Scorpio Detectius en Català. Scorpio Detectives en Castellano. Scorpio Policiers en Français.

COMPUTER FRAUD

The unproper use of computers, e-mail and the Internet causes serious losses to the company.

SCORPIO DETECTIVES has been very successful in this field, facilitating decisions favorable to the company, which has laid TSJC jurisprudence. The use of spyware to detect misuse of PC's, by personnel of the company, does not violate their right to privacy.

Searching for information and evidence in computers has become a necessity for the proper focus of much research.

Key Concepts about the Internet (networks, protocols, addresses, applications)

The evaluation of the sources (legitimate and appropriate use of information)

Deficiencies affecting some of the systems related to Internet are exploited to commit frauds, damage computers, crimes against sexual intimacy or indemnity, etc.

SCORPIO DETECTIVES has the experience and resources necessary to reach complete resolution of cases; we are constantly updating our skills and technological equipment to meet the challenges that are appearing on the market. The range of services we can offer in this field is broad:

  • Spy programs to control the use of computers
  • Investigation of the e-mail
  • Identification of people in internet
  • Data Recovery
  • IPs monitoring
  • Communications intrusion test
  • Anti-Malware security services
  • Technical security audits
  • Computer Intrusion Defense
  • Fraudulent websites and Internet businesses copies
  • Security in the exchange of information and internet browsing
  • Protection of computer systems and filter Internet access
  • Analysis of PCs and files

Social networks are one of the latest trends of the Internet. This opens up a difficult dilemma: they cannot be blocked, but cannot be allowed to squander the resources of the company or to be used as a vector of data leakage or malware transmission.

With a spectacular growth in the number of users: they have become the most visited sites, just behind the searches and visits to major information hubs, such as MSN or Yahoo, and they are going to engulf most of the time users spend connected to the network, either fix or mobile devices.

Many companies hesitate about if completely ignore this phenomenon at risk of being felled digital progress, or to embrace social networks and integrate them into their strategic planning.

Unfortunately, along with the undeniable advantages of personal and corporate use of social networks, numerous threats arise. Indeed, some risks are exacerbated if anything, such as social engineering techniques, due to the greater confidence given to messages received through the social network, from friends, contacts or persons in a row. You cannot turn away from the growing phenomenon of social networks, but neither can be integrated into the business model without knowing its risks. To the extent that the use of social networking is booming within and outside the company, are becoming a favorite target of cybercriminals, having converted in 2009 into one of the most significant vectors for data leakage and theftidentity. The sending of spam and malware distribution through social networks is growing at phenomenal pace. But are not the only threats.

Among the assets particularly threatened by social networks can be identified as follows:

Disclosure of private information:

Undoubtedly, the greatest concern arises when using social networks around the management of private data and personal. Users of these networks, both young and old, corporate or not, often do not realize the size of the audience which can access the content they publish. In an effort to maximize the number of contacts or friends as evidence of success and social influence, users open their profiles to the world and accept any invitations to join your network.As the popularity of a social network platform ultimately depends on the number of users, they encourage the rapid expansion of contacts, with limited options to protect the privacy and disabled by default. This behavior casual users mine platforms fueled by one of the first barriers of defense of privacy: the ability to restrict access to small networks, and also contributes to the spread of malware.

The biggest threat to privacy comes from the possibility of aggregation of digital dossiers basic personal data voluntarily provided by users who are then made public. The information gathered from the profiles can be downloaded and be round along time by third parties, allowing make digital dossiers that can be used in contexts and purposes quite different from those envisioned by the user. This threat is compounded by the fact that progressively higher profile information becomes accessible through search engines.

It has become common practice in the recruitment process the search for candidate profiles on social networks. Often the individual platforms prevent final deletion of information and published material, and there is always the possibility they have been copied and stored in other repositories. This adverse information could be retained indefinitely by an attacker and be used in future dark purposes.

In addition to the information disclosed voluntarily in the profiles, a user can disclose to the platform secondary non-personal information revealed in the profile itself, but derived from the use he makes of the social network: the place of connection (IP address), connection times , contacted friends list, messages sent, or pages viewed, these secondary data are exploited commercially.

In every social network there is always the risk of reidentification even using anonymous profiles appear to have been created with fictitious data. Depending on the type of user information available in the social network, text, photos, videos, it is possible to link with the person these data sets without explicit identifiers such as name of the person or your e-mail. There are sophisticated facial recognition algorithms from a photo of a man identified are able to track with striking success million photos in search of that same face.

On the other hand, it is impossible to control the information published by other users, who can label photos and videos with the names of individuals who appear in them, and even self published. No one knows for certain what information uses the platform targeted for the home or to whom the transfers nor under what conditions.

There are also powerful data mining techniques able to infer personal data is not explicitly disclosed to third parties. For example, you can guess the hobbies or topics of interest to an individual through the profiles of your contacts.

Financial losses:

The raison d'être of a company is making money. For this reason, pay special attention to threats to financial assets. Perhaps the most worrying threat comes from loss of productivity caused by time wasted by employees on social networks during the workday. Given the alarming increase in the number of hours spent on social networks during work hours, many companies have completely banned the use of them.

The spies are on Facebook

In July 2009 rose to the headlines the news that the head of British Secret Intelligence Service, better known as MI6 by James Bond films had their safety compromised due to the publication of private information on Facebook about him and his family. The head had been none other than his own wife! The data disclosed in your profile, open to everyone, including pictures of the wedding along with her three children and holiday party, the location of your apartment, and the identities of friends and loved ones. Worryingly, the case is not a character compromised security, but the ease with which millions of people worldwide can view their data exposed to anyone. The social networking platforms today's lack of good management features privacy, one of the tools necessary to move towards an ecosystem of social networks safe.

Evidence

Ratification in court