Social Engineering – What we should know about this
Social engineering is tricking people into giving up personal information such as passwords or bank details or allowing access to…
DeepFake – The dangers posed by this threat
With the passage of time and the increase in technologies and now it would be the case of DeepFake, some…
Cybersecurity threats faced by mobiles
The use of mobile devices is on the rise as cell phones and tablets are becoming more powerful as companies…
Vovalex – Ransomware posing as Windows utilities
A new ransomware called Vovalex is being distributed via pirated software masquerading as popular Windows utilities such as CCleaner. When…
The First Ransomware in the world – When it all started
Known as the fictitious PC Cyborg Corporation the first ransomware. A red window and a blank message demanding payment from…
The biggest data breaches in history
Computer attacks are not something new but … attacks on large and important companies are something that can have many…
Edge Computing – What is this technology
Edge Computing is one of the technologies that will define and revolutionize the way humans and devices connect to the…
Vicious Panda – Malware that uses the pandemic
Like every time there is a news item of global interest, it is used by cybercriminals as bait to induce…
Zero Trust policies – What is their function
Zero Trust presents us with a new paradigm in the way we protect our organizations, our data and our employees,…
Fraudulent campaigns called SMS Bandits
Known in cybercrime circles as SMS Bandits, the phishing campaign involved scammers sending fake SMS messages in bulk via fake…

