The Best 5 Identity Theft Monitoring Services in 2021
From social media profiles to credit card and Social Security numbers, there’s no limit to the volume of personal information you can find online. A thief easily has accessRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
From social media profiles to credit card and Social Security numbers, there’s no limit to the volume of personal information you can find online. A thief easily has accessRead More →
New vulnerabilities are exploited every year. And while we have plenty of software and apps that can protect everyday devices like smartphones and laptops, the same can’t be said forRead More →
Alphabet Inc., through its cybersecurity subsidiary Jigsaw, announced the launch of Outline, a project that allows any user to create and run their own virtual private network (VPN) server toRead More →
The information stored on a computer does not always end up on permanent storage drives (hard drives, solid-state drives, removable storage, among others), but is also stored in RAM, asRead More →
When searching for torrents on the Internet it is necessary to use specialized search engines but how to know which is the best? How many options are available? This time,Read More →
Not many people know it, but it’s very easy to get in the way of a phone without the owner having any idea what’s going on. This time, mobile securityRead More →
In this tutorial, experts in ethical hacking from the International Institute of Cyber Security (IICS) will show you how to send thousands of spam SMS messages to any user directlyRead More →
Vulnerable deployments remain one of the main attack vectors. This time, pentesting experts from the International Institute of Cyber Security (IICS) present with clear examples one of the ways toRead More →
A WiFi jammer is a device or software that performs a WiFi de-re-extension attack. It is a type of denial of service (DoS) attack established between communication from a deviceRead More →
Public organizations and private companies around the world use website blocking tools as a simple method to prevent employees from wasting time on entertainment platforms, social media, or any otherRead More →
For several years the interception of mobile communications has become an important field for the defense industry. The “Five Eyes” group, an intelligence alliance between Australia, Canada, New Zealand, theRead More →
A cybersecurity company says it has found a hacker selling internal documentation of Pagofx. Pagofx is backed by Santander and works as its International Money Transfer service. Launched in April 2020Read More →
Airlines and hotel chains are attractive targets for cybercriminals, as they can earn great rewards by attacking these platforms, not forgetting that some of these platforms have their own vulnerabilityRead More →
Although when buying a new smartphone most users focus on material quality, number of cameras or design, experts from a cyber security audit firm ensure that device security should beRead More →
Alert on massive fraud of cryptocurrencies in Twitter accounts, related to Covid-19. That successful scam has raised more than $ 50,000 at the moment, this consists of requesting money throughRead More →
If you are into mobile gaming, then you would like this article. Here, you will find the best Game Hacker Apps. This will help you get rid of all theRead More →
Facebook is the most popular social network worldwide, with 2.5 billion active users per month. On facebook, users share personal, social, political, economic and entertainment information. It is a networkRead More →
As you might know, a data breach happens almost every day. Digital forensics involves the preservation, acquisition, documentation, analysis, and interpretation of evidence from various storage media types. Forensics has evolvedRead More →
Sometimes we need a proxy to quickly and anonymously access some information online. Here we will tell you 10 of them that you can use for free. First, let’s understandRead More →
CVE-ID: CVE-2019-11048 Exploit availability: No Description The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to the way PHP handles longRead More →