CYBERSECURITY

Cybersecurity – Threat vs Vulnerability And How To Differentiate Them

Definition of vulnerability and threat According to the RAE, the term vulnerable (from Latin: Vulnerabĭlis) means: «adj. That he can…

3 years ago

Macro Malware The Hidden Threat In Word And Excel Files: Here Are The Tips From Cyber Attack

They are called malware macros and are malicious programs hidden in the macros of Word documents or Excel spreadsheets that,…

3 years ago

Artificial Intelligence As A Leading Technology Between Cyber Defence And Cyber Attack

To counter modern cyberattacks, which are increasingly complex, antivirus or simplified solutions are no longer enough. Still, cutting-edge cyber defense…

3 years ago

5 Tech-tips To Protect Your Smart Home From Hackers

By 2020 there will be around 45 million smart homes in the US alone, according to one report, 28 percent…

3 years ago

Know Everything About Phishing And Its To Better Avoid It

92% of attacks start with a phishing email: a figure that does not decrease despite the measures implemented and awareness-raising…

3 years ago

Why We Don’t Stand A Chance At Beating Cybercrime Without Ethical Hackers

Cyber crime is everyone’s problem. In the hyper-connected world that we currently live in, everyone is connected to each other…

3 years ago

Facebook: 267 Million Accounts On Sale On The Dark Web For €500

The personal data of more than 267 million Facebook accounts are for sale on the Dark Web. This information is…

4 years ago