1638 posts
Corporate protection against fraud
Imagine the following situation: a friend tells you that a new island is about to emerge in the middle of the ocean. Your friend…
Security Myths
The IT world is full of myths and legends circulated via email or simply spread by word of mouth. These legends are not the…
New protection in the face of the new threats
Alfonso XI, ‘the Avenger’, was a Spanish king who once described in awe how during a battle against the Marinids, “they hurled many iron…
Forecast 2007
The problem with making a prediction about security in the year 2007 is that no matter how basic or extravagant it might be, it…
Viral convergence
Digital technology tried to solve these flaws, establishing an encryption system in the calls, which was easier because it was based on a digital…
From software to fatware to nanosoftware
The first programmable electronic computer is considered the ENIAC, built as a general-purpose system (that is, capable of carrying out different tasks depending on…
The future of spam
In the 1930s, the US psychologist Abraham Maslow formulated a theory that according to which, everybody has a series of basic needs that must…