Latest Info

hosting image

Why Young People Are Worse With Cybersecurity

Maintaining security on the network is essential at all levels and this also applies when working. However, in many cases, it is the workers themselves who make mistakes that can expose the organization's data or even their own. In this article, we echo a report that shows how not all ages act the same when faced with cybersecurity. In fact, the youngest are the ones who make the most mistakes.

blog list image

Meet the first WiFi Mesh system with 5G coverage

To improve Internet coverage we can use different types of devices. For example, we talk about repeaters, PLC devices, or also Mesh systems. We are going to talk about this last case in this article, and it is that Netgear has just launched the first with 5G coverage. It is specifically the Orbi NBK752 5G model. We are going to explain what it is and why it can be interesting.

blog list image

Could your Amazon account be easily hacked?

E-commerce has gained a lot of weight in recent years and without a doubt a very popular platform is Amazon. This inevitably means that there are many cyber criminals who set their sights here and look for a way to attack and obtain profit. Now, is it really possible that our Amazon account is stolen? Is it that simple? In this article, we are going to see what methods they could use and in this way be as protected as possible.

blog list image

Google devised a plan to bring down AdBlockers

Google has shared the innovations that follow with the Manifest V3 specification for Chrome Internet browser and will be valid from January 2023. What can be noticed first is the disabling of several add-ons, including the one for blocking ads ).

blog list image

Is it slower to navigate through DNS over HTTPS?

There is no doubt that having a good internet speed is a very important factor today. Every time we connect more computers to the network and make use of more and more services. Social networks, email, surfing, watching streaming videos ... Everything consumes resources. Now, in order for it to work quickly, different factors come into play and not just the rate that we have contracted. If we browse through DNS over HTTPS, will the connection be slower? We talk about it in this article.

Do you spend more internet data to use a VPN?

It is very common to use a VPN to surf the Internet on both mobile and computer. There are a large number of options available, although not all of them are going to work the same. In this article, we are going to talk about a question that many users ask themselves: Is more data consumed when browsing with a VPN?

blog list image

Why an Access Point Doesn't Act as a Router

In order to connect to the Internet, we can have different devices and methods. We can talk about wireless or wired networks, for example. Also differentiate if we connect directly to a router or through a third device, such as a Wi-Fi repeater. In this article, we are going to talk about why an access point cannot act the same as a router.

blog list image

How to automatically reject cookies in Chrome

When browsing the Internet there is something that has become very common: the message of accepting or rejecting cookies. It is something that we find whenever we enter a page that we had not previously accessed from that device or browser. Although we are already used to it, the truth is that it can be annoying at times. So could we accept or reject all cookies automatically? There is this possibility and we are going to talk about it in this article to be able to achieve it in Google Chrome.

blog list image

What 2FA applications are there to protect account security?

We must always protect the security of our accounts on the Internet. There are many factors that can cause risks that compromise our personal data and passwords. For example, Phishing attacks, keyloggers that can steal passwords, data leaks ... We can prevent unwanted intruders from entering our accounts through different methods and one of the most important is two-step authentication. We are going to explain why it is essential today and we are going to talk about some applications that we can use.

blog list image

Network spoofing: know what it is and how to detect it

One of the problems that we can face when we connect to Wi-Fi is what is known as network spoofing. It is something that can be present in many places without our knowing it. For example in public places such as an airport, shopping center, or even parks. They can also be in restaurants, universities, work centers ... It is a problem that can put our safety at risk, as we will see. We will explain what it is and also how to detect spoofing.