10 Tips to Avoid Viruses on Halloween
Halloween is one of the most celebrated holidays, and cybercriminals always want to be part of it. As we get closer to Halloween, hackers…
How a drone can hack into your home’s network just by flying over it
Drones can be used to record incredible scenes for movies, to follow thieves from above, to save lives, or to carry out home deliveries at…
How to protect your company from Zero-Day attacks
Any attack that takes advantage of the “window of opportunity” produced by recently discovered vulnerabilities is called a Zero-Day attack. In other words, a rapid…
Pay with Bitcoins to save a hacked phone? It’s a scam!
The Telematics Crime department of Spain’s Guardia Civil has warned of a new type of fraud which affects mobiles. This new operation consists of cybercriminals…
5 security measures that experts follow (and so should you!)
When you’re watching a movie and you see the typical computer screen filled with green coding (you know the type, rows of 1s and 0s)…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
The lessons we’ve learnt from the Ashley Madison leak
The shockwaves that were caused by the massive leaking of user information from the online dating site Ashley Madison can still be felt. The attack…