OUR BLOG POST

hosting image
blog list image

These are the most common uses of a NAS for home

Home networks have evolved a lot in the last ten years. At first, our local network consisted of a desktop computer, and sometimes also a laptop. Then smartphones, Smart TVs, and Android TV devices have arrived, we also have IoT devices, home automation, and more. What is clear is that in our homes we have more and more devices connected at home. One that is gradually gaining prominence is the home NAS server, a piece of very important equipment that not only allows us to share files on the local network but also enjoy multiple possibilities. In this article, we are going to talk about the most common uses of a NAS for home.

blog list image

Hide back doors in JavaScript code with a new trick

A computer security researcher has shown how an attacker could sneak back doors into seemingly legitimate JavaScript code. It also does it without the victim, in addition to the text editors, being able to identify anything strange. It is about hiding them through invisible characters. This logically can cause important security risks, even more so if they are not detected.

blog list image

This new threat steals your Netflix, Instagram and Twitter account

There are many threats that are designed to steal user accounts on the Internet. We are talking, for example, about email accounts, social networks, banking services ... Now, they usually affect what is most used. In this case, we are talking about a new threat that is capable of stealing Netflix, Twitter, and Instagram accounts. We are going to give some tips on what to do to avoid it.

blog list image

Why a VPN Won't Prevent Many Attacks

In order to maintain safety when browsing the Internet, it is important to have certain programs and services. However, not all of them act the same. Sometimes we can think that a specific application can free us from some attacks, when its mission is different, even if it is related to security. In this article, we talk about why a VPN cannot replace an antivirus, or prevent certain computer attacks.

blog list image

Tor Browser removes support for V2 Onion URL: What does this mean?

Tor Browser is an alternative to traditional browsers. The main advantage is that it focuses especially on privacy, it treats user data in such a way that it is not leaked. In this article, we echo their latest update and how they have removed support for the V2 Onion URL. We are going to explain what this consists of and how it can affect users who use this program.

blog list image

Improve data recovery with these strategies and protect data

Whether due to attacks or accidental errors, sometimes we end up losing the data we have on our computers. If we have done the homework, the recovery of the same can be easier and more feasible. Also, keep in mind that ransomware has been on the rise in the last 12 months, so we must take seriously the task of protecting our data. When an attack of this type happens, our files are encrypted and it makes it impossible for us to use them. Then they ask us for a ransom that we should not pay because sometimes the decryption does not work well at all, and we have no guarantee that they will not do it to us again.

blog list image

How much Internet does playing online really consume?

When we browse the Internet, when using any application or service, something fundamental is the consumption of resources. For example, it is not the same to watch a video in high definition in Streaming than to simply enter a website to read a news item. In this article, we are going to focus on consumption when playing online. How much Internet are we really going to need?

blog list image

Is two-step authentication always secure? So they can break it

Maintaining security when browsing the Internet is very important. There are many factors that influence and one of them is having a good password. Now, this does not always happen. We may find that our access key is weak and has been leaked on the network. To avoid this, one thing we can do is configure two-step authentication. But is 2FA that safe ? Let's see how they can break it.

blog list image

What Matters Most When Choosing a VPN

Using VPN programs has become very common among users. We can use them both on mobile devices as well as on computers. We have many options that we can choose from, but not all of them work the same, nor do they have the same characteristics. For this reason, in this article, we are going to make a basic summary of the points to take into account when we install an application of this type.

blog list image

YouTube censors videos on ethical hacking that are for educational purposes

The popular YouTube video platform has been censoring content creators who upload videos related to cybersecurity in recent weeks, especially with videos related to how to exploit vulnerabilities and configuration errors on a certain computer. Currently, there are several platforms that provide "vulnerable" machines that are virtual, in order for users to learn how to hack a specific machine with a security breach. Pentesting work is essential to verify the security of a system, in order to protect it and improve security.