The largest data breaches of the century.

data breaches

Data is precious in this information age. Therefore, some steal it. Read on and find out the most significant data breaches of this century. Data is one of the most valuable assets of any company. So we live in a world where there are many benefits, including economic benefits, to be gained from information. The […]

Read more

The Stolen Identity modern issue. What can cybersecurity do?

Stolen Identity

Internet and information. The more we expose ourselves, the more information can be taken from us. Beware of stolen identity. The advent of the Internet has been a phenomenon of great importance for mankind; being one of the most useful tools we have at our disposal. Therefore its use allows us to share a large […]

Read more

Your company was hacked, do you know what to do?

hacked

When your company suffers an attack a lot of things happen. So get informed about what you should and shouldn’t do when your company is hacked. Previously we have talked in this blog about cybersecurity, different attacks made to several companies, methods to keep you safe, among other topics; however, it is time to talk […]

Read more

Silver Sparrow has infected almost 300k Mac devices.

Silver Sparrow

Once again a silent malware has reminded us that nothing is impenetrable – find out about the Silver Sparrow attack on almost 300k Mac devices! Since its debut, the Apple Company has always been recognized for being one of the strongest technology companies in the world market; with approximately 1.7 billion devices sold worldwide, we […]

Read more

Vulnerability assessment: another good solution?

Vulnerability assessment

Every organization or company is susceptible to cyber-attacks, and a good vulnerability assessment would make your infrastructure more secure. The vulnerability assessment consists of an automatic analysis designed to identify, classify and prioritize possible vulnerabilities in the IT systems of an organization or company. These assessments are carried out using standard scanning systems that will […]

Read more

Konferenco 2022, the Monero conference comes to Lisbon.

Konferenco

The Monero conference (Konferenco) arrives in Lisbon this 2022, people from all over the world united by the same interest meet in the same place. In the world of technology, we can find a lot of people whose mission is to inform about hundreds and hundreds of topics. In this case the monero conference (Konferenco) […]

Read more

The botnet, a network of threats and concerns.

botnet

A botnet is one of the cyber threats you should beware of. Your device may be part of this malicious network, and you need to resolve it quickly. The 21st century is undoubtedly the century of technological advances. Year after year, technology evolves at a dizzying pace that would surprise past generations. This is especially […]

Read more

The healthcare system at risk. A challenge for IT security.

healthcare system

Risks in the healthcare system have increased since the pandemic and are estimated to be even higher by 2022. Find out why the healthcare system is at risk. Cyber attackers are always on the lookout for new methods of attack. Since the start of the pandemic in 2020, hackers have taken advantage of this global […]

Read more

Cybersecurity threats: How malware can get into your device.

Cybersecurity threats

All devices are prone to viruses. Cybersecurity threats are everywhere and we often forget it. Learn how to protect yourself. Every day we connect to the network from different devices; they can be desktop computers when it’s time to work; phones when we want to be distracted; even tablets when it’s time to study or […]

Read more

Cybercrime and its forms: The threat of the modern world.

Cybercrime

Cybercrime shows how much the modern world has evolved. The battles are no longer just on the battlefield but also in cyberspace. The security landscape is not the same as 30 years ago, or even 10 years ago. States must guarantee the protection of physical facilities and the physical integrity of people and the virtual […]

Read more