Industrial Espionage – A step beyond espionage
The current economic environment establishes market circumstances in which many have access to develop a successful business with options to achieve great enrichment. As a consequence, a highly competitive market…
Open Source Risks – What these systems face
During the last few years, the adoption of open-source solutions has grown tremendously. It has multiple advantages. One of them, in many cases, is the low or no cost it…
Discreet Linux – A distro for security against Trojans
Discreet Linux, a distro that runs in live mode, determined to protect us against massive surveillance and attacks by malicious software, such as Trojans. Discreete Linux follows a strict privacy…
Qubes OS – A secure operating system
As we know there are a hundred Linux distributions that we can find on the web and today we see the the one called Qubes OS, which is an operating…
Lakka – Turn your PC into a retro console
Lakka is a project that not only takes the basis of Gnu / Linux but also modifies it based on the OpenElec project to such an extent that it seems…
3 Factor Authentication – More security!!
Multi-factor authentication dramatically improves security. It is unlikely that an attacker will be able to forge or steal the three elements involved in this element, which makes the login more…
I’ve been hacked! – what can I do?
One of the most important problems that us as Internet users can face, is that our accounts can be hacked. This can happen for different reasons. The password may be…
Tips to protect you against Cyberbullying
Are you worried that your child will be a victim of Cyberbullying? that is, intentional and repeated damage perpetrated through computers, mobile phones, and other electronic devices. According to many…
Social Engineering – What we should know about this
Social engineering is tricking people into giving up personal information such as passwords or bank details or allowing access to a computer in order to inadvertently install malicious software. Thieves…
DeepFake – The dangers posed by this threat
With the passage of time and the increase in technologies and now it would be the case of DeepFake, some videos have been released that have warned about the unreliability…