<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>information crimes &#8211; Bitfinance</title>
	<atom:link href="https://bitfinance.news/en/etiqueta/information-crimes/feed/" rel="self" type="application/rss+xml" />
	<link>https://bitfinance.news</link>
	<description>Fintech &#38; new economy info</description>
	<lastBuildDate>Tue, 30 Dec 2025 19:33:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bitfinance.news/wp-content/uploads/2025/01/favicon-64.png</url>
	<title>information crimes &#8211; Bitfinance</title>
	<link>https://bitfinance.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity: Let&#8217;s aim for strategies to be more effective in 2026</title>
		<link>https://bitfinance.news/en/cybersecurity-lets-aim-for-strategies-to-be-more-effective-in-2026/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Tue, 30 Dec 2025 14:00:51 +0000</pubDate>
				<category><![CDATA[Cryptocurrencies]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[bank scams]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[digital security]]></category>
		<category><![CDATA[electronic commerce]]></category>
		<category><![CDATA[information crimes]]></category>
		<category><![CDATA[Latin America]]></category>
		<category><![CDATA[maskseguridad]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Rafa Nuñez]]></category>
		<category><![CDATA[Rafael Núñez Aponte]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=118303</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="800" height="400" src="https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El especialista Rafael Núñez advierte sobre un incremento del 40% en 2025 en casos de ciberataques tipo ransomware" decoding="async" fetchpriority="high" srcset="https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik.jpg 800w, https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik-300x150.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik-768x384.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></div><p>Ends 2025 with a huge amount of stories and reviews of events related to vulnerabilities in the computer security of organizations, institutions, or individuals, and of scams, thefts, and other damages caused by cybercrime. On the eve of 2026, Unión Radio interviewed Rafael Núñez Aponte, in his capacity as an expert on the subject; the [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-lets-aim-for-strategies-to-be-more-effective-in-2026/">Cybersecurity: Let&#8217;s aim for strategies to be more effective in 2026</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="800" height="400" src="https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El especialista Rafael Núñez advierte sobre un incremento del 40% en 2025 en casos de ciberataques tipo ransomware" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik.jpg 800w, https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik-300x150.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/12/Seguridad-Informatica-Freepik-768x384.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></div><p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;"><strong>Ends 2025</strong> with a huge amount of stories and reviews of events related to vulnerabilities in the <strong>computer security</strong> of organizations, institutions, or individuals, and of scams, thefts, and other damages caused by cybercrime.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">On <strong>the eve of 2026,</strong> <em>Unión Radio</em> interviewed <strong>Rafael Núñez Aponte,</strong> in his capacity as an expert on the subject; the dialogue revealed the relationship between the rise of e-commerce and cyberattacks in Venezuela, both for seasonal reasons and in general.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;"><strong>E-commerce in Venezuela has seen a 95% growth, which is actually a very positive thing,</strong> but the phenomenon has been exploited for negative purposes by cybercriminals, who have triggered a proportional increase in cyber-attack cases.</span></p>
<p class="MsoNormal" style="text-align: justify;"><strong><span lang="EN-US" style="mso-ansi-language: EN-US;">Rafael Núñez, director of </span><span style="mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast;"><a href="https://www.instagram.com/masqueseguridad/?hl=es" target="_blank" rel="noopener">MásQueSeguridad</a></span></strong><span style="mso-ansi-language: EN-US;"> <span lang="EN-US"><strong>and a cybersecurity specialist</strong>, explained that this high traffic creates more opportunities for cybercrime, as it uses this flow to spread malware and steal data.</span></span></p>
<figure id="attachment_118305" aria-describedby="caption-attachment-118305" style="width: 1100px" class="wp-caption alignnone"><img decoding="async" class="wp-image-118305 size-full" src="https://bitfinance.news/wp-content/uploads/2025/12/rafa.jpg" alt="Rafa Núñez emphasizes that resilience and digital ethics must be part of the essential safeguards for 2026" width="1100" height="618" srcset="https://bitfinance.news/wp-content/uploads/2025/12/rafa.jpg 1100w, https://bitfinance.news/wp-content/uploads/2025/12/rafa-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/12/rafa-1024x575.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/12/rafa-768x431.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /><figcaption id="caption-attachment-118305" class="wp-caption-text">Rafa Núñez emphasizes that resilience and digital ethics must be part of the essential safeguards for 2026</figcaption></figure>
<p>&nbsp;</p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">According to the expert, <strong>Venezuela&#8217;s position on the international geopolitical agenda</strong> also draws the attention of criminals from other countries who operate without borders.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">&#8211; Venezuela is in the news, so cybercriminals from any other country also come, we call their attention, and since there are no borders in the digital realm, they<strong> can launch attacks by fishing in troubled waters.</strong> What does that mean? Well, let&#8217;s see how Venezuela&#8217;s systems are, let&#8217;s see what IP addresses are and they start attacking remotely, details Núñez.</span></p>
<h3 class="MsoNormal" style="text-align: left;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Cyberattacks and their methods</span></h3>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">One of the most common vectors of cyberattacks in the banking sector, for example, is<strong> phishing,</strong> a technique that uses identity theft to obtain, steal, confidential information, which Núñez calls &#8220;decoy traps.&#8221;This method is based on <strong>social engineering,</strong> defined s the art of tricking people&#8217;s cognitive biases into voluntarily giving up data.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Rafael Núñez points out that these cyberattacks use <strong>psychological manipulation through emails, text messages, WhatsApp, or Telegram.</strong></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">&#8220;They pose as a friend, an employee, or a trusted person, but they play with emotions (exploiting them); that is, psychological manipulation, using fear, joy, hurry, urgency, and people fall quickly,&#8221; he reasons.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">The Venezuelan expert warns that criminals have become more sophisticated in their methods, going so far as to<strong> block a user&#8217;s access to their bank, then calling them and impersonating the institution</strong> to ask for passwords or coordinate cards, data that &#8220;the bank will never ask for over the phone.&#8221;</span></p>
