No matter the antivirus your device has, the quick development of technology makes it easier to find a back door to steal information. A new virus found on May 2019 identifies users as they watch adult content, said Canadian cyber security company ESET.   The malware called Varenyky is meant for French users. It records the scream of the devices while the person watches pornography. The...

Read More

Passwords are used to verify a user only provide a very basic level of protection. It is a weak mechanism. Users who do not master the secrets of informatics do not always choose the best passwords.   A survey made by the National Cyber Security Center (NCCS) of UK examined the passwords of hacked accounts all over the world. This survey revealed that the hacked accounts had passwords...

Read More

Autonomous cars, virtual reality, smart cities, and robots working online: they will all work with 5G technology very soon. 5G promises to open the door for new surgical procedures, safer means of transportation, and instant communication with emergency and distress services.   In telecommunications, 5G stands for fifth generation of cellular network technologies. Is the successor of the 4G technology, and it is expected to be available for everyone...

Read More

In a conference lectured by Patricj Rhude, Nokia head of security, he alerted about the dangers in security the 5G telephony networks bring about. Now, a recent report from Europol follows this same line by alerting the inherent risks from the technology that may lead the development of digital society in the next years.   Europol, the law enforcing agency of the European Union, as well as...

Read More

Cyber criminals use a wide variety of scam tactics to gain access to a device or network, to ask for ransom or to steal valuable information.   Understanding today’s threats, how to protect and secure your company against those threats, to know the various techniques in which social engineering can be very beneficial. People can minimize the impact of cyber scams by knowing the most common methods...

Read More

FaceApp is one of the funniest apps that recently became popular on every mobile device. It ages anyone who lends his face. However, just like any other app, this one has advantages and disadvantages; some of the latter are privacy and security.     Western media sounded the alarm about the risks and dangers of using this Russian app after the boom FaceApp had in several countries, including Latin...

Read More

Cyber attacks are one of the biggest threats for companies right now. They affect States, societies, companies, and people the same. Because of this, cyber security measures are now a priority, mainly in those companies or businesses which fully rely on the Internet to run their operations.   – Malware: The fact that malware, which comes from malicious software, is first in the cyber attack ranking should not...

Read More

Reports of cyber attacks to companies continue to rise. Now, it seems that no month passes without the news of new huge cybernetic attacks that cause commotions among companies. 2018 was a year with notable attacks, and as it well-known they did not stop, and continue to early 2019.   Some of these cyber attacks are:   – The systems of the city of Alaska were blocked for more than a week....

Read More