Tag: DemyoInc
-
Elections, pandemic and cybersecurity
Will this be the future of elections after the pandemic? A look at cybersecurity in the electoral process, and at the future of presidential elections. In the process of this pandemic by Covid-19 many countries have had to reinvent themselves to carry out their electoral processes in the required period; have had to implement the…
-
Spyware: how far does privacy go?
Spyware is among us, this silent phenomenon is causing terror among people. Learn how to protect your sensitive information from malware! Privacy is undoubtedly one of the human rights that we have, the protection of our information; as well as the free expression of information by consensus is essential to us; each person has the…
-
Online shopping, an advantage for hackers.
Black Friday and Christmas shopping increase online sales and hackers know it. Find out how to stay safe when online shopping. Online shopping, as well as online business has been increasing in conjunction with the development of the internet; it is estimated that around 21.8% of the world’s population buys online; which ensures a large…
-
Juice-Jacking and the dangers of public charge.
Know the definition and how to deal with juice-jacking, a new danger in public loading zones. Find out what it is and how to stay protected! Since the invention of the cell phone and the updating of technologies; a series of changes have occurred that have resulted in the progressive dependence of humans on mobile…
-
Mobile application security and its impact.
Mobile applications are becoming more and more indispensable in our daily lives and even for our work, but what about mobile application security? The habituation of humans towards cell phones and devices in general has had an uncontrolled increase together with the development of new technologies that make some daily functions easier. According to the…
-
Ethical hacking, good or bad?
Hacking seen from the point of view of computer security, allies or dangerous practices… Learn more about ethical hacking. When we hear the term “hacking“ we probably associate it with theft or a malicious action. However, there are benign applications for these actions, since there are people who use these skills for good; in addition,…
-
A Look at Cloud Computing and IT Security.
Cloud computing presents a very useful tool for both workers and personal use; however, it presents several problems that can be counterproductive. Every day people enter millions of personal data into the virtual environment, from identity documents to bank accounts or social security data; and more. All with the purpose of having a backup to…
-
Vishing: an imminent threat to 2020.
Information theft tactics are becoming more sophisticated; cybercriminals are on the lookout for extracting information. Learn about vishing and how to avoid it. Since the beginning of the COVID-19 pandemic; D-19 pandemic; companies have waived certain safety standards when implementing telework. These standards include personal verification of the worker’s identity, as well as the use…