There’s no longer need to have a profile on the social network Facebook for the company to have your data. All it takes is just one click on the iconic Like button of the platform on another website, so that Mark Zuckerberg's firm receives your information. Information that, in some cases, can be compromising and bring problems if it comes to light.   A study conducted by...

Read More

Ring, a subsidiary of Amazon and specializing in domestic security services, has admitted that it collaborates with 407 police stations in the United States to provide them with access to user’s security cameras.   In 2018, the Amazon company closed one of its many seemingly infallible investments: Ring, the start-up dedicated to commercialize surveillance cameras that allow its buyers to contemplate in real time what is happening...

Read More

No matter the antivirus your device has, the quick development of technology makes it easier to find a back door to steal information. A new virus found on May 2019 identifies users as they watch adult content, said Canadian cyber security company ESET.   The malware called Varenyky is meant for French users. It records the scream of the devices while the person watches pornography. The...

Read More

Passwords are used to verify a user only provide a very basic level of protection. It is a weak mechanism. Users who do not master the secrets of informatics do not always choose the best passwords.   A survey made by the National Cyber Security Center (NCCS) of UK examined the passwords of hacked accounts all over the world. This survey revealed that the hacked accounts had passwords...

Read More