PHP Vulnerabilities and risks
PHP is one of the most popular programming languages on the web. This is used by more than 76% of…
What we understand about SEO Poisoning
SEO poisoning is a common practice among websites, considered a blackhat technique or penalized technique by search engines. These techniques…
Be careful where you buy a USB for the BadUSB risk
Of all the tools to carry out a cyberattack, badUSB is possibly the one that has increased its popularity the…
Tails OS – A Linux distro focused on anonymity
From the moment we connect to the Internet, our data is being controlled by all kinds of companies, such as…
Scareware – What is this and how dangerous is it?
Scareware is malicious software that tricks computer users into visiting malware-infested sites. This scareware, which is also known as hoax…
Man In The Middle – Be careful with these attacks
The term man in the middle denotes an encryption attack on a computer network. It is a third host that…
How to prevent Identity Theft (and what it is)
Identity theft is a latent risk that can affect anyone and when it occurs it is a problem that affects…
Types of phishing to be careful about
The technique that consists of sending by a Cybercriminal an Email to an user pretending to be a legitimate entity…
What you should know about zero-day attacks
A zero-day attack is an attack against an application or system that aims to execute malicious code thanks to the…
Wireless Connections – Improve your security
Wireless Connections are all those networks that we use to surf the Internet either at home or in public places…

