Digital Education Digital Identity Fatigue: Too Many Logins, Too Little Control Jan 23, 20263 min read
Threat Prevention Can hackers eavesdrop and track people via Bluetooth audio devices? Jan 19, 20263 min read
IOT Apple Watch: nothing prevents thieves from resetting the password and using a stolen one (even for shopping) Jun 10, 2015
Social Media Tinder, the app where you can have your heart stolen, but also your information and your pictures Jun 1, 2015
Our Products Adaptive Defense 1.5, the enterprise solution that seeks security against advanced and targeted attacks Apr 13, 2015
Tips and Best Practices Ugly Mail: How to know if your emails are being tracked Apr 13, 20153 min read
Threat Prevention What is Cloud Computing and how it will boost your business – Infographic Mar 23, 2015
Tips and Best Practices Can they spy on you through your smartphone microphone? Dec 29, 20144 min read
News and latest trends More controversy for Uber: The app compiles user data without permission Dec 12, 2014