How to act in the face of cyberbullying
With a globally interconnected society, cases of harassment through the internet grow every day, although you have to know how to identify yourself when it comes to a crime orRead More →
With a globally interconnected society, cases of harassment through the internet grow every day, although you have to know how to identify yourself when it comes to a crime orRead More →
A company in information security recommended to update as soon as possible Adobe Flash Player 28.0.0.161, the latest version of Adobe released as an emergency patch due to a criticalRead More →
Google has been rewarding for years for finding vulnerabilities in some of its products. Having started the program in November of 2010, the company has recognized that it has paidRead More →
According to the information security companies, hidden cryptocurrency mining is very common lately. The boom of recent months in terms of the price of cryptocurrency and the interest of users has madeRead More →
Cybercriminals have found a new security flaw that they can exploit to install POS malware in Oracle Micros’ point-of-sale systems. Oracle has already issued updates for this problem. However, thisRead More →
2017, Google eliminated a total of 700,000 malicious applications published within its Play Store that had passed the security controls and had endangered the users of this operating system. TheseRead More →
A hacking tool that was able to give full remote control of a victim’s computer to anyone with nefarious intentions has been taken down in an international law-enforcement operation, according toRead More →
The virtual private network says it provides a way to browse the web “anonymously and privately,” but a security researcher has released code that could identify users’ names and locations.Read More →
Cisco has released new patches for a critical vulnerability in its Adaptive Security Appliance software after further investigation revealed additional attack vectors. The company first announced the vulnerability, CVE-2018-0101, on Jan. 29. ItRead More →
Security researcher tweaks exploits stolen from the NSA last year to affect nearly all versions of Windows. Exploits that were stolen from the NSA last year and which were believedRead More →