Internet Security


iPhone 6. The fingerprint reader security

Being the leading technology brand can have its downsides. And if you don’t believe it, ask Apple. Every time the firm from Cupertino introduces a new product, the same thing happens: there is great anticipation, with seemingly half the world...


200,000 Snapchat images leaked

After Celebgate, the leaking of private photos and videos of Hollywood actresses and models such as Jennifer Lawrence, now users of Snapchat have seen the security of their files compromised. Snapchat is a mobile app for sending images and messages...


How do cookies work?

We all know the ‘Allow cookies?’ message. This option now appears in practically all websites. In fact, nowadays more people associate the term ‘cookies’ with its Internet use rather than with its edible origin. Cookies are small data...


The Craigslist scams

Craigslist is a website hosting classified ads for jobs, houses, cars… To give you an idea, there are around 10 million new Craigslist ads every month. As sometimes happens with these kinds of pages, Craigslist has become a hunting ground for...

bounty programs - hackers

Twitter has joined the Bounty Programs. Now only Apple remains.

In the technology world, it is now quite common for companies to reward the efforts of those advanced users who dedicate some of their time to uncovering security holes in their programs or platforms. Although there are still some who are yet to be...