KRACK vulnerability that affected Apple
Some may remember the great problem that apple had with this vulnerability called KRACK, which was published in 2017, which…
Checksum – What exactly is this?
As we well know bitcoins are quite an expensive commodity today and some may be interested in this function, the…
DVL is Everything that is wrong in a distro
How do crackers exploit security flaws in our web applications? What tools are there for this? How can we defend…
TPM Module – Why does Windows 11 require it?
Several days have passed since the release of Windows 11, but there are still many questions regarding the new operating…
Shakespeare Unique Programming Language
When we talk about Shakespeare we usually refer to one of the greatest figures in the history of literature. Incredible…
Magecart group targeting online shopping
Magecart is a group of malicious hackers who target online shopping cart systems, generally those using the Magento system, to…
ARP – Better known as Address Resolution Protocol
The Address Resolution Protocol was specified in 1982 in the RFC 826 standard to carry out the resolution of IPv4…
Phoenix Cryptolocker, a dangerous and active threat
The name Phoenix Cryptolocker may sound familiar since on March 21 of this year, the CNA suffered a sophisticated cybersecurity…
NTP Protocol – A protocol for synchronizing clocks
Computer system clocks are a valuable aid to anyone who needs to know what time it is and does not…
Sneaker Bots – What are these and how they work?
Sneaker bots are just software programs that follow instructions, they work in many ways. One of these ways is automated…
