Tips to improve the Security of your LAN Network
LAN is a type of network that connects computers and devices in a specific and delimited area, such as an…
Changes in laws and legislation due to Cybersecurity
As attacks against computer systems have increased in recent years (in the last eight, more than 7.1 billion identities have…
Cyberterrorism – Why should we care about it?
Technology is one of the strategic factors that lead Cybercriminals organizations and their supporters to make greater use of the…
Do not fall into the temptation of online gambling
From an early age, children and adolescents are totally open to technology: they soon acquire their first electronic equipment for…
IdentityTheft – be very careful with this
IdentityTheft occurs when an attacker obtains personal information from a natural or legal person and uses it illegally, for example,…
Protect your family from Cyber Predators
According to the Federal Public Security Secretariat, the second crime (after child pornography) that is most committed against minors in…
RedHat Linux – System focused on business
RedHat is one of the main operating systems, this being well known and one of the most used worldwide, within…
Be very careful with VPN vulnerabilities
A Virtual Private Network or VPN allows you to create a secure virtual tunnel on the Internet to another network…
Where do the most cyberattacks come from?
As we know, cyberattacks are always directed for malicious purposes such as stealing personal information, money, financial accounts, bank information…
Potential Hoaxes Using Coronavirus Fake News
The fake news or false news gained notoriety in recent times, mainly for two reasons: due to the ease and…

