4 of the most common cyber threats and their solutions.

cyber threats

In other articles we have analyzed various threats. However, this time we will review 4 of the most frequent cyber threats and their If we talk about cyber threats, the number of them is very wide; some are more complex, others are simpler. All of them have the capacity to put the integrity of computers […]

Read more

How to secure wifi from hackers and other dangers

How to secure wifi

In this day and age, wifi is indispensable for all walks of life, which has brought with it dangers. So learn how to secure wifi from hackers. All of us who have a wireless internet network at home or work know the importance of how to secure wifi. It is important to keep the use […]

Read more

The sandbox: what is it and how can it help you?


In the fight against malware attacks there are many solutions available; among them is sandboxing. Find out more about sandbox and how it can help you. In previous articles we have mentioned a lot of ways to protect ourselves against malware; from penetration testing, to recommendations for employees; but it is always wise to update […]

Read more

Source code review: your company’s security first.

Source code review

Source code review is a tool that can really save you from a lot of things, read on and find out the benefits it has for your company. If we review many of the statistics on cybersecurity that we get on the Internet, we can realize that many of the attacks are aimed at web […]

Read more

Stronger security: authentication beyond passwords.

Stronger security

Stronger security is always necessary, and sometimes the classic password is not enough. But fear not, other methods will help you a lot. Access to a company’s devices and user accounts should ideally involve the highest possible security level, at least stronger security than access to a public forum on the web requires. Strong and […]

Read more

The largest data breaches of the century.

data breaches

Data is precious in this information age. Therefore, some steal it. Read on and find out the most significant data breaches of this century. Data is one of the most valuable assets of any company. So we live in a world where there are many benefits, including economic benefits, to be gained from information. The […]

Read more

The Stolen Identity modern issue. What can cybersecurity do?

Stolen Identity

Internet and information. The more we expose ourselves, the more information can be taken from us. Beware of stolen identity. The advent of the Internet has been a phenomenon of great importance for mankind; being one of the most useful tools we have at our disposal. Therefore its use allows us to share a large […]

Read more

Your company was hacked, do you know what to do?


When your company suffers an attack a lot of things happen. So get informed about what you should and shouldn’t do when your company is hacked. Previously we have talked in this blog about cybersecurity, different attacks made to several companies, methods to keep you safe, among other topics; however, it is time to talk […]

Read more

Silver Sparrow has infected almost 300k Mac devices.

Silver Sparrow

Once again a silent malware has reminded us that nothing is impenetrable – find out about the Silver Sparrow attack on almost 300k Mac devices! Since its debut, the Apple Company has always been recognized for being one of the strongest technology companies in the world market; with approximately 1.7 billion devices sold worldwide, we […]

Read more

Vulnerability assessment: another good solution?

Vulnerability assessment

Every organization or company is susceptible to cyber-attacks, and a good vulnerability assessment would make your infrastructure more secure. The vulnerability assessment consists of an automatic analysis designed to identify, classify and prioritize possible vulnerabilities in the IT systems of an organization or company. These assessments are carried out using standard scanning systems that will […]

Read more