OUR BLOG POST

hosting image
blog list image

Microsoft warns of a new technique to sneak Phishing

Phishing attacks are a method widely used by hackers to steal information and passwords. Basically, it is a strategy that consists of launching a bait in order for the victim to put in their data and thus obtain the keys. In this article, we talk about a warning from Microsoft, where they report the increase in the technique through what is known as HTTP Request Smuggling.

blog list image

Have you bought PLC to improve Wi-Fi? Follow these tips

In order to improve the performance of wireless networks, we can take into account certain tips. For example, we can find a better location for the router, we can choose the appropriate band or avoid obstacles. But sometimes that is not enough and we have to use other devices to help us. In this article, we are going to talk about PLCs, how they improve the Wi-Fi connection and what to do to use them correctly.

blog list image

Allegedly companies do not know how to use a VPN correctly

Using a VPN is very interesting in certain circumstances to improve security and privacy. For example, to connect to a public Wi-Fi network and prevent anyone from seeing what we send or receive. However, you have to avoid making certain mistakes. In this article, we talk about a report that alerts about how companies do not know how to properly manage VPNs and that exposes them.

blog list image

This threat attacks any home device connected to the Internet

Any device that we have connected to the network can suffer a cyber attack at any given moment. Although we almost always focus on protecting the computer or mobile, the truth is that there is malware that could put equipment such as a television or video player at risk. In this article, we talk about a new threat, the BotenaGo botnet, which is capable of putting millions of IoT devices of all kinds at risk.

blog list image

These are the most common uses of a NAS for home

Home networks have evolved a lot in the last ten years. At first, our local network consisted of a desktop computer, and sometimes also a laptop. Then smartphones, Smart TVs, and Android TV devices have arrived, we also have IoT devices, home automation, and more. What is clear is that in our homes we have more and more devices connected at home. One that is gradually gaining prominence is the home NAS server, a piece of very important equipment that not only allows us to share files on the local network but also enjoy multiple possibilities. In this article, we are going to talk about the most common uses of a NAS for home.

blog list image

Hide back doors in JavaScript code with a new trick

A computer security researcher has shown how an attacker could sneak back doors into seemingly legitimate JavaScript code. It also does it without the victim, in addition to the text editors, being able to identify anything strange. It is about hiding them through invisible characters. This logically can cause important security risks, even more so if they are not detected.

blog list image

This new threat steals your Netflix, Instagram and Twitter account

There are many threats that are designed to steal user accounts on the Internet. We are talking, for example, about email accounts, social networks, banking services ... Now, they usually affect what is most used. In this case, we are talking about a new threat that is capable of stealing Netflix, Twitter, and Instagram accounts. We are going to give some tips on what to do to avoid it.

blog list image

Why a VPN Won't Prevent Many Attacks

In order to maintain safety when browsing the Internet, it is important to have certain programs and services. However, not all of them act the same. Sometimes we can think that a specific application can free us from some attacks, when its mission is different, even if it is related to security. In this article, we talk about why a VPN cannot replace an antivirus, or prevent certain computer attacks.

blog list image

Tor Browser removes support for V2 Onion URL: What does this mean?

Tor Browser is an alternative to traditional browsers. The main advantage is that it focuses especially on privacy, it treats user data in such a way that it is not leaked. In this article, we echo their latest update and how they have removed support for the V2 Onion URL. We are going to explain what this consists of and how it can affect users who use this program.

blog list image

Improve data recovery with these strategies and protect data

Whether due to attacks or accidental errors, sometimes we end up losing the data we have on our computers. If we have done the homework, the recovery of the same can be easier and more feasible. Also, keep in mind that ransomware has been on the rise in the last 12 months, so we must take seriously the task of protecting our data. When an attack of this type happens, our files are encrypted and it makes it impossible for us to use them. Then they ask us for a ransom that we should not pay because sometimes the decryption does not work well at all, and we have no guarantee that they will not do it to us again.