FreakOut – A Botnet targeting Linux
The Check Point researchers have discovered a new variant of malware that they have dubbed FreakOut, created by a well-known…
Black Box – An attack targeting ATMs
Attacks on ATMs have increased by one over the years. As a consequence, the losses associated with the attacks also…
Industrial Espionage – A step beyond espionage
The current economic environment establishes market circumstances in which many have access to develop a successful business with options to…
Open Source Risks – What these systems face
During the last few years, the adoption of open-source solutions has grown tremendously. It has multiple advantages. One of them,…
Discreet Linux – A distro for security against Trojans
Discreet Linux, a distro that runs in live mode, determined to protect us against massive surveillance and attacks by malicious…
Qubes OS – A secure operating system
As we know there are a hundred Linux distributions that we can find on the web and today we see…
Lakka – Turn your PC into a retro console
Lakka is a project that not only takes the basis of Gnu / Linux but also modifies it based on…
3 Factor Authentication – More security!!
Multi-factor authentication dramatically improves security. It is unlikely that an attacker will be able to forge or steal the three…
I’ve been hacked! – what can I do?
One of the most important problems that us as Internet users can face, is that our accounts can be hacked.…
Tips to protect you against Cyberbullying
Are you worried that your child will be a victim of Cyberbullying? that is, intentional and repeated damage perpetrated through…

