdf
Vaza, stalker! Proteção de Mulheres da Vigilância Digital
DIGITAL VIOLENCE, REAL WORLD HARM.pdf
HACER TALLERES: Una guía práctica para capacitadores
COMO FACILITAR GRUPOS EN LINEA
Phishing - Human-Centered Cybersecurity | CSRC | CSRC
¿Cómo documentar de forma empática y segura los casos de violencia de género en Internet?
Una guía práctica basada en la difusión de material íntimo sin consentimiento
Registrando Incidentes de Seguridad Digital como Práctica de Mitigación del Riesgo | Sursiendo
Hagamos doxxing al troll
Zebra Crossing: An easy-to-use digital safety checklist
We've All Been Wrong: Phishing Training Doesn't Work
The overwhelming majority of cyberattacks do occur due to some form of human error: an unwisely clicked link, a weak password, etc.
a team of 10 researchers from the University of Chicago, the University of California San Diego (UCSD), and UCSD Health performed a study of unprecedented scale in the cybersecurity industry. Over an eight month period in 2023, they studied the effects of phishing training on 19,789 personnel at UCSD Health, a large healthcare organization.
The intuitive sense behind the idea makes it extra compelling and may explain why it persists despite rigorous recent evidence to the contrary.
'We just need to make users aware.
the tips did not improve employees' ability to suss out real-life phishing emails. In fact, it actually had an unexpectedly regressive side effect: for having been exposed to the training, employees reported feeling safer online, seeing that their company was investing in cyber protections. Ironically, they ended up more likely to fall for bad emails.
Besides annual phishing courses, they examined four kinds of embedded training:
Static Web pages, developed by Proofpoint, with general tips on how to avoid phishing attacks
Interactive pages, with generalized Q&A exercises also sourced from Proofpoint's library
Static pages customized to the particular phishing email the employee had just fallen for
companies that deploy the most effective training courses available can expect a quarter of their employees to improve around 20%.
Static training demonstrated no benefit whatsoever, in no small part because employees simply weren't engaged.
Ironically, employees who completed multiple static training sessions became 18.5% more likely to fall for a phishing email.
The discouraging data piles on from there. Annual training is presumed to refresh employees' ability to fight bad emails, but the study found no such relationship — employees were approximately as likely to click a bad link one month after their course as they were after more than a year.
convincing phishing emails tricked even the most highly trained, best-performing employees more than 15% of the time, meaning that one well-crafted email can totally negate any benefits of any training at any company with more than a handful of employees.
What Now for Anti-Phishing Efforts?
With training we're saying: 'Hey, you are responsible, you need to learn.
Her study leaves open the possibility that certain, unexplored kinds of training could work, like more expensive, one-on-one in-person coaching.
"We're just saying the current methods aren't working."
Las autoridades fronterizas de EE UU están ordenando tecnologías para buscar datos en celulares
Qué funciones contempla Cellebrite
clasificar imágenes en función de si contienen determinados elementos, como joyas, escritura a mano o documentos.
examinar mensajes de texto directos en aplicaciones como TikTok, y filtrar mensajes que mencionen determinados temas
desvelar fotos "ocultas" por el propietario de un dispositivo
hacer mapas sociales de amigos y contactos
trazar las ubicaciones a las que una persona envió mensajes de texto.
La compañía lanzó en febrero una herramienta que permite a los clientes utilizar IA para resumir registros de chat y audio de teléfonos
"No aprobamos el uso de las soluciones de Cellebrite para acceder a la información personal de periodistas, activistas u otras personas que trabajan en contra de los intereses de regímenes represivos y hacerlo fuera de los límites de una investigación legalmente sancionada viola expresamente los términos de nuestros acuerdos de licencia", reza la página de Cellebrite.
Si una persona se niega a entregar su contraseña, los ciudadanos estadounidenses pueden permanecer bajo custodia temporalmente, pero no se les puede denegar la entrada. Sin embargo, a los no ciudadanos sí se les puede denegar la entrada si se niegan.
De los aproximadamente 47,000 registros de dispositivos que la Patrulla de Aduanas y Fronteras llevó a cabo en 2024, unos 4,200 de ellos fueron registros avanzados.
El Servicio de Aduanas tiene derecho a retener un teléfono durante varios días para llevar a cabo una búsqueda avanzada, pero si la agencia cita "circunstancias atenuantes", podría tener el teléfono durante semanas o meses.
How to Stop Your TV From Watching You | HackerNoon
Wazuh 101: How I Got My SIEM Setup Working in One Afternoon
Caja de herramientas - Beautiful Trouble
This is how you stop data trackers from sucking up your health data
A bit more on Twitter/X’s new encrypted messaging
Cómo protestar de forma segura: Qué llevar, qué hacer y qué evitar
“Localhost tracking” explained. It could cost Meta 32 billion.
CynGo
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection
Aplicaciones de control parental | Datávoros
CAT: Cybersecurity Assessment Tool
Introducing oniux: Kernel-level Tor isolation for any Linux app
5 Open-source Local AI Tools for Image Generation I Found Interesting
Espionaje ilegal en México: Pemex, fiscalías, SEDENA y más han usado software de vigilancia, muestra reporte
RSSHub
OPML Generator online