<h3 class="MsoNormal" style="text-align: left;"><span lang="EN-US" style="mso-ansi-language: EN-US;">The rise of ransomware</span></h3>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">One of the main concerns currently for digital security in the country is the <strong>increase of ransomware cases by 30 % to 40 %.</strong> This technical term refers to a malicious computer program that blocks and encrypts a company&#8217;s information, then demands<strong> a ransom, usually in cryptocurrency,</strong> to release it and return things to normal.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">The specialist reveals and highlights preventively that this type of <strong>&#8220;virtual kidnapping&#8221; has already affected a large-scale telephone operator and a relevant private banking institution,</strong> with attacks that come mostly from Eastern Europe. Something that should undoubtedly prompt caution.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Given this reality, <span class="lookup-word">Núñez</span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">emphasizes</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">the</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">need</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">for</span></span></span><strong> immutable and encrypted backup systems</strong><span data-slate-leaf="true"><strong>, </strong><span data-slate-leaf="true"><span data-slate-string="true">as</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">well</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">as</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">data</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">segmentation</span></span></span><span data-slate-leaf="true"><span data-slate-string="true">, </span><span data-slate-leaf="true"><span data-slate-string="true">since</span></span></span><span data-slate-leaf="true"><span data-slate-string="true"> &#8220;</span><span data-slate-leaf="true"><span data-slate-string="true">nothing</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">is</span></span></span><span data-slate-leaf="true"><span data-slate-string="true"> 100% </span><span data-slate-leaf="true"><span data-slate-string="true">secure</span></span></span><span data-slate-leaf="true"><span data-slate-string="true">&#8221; </span><span data-slate-leaf="true"><span data-slate-string="true">and</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">current</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">attacks</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">can</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">even</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">be</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">rented</span></span></span><span data-slate-leaf="true"><span data-slate-string="true">, </span><span data-slate-leaf="true"><span data-slate-string="true">enhanced</span></span></span><span data-slate-leaf="true"><span data-slate-string="true">, </span><span data-slate-leaf="true"><span data-slate-string="true">and</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">programmed</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">with</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">the</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">support</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">of</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">artificial</span></span></span><span data-slate-leaf="true"> <span data-slate-leaf="true"><span data-slate-string="true">intelligence</span></span></span><span data-slate-leaf="true" data-slate-fragment="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"><span data-slate-string="true">.</span></span></p>
<h3 class="MsoNormal" style="text-align: left;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Legislation and shortage of professionals</span></h3>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Institutionally, Núñez, who is also the director of security and a member of the board of the<strong> Venezuelan Chamber of E-commerce (Cavecom),</strong> said that legal reforms are being pushed forward.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">The current <strong>Law against Computer Crimes</strong> dates back to 2001, so new regulations are being proposed to<strong> regulate artificial intelligence and to classify modern crimes such as bullying, grooming, and cyberbullying.</strong></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">However, another obstacle is added to the convenient and necessary update of the legal framework: the lack of specialized human capital. Núñez emphasized that<strong> in Latin America, there is a shortage of nearly four million information security professionals.</strong></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">&#8220;Many times the bank asks for a <strong>CISO (Chief Information Security Officer)</strong> and it can&#8217;t be found,&#8221; he added.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Although there are academic programs at universities located in San Antonio de Los Altos and Maracay, the specialist insists that there is <strong>a need for greater impetus and training</strong> that generates enough professionals to meet the labor demand in this field.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">&#8220;I created <strong>a portal called másquecampus.com,</strong> with some <strong>updated and high-quality courses,</strong> but more initiatives and opportunities are needed. Personally, we attend, we go to international master&#8217;s programs, but there is still a need for more drive, not just in Venezuela, but in Latin America,&#8221; concludes expert Rafael Núñez Aponte.</span></p>
<p><iframe title="Resiliencia y ética digital, el blindaje indispensable para 2026" width="1170" height="658" src="https://www.youtube.com/embed/R3YPP5Tqcys?wmode=transparent&amp;rel=0&amp;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p class="MsoNormal"><span lang="EN-US" style="mso-ansi-language: EN-US;">Bitfinance.news</span></p>
<p class="MsoNormal"><em><span lang="EN-US" style="mso-ansi-language: EN-US;">With information from Unión Radio, other media, and social media</span></em></p>
<p class="MsoNormal"><span lang="EN-US" style="mso-ansi-language: EN-US;">Main reference image source: Freepik</span></p>
<p class="MsoNormal"><em><span lang="EN-US" style="font-family: 'Titillium Web','serif'; mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast; color: #222222; background: white; mso-ansi-language: EN-US;">Visit our news channel on </span></em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">Google News</span></b></em></a><em><span lang="EN-US" style="font-family: 'Titillium Web','serif'; mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast; color: #222222; background: white; mso-ansi-language: EN-US;"> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </span></em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">X/Twitter</span></b></em></a><em><span lang="EN-US" style="font-family: 'Titillium Web','serif'; mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast; color: #222222; background: white; mso-ansi-language: EN-US;"> and </span></em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><b><span lang="EN-US" style="mso-fareast-font-family: 'Times New Roman'; mso-fareast-theme-font: major-fareast; mso-ansi-language: EN-US;">Instagram</span></b></em></a><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US; mso-bidi-font-style: italic;"><span style="mso-tab-count: 1;">                                    </span></span></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-lets-aim-for-strategies-to-be-more-effective-in-2026/">Cybersecurity: Let&#8217;s aim for strategies to be more effective in 2026</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
