Spyware: how far does privacy go?

Spyware

Spyware is among us, learn how to protect your sensitive information from malware! Privacy is undoubtedly one of the human rights that we have, the protection of our information, as well as the free expression of information by consensus is essential to us, each person has the freedom to choose how much and what information […]

Read more

Online shopping, an advantage for hackers.

Online shopping, an advantage for hackers.

Black Friday and Christmas shopping increase online sales and hackers know it… Online shopping, as well as online business has been increasing in conjunction with the development of the internet, it is estimated that around 21.8% of the world’s population buys online, which ensures a large market that is increasing year by year. This has […]

Read more

Regret Locker the malware of 2020.

The malwares are always on the lookout, find out more about the Regret Locker. The hard disks of our computers are perhaps the most important part to us, since in that place we store any valuable information about our work, memories, important documents etc. There are text files, Word documents, images and videos that are […]

Read more

Juice-Jacking and the dangers of public charge.

Knowing the definition and how to deal with “Juice-Jacking” Since the invention of the cell phone and the updating of technologies, a series of changes have occurred that have resulted in the progressive dependence of humans on mobile electronic devices, whether they are cell phones, tablets, laptops, among others. If we think about it, what […]

Read more

Mobile application security and its impact.

Mobile applications are increasingly indispensable for everyday life, but what about security in these applications? The habituation of humans towards cell phones and devices in general has had an uncontrolled increase together with the development of new technologies that make some daily functions easier. According to the statistics of “Situation global mobile 2020” 67% of […]

Read more

Ethical hacking, good or bad?

Hacking seen from the point of view of IT security, allies or dangerous practices? When we hear the term “hacking” we probably associate it with theft or a malicious action. However, there are benign applications for these actions, since there are people who use these skills for good, usually ethical hacking applies to organizations, since […]

Read more

A Look at Cloud Computing and IT Security

Cloud computing presents a very useful tool both for workers and for personal use, however it presents several problems… Every day millions of pieces of personal data are inserted into the virtual environment, data ranging from IDs, bank accounts, social security data, and more. All with the purpose of having a backup to possible situations […]

Read more

The dangers of phishing in organizations.

The greatest vulnerability of organizations is people, let’s learn why! The world is becoming increasingly automated, replacing people who have performed different tasks for decades with much more efficient and economical machines. However, there are tasks performed by humans that are simply irreplaceable and vital for many companies, such as customer trafficking and intra-company communication […]

Read more

Vishing: an imminent threat to 2020

Information theft tactics are becoming more sophisticated, learn about vishing and how to avoid it! Since the beginning of the COVID-19 pandemic, companies have been forced to surrender certain security standards when implementing telework. These standards include personal verification of the worker’s identity, as well as the use of VPNs to access important information stored […]

Read more

Information security in companies: option or obligation?

Information security in companies: option or obligation? Nowadays on the internet there is a lot of information, e-commerce, digital companies, social networks, among many other things. Therefore, there are many threats and attacks that put at risk all these platforms, including companies already formed. However, there are companies that do not care about the security […]

Read more

Scroll Up