Zoom vulnerabilities – Serious problem for the platform
Zoom, the popular video conferencing service that, in recent months, has experienced exponential growth in both the volume of users…
Worst Passwords – Do not expose your data!!!
Since we started with the Internet about two decades ago and later with the mobile phone, online purchases, digital emails,…
Best Cryptocurrencies or alternatives to Bitcoin
After a 2020 full of uncertainty and unfortunate events, 2021 is presented as the year of financial recovery in which…
OnlyFans leak of images and videos
A folder on Google Drive containing private videos and images from hundreds of OnlyFans accounts was posted online a few…
Janeleiro is a threat to personal and banking data
ESET Research has been tracking a new banking Trojan that has targeted corporate users in Brazil since 2019 in many…
Windows 10 vulnerabilities that have been highlighted
Among all the operating systems that we have the option of installing today, Windows 10 is the most used. This…
Spear Phishing attempt of data theft
Spear phishing is a special form of attack derived from traditional phishing that occurs with extremely malicious intent such as…
EtterSilent tool used by cybercriminals
A malicious document generator called EtterSilent is gaining more attention on underground forums, security researchers note. As its popularity grew,…
Deep Web and what can we face if we access it
First thing first, we must clarify that Deep Web is not the same as Dark Web. The Deep Web refers…
Another data breach by Facebook
In a hacking forum held this Saturday, April 3, a database with personal information of more than 533 million Facebook…

