Search Results for
POS
The vulnerable Internet of Things: Security when everything is connected
The Internet of Things is here to stay. Soon, all of our home appliances will be virtually linked. Televisions, clocks, alarms, cars and even fridges…
Valentine’s Day. 10 Tips for avoiding viruses
Valentine’s Day is the day of couples, red roses, hearts and… viruses. Cyber-criminals take advantage of this important date to carry out massive attacks using attached files or…
Yet another ransomware variant!
Recently we caught what seems to be a new ransomware variant in our nets. The mail contained a file called “Transferencia devuelta pago erroneo” (translated:…
Cyber Resolutions You’Ve Already Broken
Cyber resolutions you’ve already broken Resolution. I will not reuse passwords Having different passwords for every website you use increases your safety. A password is…
Parisa Tabriz. Introducing Google’s ‘Security Princess’
Neither do princesses only appear in Disney movies nor is there only room for men in technology. There are various women in the ranks of…
‘The Imitation Game’: The greatest milestone in the history of cryptography hits the big screen
A war hero in a mathematician’s skin. That was Alan Turing. The man considered the father of computer science played a key role during World…
Be careful with Facebook! A researcher has hacked it using a Word document
Who hasn’t checked their Facebook page from work? In addition to a distraction, it has been proved that this practice is also a risk to…