21H1 Update – Arrive of Teleworking on windows
This 21H1 update, according to Microsoft, is already directly influenced by the pandemic and what has happened in the last year. Not in the sense that it took more or…
What is a Negative SEO Attack
The threat of negative SEO is remote but overwhelming. Negative SEO is a set of activities aimed at lowering a competitor’s ranking in search results. These activities are usually off…
Browser extensions – Be very careful with these
Browser extensions are applets within a browser that add functionality. Commonly used extensions are, for example, Adblockers, Colorpickers, CRM integrations, Microsoft Office (Word, Excel, Powerpoint editing in your browser), password…
Encrypted Virus – How Dangerous are these
The encrypted virus is a computer virus that encrypts its payload with the intention of making it difficult to detect the virus. However, because anything encrypted requires a decryptor or…
What is Traceroute or Tracert and how to use it
Many times we users can find that we cannot access a computer on our network, a website, a resource on the network, etc. That is why one of the most…
NAS – What does this device offer
The data and information that a company handles are essential for them to be successful in all areas. Protection and access to this data have become one of the biggest…
Pentesting – What is this technique and how it works
Every organization manages information for its daily operation. It is common that tools are used for its treatment on computers, mobile phones, tablets, communication lines, etc. In any case, working…
DNS Tunneling – A Data Encoder Attack Method
DNS Tunneling is a cyber attack method that encodes data from other programs or protocols into DNS queries and responses. DNS tunneling often includes data payloads that can be added…
Sasser Worm – The virus that restarted the computer
Back in April / May 2004, a worm began to run like wildfire, causing a little window to appear on our computer with a countdown. This vulnerability spread through the…
Mafia Boy – The story of the young hacker
Mafia Boy was just 15 years old when he staged the Distributed Denial of Service (DDos) attack against commercial websites in February 2000. Companies such as Yahoo! eBay, Amazon, Dell…