Magaly Perez

  • The article I chose this week is regarding Machine learning and how it has become a powerful tool in the business sector. What is machine learning you might be asking yourself? It’s a type of artificial […]

  • The article I chose this week is regarding, data privacy. The article explains the use of secure VPNs to prevent ISPs from spying on your internet activities. A few weeks ago, the US Senate voted to eliminate […]

  • The article I chose this week is regarding Android’s version of one of the most high-leveled mobile spyware has been discovered that remained undetected for at least three years due to its clever s […]

  • Magaly Perez posted a new activity comment 3 weeks, 5 days ago

    David,

    I’m not honestly not suprised whatsoever. I just wanted to include that the actions that were protected under the Obama Admin were to prevent companies from:
    – selling your data to marketers
    – highjacking searches
    – snooping thought internet traffic to insert ads
    – pre-installing software on your phone and recording your activity
    -…[Read more]

  • Chinese hackers have developed an attack which uses rouge cell phone towers to distribute Android banking malware via spoofed SMS message. These means that the hackers are sending bogus messages to users which […]

  • Magaly Perez posted a new activity comment 1 month ago

    Dave, no problem! I actually switched to FireFox because, I had issues with Chrome’s lags and extensions. Great question, I would think that its somewhat an automatic control that just inherently mitigates the risk because like you said, it just might identify it as a risk generally speaking. As for the algorithm, I am not sure, but I most…[Read more]

  • This week’s topic is regarding Google Chrome’s “Font Wasn’t Found” malware scam. Google Chrome users beware of a website with messy content prompting you to download a missing front to read the site by updating […]

    • Magaly: thanks for the heads-up. As a chrome user, I have yet to see this, but I did find it interesting that the chrome browser doesn’t flag it as malware – I wonder why that it is? I was a little confused by that end of that author’s sentence though: “the browser does block it because the file is not downloaded too often, which is a standard warning.” So does that that mean the browser doesn’t identify it as malware, but does block it because it may identify it as a threat in general? And is there some sort of algorithm in place that tracks the cost-benefit ratio of providing warning messages / identification processes based on the number of downloads (e.g. victims)?

      Either way, pretty scary to think about the average user encountering this. I think the only reason why this hasn’t been more successful is due to the low-profile of the websites that can fall victim to the trap; otherwise, this would be an issue.

  • Magaly Perez posted a new activity comment 2 months ago

    Shala,

    Yeah, I found this article very interesting. Its crazy, because the last thing you think about are toys being hackable and collecting data. Its very shocking, not only can the hacker collect the recorded data but they can also communicate with children which is terrifying. Also, thank you for looking into regulations aspect of the…[Read more]

  • I came across this very interesting article, “Germany Bans “My Friend Cayla” Toys Over Hacking Fears and Data Collection”. Germany’s Telecommunications Regulator broadcasted a ban against the smart toy, “My Frien […]

  • Magaly Perez posted a new activity comment 2 months, 1 week ago

    In all honesty, I think all of these skills are applicable to any IT Field position. The skills that you have mentioned are all great skills to possess. However, I think that it sad, the most people often think of IT professionals as not knowing their audiences. Obviously, it various by certain individuals, but generally speaking if you know you…[Read more]

  • Magaly Perez posted a new activity comment 2 months, 1 week ago

    Alex, I’ve asked the same question. As mentioned above, the people who commit these breaches could have been so easily detected, due to little things being over looked (i.e.)
    not updating firewalls and lack of employee training /education in detecting threats etc. Although, hacking is evolving much more throughout the decades alongside…[Read more]

  • This week’s topic, I selected is based on the recent discovery that Apple has not been deleting browsing history. Although, most of us are aware that anything dealing with the internet isn’t exactly ever del […]

  • Said, I do get where you are coming from. My suggestion was more along the sides of collaboration and growth. I don’t really think its one-sided choice whatsoever. I personally just think that organizations must understand technology and the enterprise impacts/risk that it faces at that time by thinking more along the lines of the future.…[Read more]

  • I think the Audit and Assurance professions will benefit from the millennial generation. As being a millennial myself, we have grown up using computers, mobile technology, and smart devices our entire lives, and that continues to evolve alongside technology; therefore, millennials have a much more advanced baseline knowledge of digital information…[Read more]

  • Magaly Perez posted a new activity comment 2 months, 1 week ago

    Sean, I get where you are coming from. I don’t think its a one sided thing and must be contingent on each other. Businesses are finally recognizing how to balance the ROI gains of using technology. For example, enterprise messaging services have already begun displacing the need for email communication within the enterprise, and this trend is only…[Read more]

  • As ITAC’s students we know that third-parties are often key components to businesses and organizations to stay competitive amongst each other. However, with partnership can come risk. As we know, the v […]

  • Magaly Perez posted a new activity comment 2 months, 2 weeks ago

    Which one of these do you consider the worst type from the standpoint of the auditee? Why? The auditee is the person or group responsible for the subject matter being audited.

    From my personal standpoint, I would choose “The Lazy” IS Auditor as the worst type. As being the auditee, I would want an IS Auditor to be the total opposite of Laz…[Read more]

  • Magaly Perez posted a new activity comment 2 months, 2 weeks ago

    Yu Ming, I agree with your statement, “There is no conflict between depth of knowledge in technology, or its impact on the enterprise.” I believe they are both equally important and for that reason, they should be aligned. By embracing both the IT innovation with its affects on the enterprise, allow businesses the ability to transform along side…[Read more]

  • Magaly Perez posted a new activity comment 2 months, 3 weeks ago

    Mustafa, I actually am not surprised by those statistics whatsoever and I agree with David’s comment. The idea of personal data being compromised has become a product of our society, pretty much a norm. I remember reading an article, last semester that stated that 82% of millennials know that public wifi access is not secure to connect to, but…[Read more]

  • Magaly Perez posted a new activity comment 2 months, 3 weeks ago

    Thanks for the input Sean. I thought the article’s highlights of the recommendations were pretty interesting on the different ways to address/approach risk. Although, some of them are a little contradiciting of each other, I think they provide an accurate assessment on how to perceive risk in a different manner. Like you mentioned, risk are hard…[Read more]

  • Load More
Skip to toolbar