Vulnerability assessment: another good solution?

Vulnerability assessment

Every organization or company is susceptible to cyber-attacks, and a good vulnerability assessment would make your infrastructure more secure. The vulnerability assessment consists of an automatic analysis designed to identify, classify and prioritize possible vulnerabilities in the IT systems of an organization or company. These assessments are carried out using standard scanning systems that will […]

Read more

Konferenco 2022, the Monero conference comes to Lisbon.

Konferenco

The Monero conference (Konferenco) arrives in Lisbon this 2022, people from all over the world united by the same interest meet in the same place. In the world of technology, we can find a lot of people whose mission is to inform about hundreds and hundreds of topics. In this case the monero conference (Konferenco) […]

Read more

The botnet, a network of threats and concerns.

botnet

A botnet is one of the cyber threats you should beware of. Your device may be part of this malicious network, and you need to resolve it quickly. The 21st century is undoubtedly the century of technological advances. Year after year, technology evolves at a dizzying pace that would surprise past generations. This is especially […]

Read more

The healthcare system at risk. A challenge for IT security.

healthcare system

Risks in the healthcare system have increased since the pandemic and are estimated to be even higher by 2022. Find out why the healthcare system is at risk. Cyber attackers are always on the lookout for new methods of attack. Since the start of the pandemic in 2020, hackers have taken advantage of this global […]

Read more

Cybersecurity threats: How malware can get into your device.

Cybersecurity threats

All devices are prone to viruses. Cybersecurity threats are everywhere and we often forget it. Learn how to protect yourself. Every day we connect to the network from different devices; they can be desktop computers when it’s time to work; phones when we want to be distracted; even tablets when it’s time to study or […]

Read more

Cybercrime and its forms: The threat of the modern world.

Cybercrime

Cybercrime shows how much the modern world has evolved. The battles are no longer just on the battlefield but also in cyberspace. The security landscape is not the same as 30 years ago, or even 10 years ago. States must guarantee the protection of physical facilities and the physical integrity of people and the virtual […]

Read more

The Android operating system and its vulnerabilities.

Android operating system

The Android operating system, how it works and its vulnerabilities. Join me and find out what are the biggest flaws in this operating system. For years the Android operating system has managed to position itself at the top of the operating systems par excellence in smartphones. It is preferred in many regions of the world […]

Read more

InfoSec and cybersecurity, are they the same concepts?

InfoSec

Why do people tend to confuse cybersecurity with InfoSec? In the same way, they also misuse the concepts. Find out in this article! Eventually we have gotten people on blogs or news who tend to confuse the term InfoSec with cybersecurity, perhaps claiming that it is the same thing; however, it is a common mistake […]

Read more

IT Security: cyber-attacks increase 2020.

cyber-attacks increase

In the year 2020 after the Covid-19 pandemic, there was an increased interest in all kinds of online activities. Let’s see how Cyber-attacks increase. After the events resulting from the Covid-19 pandemic, and with the extension of the quarantine to many countries; there was a boom in digital activities, especially in online work. Many companies […]

Read more

GPS spoofing, its vulnerabilities and how to prevent it.

GPS spoofing

GPS spoofing is a danger that has been lurking for several years, but due to technological advancement we take it for granted. Learn more about GPS spoofing. For several years now, different ways of spoofing have been developed in various fields. One of them is GPS spoofing that has existed since the popularization of the […]

Read more