Risks of installing from unofficial APK sites
Android is an operating system that has many qualities despite the fact that it shares many aspects with most systems,…
Frauds by Email wich you should know
Spam and phishing are often closely related, as scammers send mass emails with the intention of collecting information from recipients.…
Flame – A malware that alarmed everyone in its time
Flame, also known as Flamer and Skywiper, is a modular malware discovered in 2012 that attacks computers with the Microsoft…
Vivaldi – How it is and what this Browser has to offer
As we have always seen, many browsers guarantee to be safe, offer private browsing, promise not to save your cookies…
Who are Cyber Forensics and what they do
Computer forensics or Cyber forensic is the use of proven scientific methods and techniques, in order to identify, preserve, validate,…
Phobos – A serious threat for working enterprises
First detected in December 2018, Phobos ransomware is another cyber threat that primarily targets organizations. However, unlike other big-game cyber…
Hacktivism – Why the name and what it is
The digital world is an extension of the real world and a clear example of this is hacktivism, let’s take…
SQL Injection – How these attacks can affect us
The SQL injection attack refers to an attack against a website or web application in which structured query language (SQL)…
Cold Boot Attack – A risk to our information
While you use a computer, all the information that is manipulated is temporarily written in the RAM memory: texts, saved…
Administer and Manage security risks
Today, the increase in cyber attacks is imminent. They are also becoming more sophisticated, powerful and with greater reach and…

