Search Results for
BEC
Non-OS-dependant malware
All too often people talk about the disadvantages of the Windows operating system: it has too many security flaws, it is not properly patched,…
Forecast 2007
The problem with making a prediction about security in the year 2007 is that no matter how basic or extravagant it might be, it…
Viral convergence
Digital technology tried to solve these flaws, establishing an encryption system in the calls, which was easier because it was based on a digital…
Voice over IP under threat
There has recently been considerable alarm about the possibility of a malicious code spreading via Skype. Skype is a system that allows voice communication…
From software to fatware to nanosoftware
The first programmable electronic computer is considered the ENIAC, built as a general-purpose system (that is, capable of carrying out different tasks depending on…
The future of spam
In the 1930s, the US psychologist Abraham Maslow formulated a theory that according to which, everybody has a series of basic needs that must…
The good, the bad and the malware 2.0
A movie has recently been released in which a terrorist manages to take control of absolutely ALL computers in the United States thanks to a…