Antiviruses we should avoid unless they’re improved
An antivirus is essential when we connect to the Internet to be able to navigate without problems and without risk…
Fix errors that you cannot eliminate in Windows
We must be aware that Windows 10 can have many good and bad things. However, if most users agree on…
Patch Tuesday – New patch that solves a vulnerability
A few days ago, as usual, Microsoft released its classic Windows 10 patch on Tuesday with a total of 87…
New extortion campaign with malicious purposes
Your device was hacked by hackers. Read the manual now!!! and this is how begins this new campaign of extortion…
New build allows Windows to open Linux files
Microsoft does not rest when it comes to developing Windows 10 and users enrolled in Microsoft’s Insider program receive a…
Botnets that were exploited by Cybercriminals
Although there have been countless botnets that have circulated through the Cloud, the vast majority have only been variations of…
BleedingTooth – new vulnerability emerges in Linux
BleedingTooth is the name given to a group of zero-click vulnerabilities in the Linux Bluetooth subsystem that can allow a…
What types of Phishing can we find?
There have been many types of Phishing and found cases of it. despite its many varieties, the common denominator of…
How we protect ourselves and identify Phishing
Phishing is a threat capable of appearing on desktops, laptops, tablets, and smartphones. Most Internet browsers have ways to check…
Milton Group – the scam company that gave promise
This company became known through Facebook or any other social network that showed a classic ad that, mysteriously, promises to…

