Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 7 November 2013

The Current State of Cyber Security in Latin America

Posted on 07:34 by Unknown
Latin America is experiencing tremendous growth—unfortunately the growth in question relates to cyberattacks. “If you look at Peru, you see 28 times as much malware in 2012 as in 2011; Mexico about 16 times; Brazil about 12 times; Chile about 10; and Argentina about seven times,” said Andrew Lee, CEO of ESET. These tremendous growth rates are expected to continue in the coming years, Lee noted.

Tom Kellermann, vice president of cybersecurity at Trend Micro, a network security solutions company. He discussed a report that Trend Micro released jointly with OAS called Latin American and Caribbean Cybersecurity Trends and Government Responses. 

Kellermann noted that while organized crime groups, such as narco-traffickers, have embraced cybercrime, the governments of Latin American countries haven’t been able to keep up in terms of defending against this type of crime. “Only two out of five countries have an effective cybercrime law, let alone effective law enforcement to hunt [cyberattackers],” he said. (more)
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in business, cell phone, computer, FutureWatch, Internet, IT, law, malware, spyware, statistics | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Bugging Boss for a Raise Lands Three Employees in Jail
    China - Three public officials were each sentenced to 20 months in jail for illegally wiretapping a county Communist Party chief of central ...
  • Holiday Shopping Safety Infographic
    Click to enlarge . Click to enlarge .
  • New York Times - Quote of the Day - Tapped Out On Taps
    "I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody...
  • From BULLRUN to NOCON and LACONIC
    On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ▼  November (47)
      • Columbia Engineers Make World’s Smallest FM Radio ...
      • DRTBOX and the DRT surveillance systems
      • U.N. - End Excessive Electronic Spying
      • TUMs Solves Wireless Security Headache. Warning: e...
      • Why Care About the NSA?
      • Protesters Capture Government Surveillance Van
      • Indonesia Posts Truth About Government Spying
      • Smart TVs Lie to You
      • DIY Surveillance in India Shows Eye-Popping Growth
      • Not to be Out-Spooked by the NSA...
      • Shop Owner Installs Surveillance Cameras to... wat...
      • Help The OSS Society Pass a Law (It's easy.)
      • Bond Car Submarines at Auction
      • Screenshots from BOUNDLESSINFORMANT can be misleading
      • REPORT: Corporate Espionage Against Nonprofit Orga...
      • Corporate Espionage Infographic
      • Recent Technological Innovations Have Completely C...
      • Audio Surveillance Laws (Party Consent) by State
      • Mass Surveillance Is Big Business: Corporations Ar...
      • Business Espionage - IKEA Snooping Investigation C...
      • Snooping on Credit Cards with Shopping Carts
      • Five Eyes, 9-Eyes and many more
      • Seattle, where a java junkie hanging on a light po...
      • Vegas, where a drunk hanging on a light pole won't...
      • Economic Espionage: Competing For Trade By Stealin...
      • Corporate espionage: The spy in your cubicle
      • Private Investigator + Software Firm = Cell Phone ...
      • More Kinds of Corporate Spies Target More Kinds of...
      • Secret Agent Suits - Odds Are You Live to See Tomo...
      • Hacker Who Helped Catch Cheating Lovers in FBI's S...
      • The Current State of Cyber Security in Latin America
      • NSA Spy Scandal - The Final Word?
      • Security Director Alert - Draft a 'No Recording' P...
      • The Wall of Sound Meets its Match - Sono - An Acou...
      • A Brief Spy Technology Retrospective
      • How a Slight Movement Can ID Your Smartphone
      • When Paranoids Collide they Blow the Whistle on Te...
      • Last Week on Halloween
      • This Judge is a Surveillance Expert. He has Cred.
      • 10 Most Audacious Eavesdropping Plots
      • What Corporations Can Learn from the Vatican
      • Can a Perv Skirt Privacy Laws by Raising The First...
      • Music to Spy By
      • High School Football Spying?!?! - Four Destrehan C...
      • Encryptor's Unite! - From Those Wonderful Folks Wh...
      • In the Days Before Spread Spectrum Communications ...
      • Mobile Phone Use a Significant Security Risk for C...
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile