The main information security certifications for businesses
Just being aware of all the headlines is enough to realize that new threats and vulnerabilities in the field of information security are constantly emerging.…
Pay with Bitcoins to save a hacked phone? It’s a scam!
The Telematics Crime department of Spain’s Guardia Civil has warned of a new type of fraud which affects mobiles. This new operation consists of cybercriminals…
Google takes the fight to Ransomware
It’s becoming more and more common for malicious applications on Android to use this old form of attack. Just like their famous predecessors that went…
How the Internet of Things will change cybersecurity as we know it
Analysts have been saying for a long time that the Internet of Things (IoT) is about to become a fundamental element in the transformation…
Has the dislike button finally arrived to Facebook? Of course not, don’t be fooled!
It’s been a few weeks since Mark Zuckerberg revealed that Facebook was working on incorporating the much awaited dislike button into its website, finally allowing…
Keeping tabs on your employees in a multi-device environment
The traditional desktop computer is no longer the only device we use to get work done. For the past few years workers have increasingly begun…
5 security measures that experts follow (and so should you!)
When you’re watching a movie and you see the typical computer screen filled with green coding (you know the type, rows of 1s and 0s)…