They’ll hack your Android in T Minus 10 seconds
The word that scared all Google users last summer is back and worse than ever. Stagefright, nicknamed by its founder Metaphor, is even more dangerous…
IOC: a buzz word and a hot topic, but do we really know its capabilities?
In order to secure and maintain an IT infrastructure, it is vital to know what is going on in the network that the Endpoint…
Who are the most famous hackers in history?
Since the beginning of the internet, there have been hackers who have used the Net to benefit at the expense of other users. Â Some have…
Cyber-crooks can use your wireless mouse and keyboard!
Remember how the problems you had with the nightmare of tangled cables going in and out of your computer went away the day you discovered…
How to prevent your iPhone content from being lost if you forget your password
Despite being essential to protect your personal data, the security measures implemented by smartphone manufacturers to protect it from cyber-criminals can work against you. That’s…
Think your cell phone is tapped? Don’t panic!
At the end of last year, the US government put an end to the secret surveillance program carried out by the National Security Agency (NSA). …
Do and Dont’s of Cybersecurity for your business
 Do’s and Don’ts of cybersecurity for your business Train your employees. Their security knowledge will save your company from a lot of problems. Pay…