Threats you face every day within E-mail
Communication is a fundamental element for the interaction of people in all areas, in which there are various means that…
How to know if your iPhone device is in Danger
iOS is the operating system of your iPhone or iPad, of which Apple has strict control and security. Among other…
Sunburst – The Biggest Malware on Post-Cold War
The US Army, the State Department, the Presidential Office, the Pentagon or the US Department of the Treasury are just…
Social networks are a risk gap, beware of them!!
Social networks are an excellent tool to communicate, share information and many other things. But, like other great inventions, they…
Captain Zap – First convicted cybercriminal
Captain Zap, also known as Murphy Ian, in July 1981, a boy who called himself “Captain Zap”, get notoriety when…
Protect yourself and avoid SSL vulnerabilities
Unfortunately, the Internet is full of possibilities when it comes to vulnerabilities since cybercriminals never stop removing these. At the…
Keyloggers – Silent and very dangerous viruses
Keyloggers track and record every key that is pressed on a computer, often without the user’s permission or knowledge. A…
Windows 10x – The Future of Windows
The days of being able to choose between a 32-bit Windows 10 and a 64-bit one are numbered. Known as…
Cybercriminals are targeting health institutions
The health institutions or sectors are the most vulnerable in the cybersecurity area, attacks manage to affect institutions in a…

