OUR BLOG POST

hosting image
blog list image

Does it have benefits to register on websites without passwords?

We constantly use passwords to log into social networks, enter bank accounts or simply turn on the computer. However, in recent times, what is known as passwordless has increased more and more, which basically means that we can log in or access a device without having to enter a password. What are the advantages of this? Is it better to avoid having to enter passwords?

blog list image

DuckDuckGo wants to help protect your Android devices

Know it or not, apps on Android smartphones track user activity and then send their data to a “third party”. DuckDuckGo wants to break something like that and on that occasion introduced the App Tracking Protection feature.

blog list image

Microsoft Edge gets price tracking and stolen password functionality

Microsoft plans to add a new way of tracking prices to the Edge Internet browser, along with a feature that will easily offer to change passwords that "leaked" online, which gives an added plus for a browser that is slowly but surely becoming the second choice for most users across of the world.

blog list image

Google Chrome is performing an urgent update to fix several security vulnerabilities

CERT.in has warned Chrome users of five security vulnerabilities that attackers could take advantage of.

blog list image

Microsoft Defender gets anti-ransomware protection powered by artificial intelligence

Microsoft has added a new layer of protection to its Defender, which with the help of artificial intelligence manages to prevent ransomware attacks.

blog list image

Microsoft blocks other Internet browsers from opening Edge links

When Microsoft introduced the Windows 10 operating system on July 29, 2015, one of the things that was new was the classic version of the Edge Internet browser, which replaced the outdated and unpopular Internet Explorer. But somehow they seem to be making identical mistakes in the American company.

blog list image

Hackers from four countries began attacking systems around the world

It is feared that millions of servers could be vulnerable to intrusion by malicious hackers

blog list image

Do you want to improve your privacy when using Google Maps?

Privacy is a very important factor and one that we must always keep in mind. However, sometimes we use programs or services that collect data without our knowledge. Leaks may arise and that personal information ends up in the wrong hands or that we simply do not want to be recorded. In this article we are going to talk about Google Maps , something widely used today, and how we can improve privacy .

blog list image

Malicious Internet Activity Hot Spots According to DomainTools

The online infrastructure allows us to enjoy many services that we use on a daily basis. One of the ones we use the most is email providers, but we also visit websites that are hosted on different domains. That does not mean that there are some places on the Internet that are used in a harmful way against our computers. Sometimes we can see how threats such as phishing and spam are often linked to specific domains. If we can understand how to detect them then it can help strengthen our threat intelligence. In this article we are going to look at the hot spots of malicious activity on the Internet.

blog list image

Four companies hold 67% of the world's cloud

According to data collected by the Sinergy Research Group, the four companies own 67% of the global cloud market, worth $ 130 billion.