Sasser Worm – The virus that restarted the computer
Back in April / May 2004, a worm began to run like wildfire, causing a little window to appear on…
Mafia Boy – The story of the young hacker
Mafia Boy was just 15 years old when he staged the Distributed Denial of Service (DDos) attack against commercial websites…
Password leak risk – What to do if this happens
Today we have practically our entire life on the Internet. From our bank accounts and online purchases to our conversations…
Supply Chain Attack – A risk for the companies
An attack on the supply chain consists of compromising digital providers of external services such as: Internet service providers, Telecommunications…
The Dangers of Cryptojacking and how it affects users
As we well know, there are endless dangers on the web and cryptojacking is one of them. Called malicious cryptocurrency…
The importance of cybersecurity in the military field
The high technological dependence of our society is a reality verifiable, being essential for the proper functioning of the States,…
Septor Linux – A privacy focused distro
Septor is a GNU / Linux distribution that provides users with a preconfigured computing environment to browse the Internet anonymously.…
Microtransactions – The problem with this model
Currently the video game industry is booming, every day its image grows even more, causing people who are not familiar…
Large scale cyberattack that damaged multiple sites
This Large scale cyberattack on Dyn took place on October 21, 2016, leaving millions of people unable to enter the…
The day that Uber suffered a cyber attack
At this time, the Uber platform claims to be designed with safety as the central axis. With incident prevention features,…

