1644 posts
How a drone can hack into your home’s network just by flying over it
Drones can be used to record incredible scenes for movies, to follow thieves from above, to save lives, or to carry out home deliveries at…
Kemoge: Google Play faces new app attack
Android users will be well aware of the fact that the Google Play store, and their Android device, are constantly under the watchful eye of…
Inside the mind of a cybercriminal: what is he looking for and why has he chosen your business?
One of the first steps to ensure that your private information isn’t accessible is to understand the reasons that drive hackers and cybercriminals to do…
The advantages of having a managed security service
In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex, and budgets tighter and tighter. The world of technology in…
All it takes is a laser pen to confuse the so-called “smart car”
Besides radars, cameras, or a GPS system, Google decided that its driverless car would also have a powerful eye mounted on top of the vehicle…
The main information security certifications for businesses
Just being aware of all the headlines is enough to realize that new threats and vulnerabilities in the field of information security are constantly emerging.…
Pay with Bitcoins to save a hacked phone? It’s a scam!
The Telematics Crime department of Spain’s Guardia Civil has warned of a new type of fraud which affects mobiles. This new operation consists of cybercriminals…