No matter the antivirus your device has, the quick development of technology makes it easier to find a back door to steal information. A new virus found on May 2019 identifies users as they watch adult content, said Canadian cyber security company ESET.   The malware called Varenyky is meant for French users. It records the scream of the devices while the person watches pornography. The...

Read More

Passwords are used to verify a user only provide a very basic level of protection. It is a weak mechanism. Users who do not master the secrets of informatics do not always choose the best passwords.   A survey made by the National Cyber Security Center (NCCS) of UK examined the passwords of hacked accounts all over the world. This survey revealed that the hacked accounts had passwords...

Read More

Autonomous cars, virtual reality, smart cities, and robots working online: they will all work with 5G technology very soon. 5G promises to open the door for new surgical procedures, safer means of transportation, and instant communication with emergency and distress services.   In telecommunications, 5G stands for fifth generation of cellular network technologies. Is the successor of the 4G technology, and it is expected to be available for everyone...

Read More

In a conference lectured by Patricj Rhude, Nokia head of security, he alerted about the dangers in security the 5G telephony networks bring about. Now, a recent report from Europol follows this same line by alerting the inherent risks from the technology that may lead the development of digital society in the next years.   Europol, the law enforcing agency of the European Union, as well as...

Read More

Cyber criminals use a wide variety of scam tactics to gain access to a device or network, to ask for ransom or to steal valuable information.   Understanding today’s threats, how to protect and secure your company against those threats, to know the various techniques in which social engineering can be very beneficial. People can minimize the impact of cyber scams by knowing the most common methods...

Read More