Raspberry PI is a low cost small-board computer, an only-board computer, or a simple-board computer (SBC) developed in the UK by the Raspberry PI Foundation with the purpose of promoting computer science in schools. [caption id="attachment_10589" align="alignleft" width="300"] Raspberry PI is a small-board computer[/caption] They can be used as content servers, linked to a TV, and, of course, as a computer. Raspberry PI is one of the most popular products...

Read More

Distributed Denial of Service, or DDoS   In the world of computer security, a Distributed Denial of Service, also known as a DDoS attack, refers to an attack aimed at a system of computers or a network that rends a service unavailable to legitimate users. It normally leads to a loss of connection with the network by using the entirety of the victim’s broadband or overloading the...

Read More

The Telegram messaging service was recently a victim of a DDoS cyber-attack that affected the platform in several regions of America and Europe. Currently, the company points to China as the origin point of the attack, claiming that it was the Chinese government’s answer to Hong Kong protests.   Pavel Durov, Telegram’s C.E.O. and founder, revealed that the attack mainly originated from Chinese IP addresses, which suggests...

Read More

The ESET company warned WhatsApp users that a fraudulent message is circulating around the app, claiming that to celebrate an anniversary, WhatsApp is giving away 1000GB for internet navigation via WiFi.   The site to which the fraudulent message links invites the user to share the offer with at least another 30 users before being able to access the prize. ESET even detected a script on the...

Read More

Social media has become the ideal hunting ground for criminals thanks to the saturation of personal data currently available online. By using websites as casing tools, a criminal can send a customized message (spearphishing) in which he or she will try to get a user to visit a fake website, disguised as a legitimate one, with the aim of stealing their information and money.   Criminals will...

Read More