top of page
Tech Information


How to check if an antivirus works well?
It is important to have antivirus software to avoid security problems such as virus intrusion, information theft or software installation...
Feb 14, 20232 min read
8
0


Wifi eavesdropping or eavesdropping on public networks
Wireless networks are widely used and this also makes attackers look for ways to carry out different types of attacks to steal...
Jan 31, 20232 min read
26
0


What are the 'passkeys ’?, The Google system to log in without introducing the password
Cybersecurity experts do not stop recommending users to use different passwords for access to their accounts and that these are difficult...
Jan 26, 20231 min read
1
0


How to hide malware in images
Any hiding place is good for cybercriminals looking to infect our devices with malware, even a photograph. To do this, attackers must...
Jan 12, 20232 min read
5
0


Browse safely with a password generator and a VPN connection
We use the Internet for work, running various programs and procedures, and having fun. We subscribe to various online services, such as...
Jan 10, 20232 min read
2
0


How to detect a fraudulent SMS
Smishing is as dangerous as phishing: it involves text messages that appear to be authentic but hide scams to steal personal data,...
Dec 30, 20222 min read
9
0


The new EU cybersecurity rules that devices will have to comply with
Providers of internet-connected technology, from Apple software to baby monitors, will have to comply with new cybersecurity requirements...
Dec 15, 20221 min read
6
0


Some of the most imaginative phishing attacks
Phishing attacks have increased exponentially in recent years. From this perspective, the term "phishing" has become tremendously...
Nov 29, 20222 min read
2
0


Advantages of encrypting email to reduce the risk of data leaks
Data Loss Prevention (DLP) —in Spanish, “data loss prevention”— is a term that refers to the measures that guarantee that users do not...
Nov 22, 20222 min read
1
0


Mistakes you make when inventing a password
A study from this year found that 90% of Internet users fear that their passwords will be hacked, however, 51% of people say they use the...
Nov 15, 20222 min read
6
0


How to recover a stolen google account?
Almost everyone has experienced theft or scam. We must be careful because even though times change, crime does too. It adapts, becoming...
Nov 9, 20222 min read
14
0


What is 'doxing' and how can we avoid it?
Doxing consists of publishing users' personal information to blackmail or intimidate them. In addition to demanding money, cybercriminals...
Oct 18, 20221 min read
2
0


5 Dangerous Trojans that can empty your account
If there is something that moves cybercriminals, it is money. They are always fine-tuning their attacks to have a greater impact and,...
Oct 11, 20222 min read
1
0


How to carry out a correct security strategy
Organizations need to consider many factors and premises to determine their cyber security strategy. In a constantly changing...
Oct 4, 20222 min read
0
0


Dumpster diving: How do cybercriminals access deleted data?
Computer criminals look for data that could be relevant to commit cybercrimes even in the digital bin. This criminal practice is known as...
Sep 27, 20221 min read
5
0


What to do if my PC has been infected by ransomware
Ransomware does not allow users to access their system or digital files, requires payment of a ransom in order to recover them, and can...
Sep 20, 20221 min read
2
0


Four objects that can spy on you without you realizing it
Nowadays, more and more household objects have an Internet connection, especially since it is estimated that there are more than 22...
Sep 15, 20222 min read
5
0


The danger of shortened URLs
The 'url' are the addresses on the web that take us to the specific resources that we want to open, such as a page or an image, but they...
Sep 8, 20222 min read
1
0


Risks of browser autocomplete
In the search for a better user experience, the main browsers on the market such as Chrome, Firefox or Safari allow the use of the...
Sep 2, 20222 min read
0
0


These are the scams that can reach your Gmail email
According to the latest study carried out by the Criminality Statistical System (SEC), of the total reported cybercrimes, 89.6%...
Aug 22, 20222 min read
2
0


How do hackers choose their victims?
Given the recent wave of data breaches, it is extremely difficult for organizations to be able to protect every organization from every...
Jul 26, 20222 min read
5
0


8-character passwords made up of numbers can be cracked instantly.
Passwords are part of everyday life for all users who browse the internet. Who needs to manage a personal account online, needs to use...
Jul 19, 20222 min read
2
0


The data of millions of users is leaked through Telegram for using free VPNs
Many users opt for a VPN when browsing the internet, since it is a much more secure tool, since the browsing data is hidden from the web...
Jul 12, 20222 min read
3
0


Recover deleted files on Windows
It is common to store a large amount of information on our devices and although we have a wide variety of external storage devices, most...
Jun 14, 20221 min read
6
0
bottom of page