Scorpio Detectius en Català. Scorpio Detectives en Castellano. Scorpio Policiers en Français.

INTELECTUAL PROPERTY

The greatest asset of a company is its brand and corporate image. Forgery and counterfeiting of successful products has become a lucrative business that has generated the appearance of local and international networks seriously damaging to business. SCORPIO DETECTIVES performs research to demonstrate the differences between the original products and the imitator, besides trying the existing distribution channels through testimony and photographic and video evidence.

WE INVESTIGATE:

Theft of intellectual property:

Many companies generate and make available to the public other material protected by intellectual property laws: writing, music files, videos or software. Here are facing several threats. On the one hand, some careless or unconscious employees publish enterprise content protected by copyright. Once distributed through the social network, even later removed, is impossible to remove all copies that have been accomplished.

On the other hand, suffers a loss of control over the content published. The licenses for use of the platform (no one reads carefully) are transferred, often draconian rights of exploitation of all published digital content. For example, a famous musical group called Artic Monkeys lost the rights to their own songs, because of loading them on MySpace in order to make themselves known in its infancy. On the other hand, it is very difficult, if not impossible, to remove or alter information, photos or videos posted by third parties.

Industrial espionage:

Social engineering attacks are to gain the confidence of a victim by impersonating staff, suppliers or customers of the company itself in order to circumvent the security mechanisms to capture sensitive information, often without involving the use of technology. Social networks provide invaluable information to an approach to a victim: just go to your contacts or friends and pose as one of them or say that it comes from his party to drop the defenses. The attacker usually will not find high entry barriers to become part of the groups to which the victim belongs. Some employees post information about their work or future plans of the company, which may reveal to the competition dates of product launches, mergers, staff promotions, or business restructuring. In some cases, such as technical discussions, employees come to post information about their ICT infrastructure and equipment purchase plans.

Digital identity impersonation or theft

Digital identity is defined as the digital representation of a set of assertions made by a digital subject about itself or another digital subject.

A terrible threat is the ease with which they can create fake profiles without any verification. What does it take to create a profile on Facebook about a user? Nothing, just an email address that can be obtained anonymously anywhere. Added a photo of the user, which could probably be obtained on the Internet, and a Gmail email address that includes your name, and you're ready a profile can impersonate any person.

Another way to steal the identity of a user is to have direct access to your account, such as stealing credentials via phishing attacks. As it could not be otherwise, is also becoming popular phishing attacks against social networks such as Facebook and Twitter. Moreover, these attacks are usually highly contextualized, which is known as spear phishing, as it can get lots of information about users from their profile, allowing you to create highly personalized messages in which the victims trust blindly. Although less common, there have also been cases in which hackers could take over the user database and therefore could potentially impersonate any user.

In January 2009 Twitter accounts of 33 celebrities, including Britney Spears or Barack Obama, had to be suspended for a period when they were kidnapped and begin to provide false information. While the authentication of users continue to be conducted through a user name and password, the phishing attacks will become reality difficult to combat.