background preloader

HoneyMap

You are looking at the HoneyMap, a real-time world map which visualizes attacks captured by honeypots of the Honeynet Project. Red markers on the map represent attackers, yellow markers are targets (honeypot sensors). This project is highly experimental and should be considered a BETA version. So far, current Chrome and Firefox browsers should work fine. Opera, Safari and Internet Explorer probably wont work completely. If you identify bugs or have feature requests, please let us know.

http://map.honeynet.org/

Related:  securityMapas para Monitoreo / InformacionSecurity

About The Honeynet Project The Honeynet Project is a leading international 501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security. With Chapters around the world, our volunteers have contributed to fight against malware (such as Confickr), discovering new attacks and creating security tools used by businesses and government agencies all over the world. The organization continues to be on the cutting edge of security research by working to analyze the latest attacks and educating the public about threats to information systems across the world.

Localizacion instalaciones amenaza nuclear Hide The nuclear, chemical, biological, and missile facilities depicted in this map correspond to content found in the NTI country profiles. Please see this content for further information and sources. New technique could boost internet speeds tenfold Researchers at Aalborg University, MIT and Caltech have developed a new mathematically-based technique that can boost internet data speeds by up to 10 times, by making the nodes of a network much smarter and more adaptable. The advance also vastly improves the security of data transmissions, and could find its way into 5G mobile networks, satellite communications and the Internet of Things. View all The problem with TCP/IP Data is sent over the internet in "packets," or small chunks of digital information. The exact format of the packets and the procedure for delivering them to their destination is described by a suite of protocols known as TCP/IP, or the internet protocol suite, designed in the early 70s.

Phil Zimmermann's Silent Circle Builds A Secure, Seductive Fortress Around Your Smartphone In the 1990s, cryptography pioneer and Pretty Good Privacy (PGP) creator Phil Zimmermann faced federal criminal investigation. His encryption software was so strong, it was charged, there was fear it violated arms trafficking export controls. Now Zimmermann has launched a new startup that provides industrial strength encryption for smartphone users.

Estadísticas mundiales en tiempo real POODWADDLE WORLD CLOCKThe World Stats Counter (V 7.0) This minute 250 babies will be born, 100 people will die, 20 violent crimes will be reported, and the US debt will climb $1 million. The World Clock tells more than time. It shows a live picture of our changing world. The World Clock is too large for a single page. Russia Stunned After NY Times Makes $1 Million Off Fake Hacking Story World's Largest English Language News Service with Over 500 Articles Updated Daily "The News You Need Today…For The World You’ll Live In Tomorrow." What You Aren’t Being Told About The World You Live In

Who really sets global cybersecurity standards? Herding wild cats may be easier than settling issues or making over-arching decisions that affect international cybersecurity. This week in a report that was critical about how the US will face global cybersecurity events, the Government Accountability Office identified 19 global organizations" whose international activities significantly influence the security and governance of cyberspace." What would your ultimate network security look like? The organizations range from information-sharing forums that are non-decision-making gatherings of experts to private organizations to treaty-based, decision-making bodies founded by countries. The groups address a variety of topics from incident response, the development of technical standards, the facilitation of criminal investigations to the creation of international policies related to information technology and critical infrastructure, the GAO stated. So who are they?

Why passwords have never been weaker—and crackers have never been stronger In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. The warnings Brooks and millions of other people received that December weren't fabrications. Mapa Mundial de Fotos - imagenes - Colombia home Jump to or earth album - Colombia earth album is a simpler, slicker Flickr mash-up that allows armchair tourists to explore some of the most stunning photos in the world courtesy of Google maps and Flickr. To begin your journey, just click anywhere on the map, e.g. "India".

FBI Says Cybercriminals Keep Getting Away, Need Unprecedented Authority - GovernmentSecrets.com By Jonah Bennett, DCNF The Federal Bureau of Investigation (FBI) wants expanded authority to remotely hack U.S. and international computers, leaving civil rights organizations horrified at what they term serious violations of the First and Fourth amendments, The Hill reports. Some privacy advocates are saying the request for expansion constitutes an unprecedented and dangerous increase. “Possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception,” added Ahmed Ghappour, a computer law specialist at the University of California-Hastings College of the Law. Ghappour, along with other privacy specialists, will deliver an address at the Advisory Committee on Criminal Rules next Wednesday.

Si alguna ves pensaste que seria interesante ver como hackean alguna red o hacerlo tu mismo, este mapa te puede mostrar en tiempo real un a parte del mundo hacker. Como vemos en la imagen monitorea en tiempo real cuando la red de The Honeynet Project detecta aun ataque se muestra un punto en color rojo y el punto amarillo es el objetivo, así de sencillo. El Proyecto Honeynet es una empresa líder internacional sin fines de lucro 501c3 organización de investigación de seguridad, dedicado a la investigación de los ataques más recientes y el desarrollo de herramientas de seguridad de código abierto para mejorar la seguridad en Internet. Fundada en 1999, The Honeynet Project ha contribuido a luchar contra el malware y ataques de hackers maliciosos y tiene el profesional de seguridad líder entre los miembros y ex-alumnos. by waltherbeltranardila Jan 21

Related:  Rand0mcyberspacerussgouveiatools