Black Box – An attack targeting ATMs
Attacks on ATMs have increased by one over the years. As a consequence, the losses associated with the attacks also increased, with most of them concentrated in Asia and the…
Attacks on ATMs have increased by one over the years. As a consequence, the losses associated with the attacks also increased, with most of them concentrated in Asia and the…
The current economic environment establishes market circumstances in which many have access to develop a successful business with options to achieve great enrichment. As a consequence, a highly competitive market…
During the last few years, the adoption of open-source solutions has grown tremendously. It has multiple advantages. One of them, in many cases, is the low or no cost it…
Discreet Linux, a distro that runs in live mode, determined to protect us against massive surveillance and attacks by malicious software, such as Trojans. Discreete Linux follows a strict privacy…
As we know there are a hundred Linux distributions that we can find on the web and today we see the the one called Qubes OS, which is an operating…
Lakka is a project that not only takes the basis of Gnu / Linux but also modifies it based on the OpenElec project to such an extent that it seems…
Multi-factor authentication dramatically improves security. It is unlikely that an attacker will be able to forge or steal the three elements involved in this element, which makes the login more…
One of the most important problems that us as Internet users can face, is that our accounts can be hacked. This can happen for different reasons. The password may be…
Are you worried that your child will be a victim of Cyberbullying? that is, intentional and repeated damage perpetrated through computers, mobile phones, and other electronic devices. According to many…
Social engineering is tricking people into giving up personal information such as passwords or bank details or allowing access to a computer in order to inadvertently install malicious software. Thieves…