EDR technology – much more than just standard protection
Traditional viruses, defined as executables that were sent en masse to cause infection on a large scale, are already controlled by protection systems (Endpoint Protection…
Everything that could go wrong when you send an unencrypted email (and how to avoid it!)
Everything that you send in an email, from the attachments to the text, goes on a dangerous journey every time that you click send. Its…
Virus in the name of WhatsApp! Now via email!
WhatsApp – Você recebeu uma menssagem de voz… Have you also received this notification and understood it to mean that you have a voice message in…
Ashley Madison. Should your company invest in cyber insurance?
What started out as a dating site – albeit a controversial one at that – has turned into a nightmare. Ashley Madison, a dating site…
The most sought-after professional profiles in the information security sector
Direct attacks, identity and information theft of all sorts (especially social engineering), persistent advanced threats… the risks associated with information security are continually multiplying in…
Six challenges for the Chief Information Security Officer
The increasingly complex landscape that society’s mass digitization has established, driven by mobility and permanent connectivity, coupled with the new risks and threats that are…
How can I stop people from connecting to my Wi-Fi?
Paying for a fast and reliable Wi-Fi connection at home only to find out that your neighbor is stealing the signal from you is pretty…