OUR BLOG POST

hosting image
blog list image

Deepfake: what is it and how does it affect biometric identity

Deepfake is a program to falsify videos and images through Artificial Intelligence . For example, it can modify a video and make you believe in something fake, or modify a photograph to make it look like another person or another place. We can even find audios that are false and have been modified. This can logically be a problem for the security and privacy of users, as we will see.

blog list image

Can the Ethernet connection work worse than Wi-Fi?

If we want to achieve the best speed in the domestic local network, the main recommendation that is made is that you always connect your devices via Ethernet network cable , in this way, you will achieve the maximum possible stability and the best reliability. However, in certain cases you may have problems connecting your equipment via network cable, and even WiFi works much better than using network cable. Today we are going to explain why it can happen and how you can solve it.

blog list image

Twitch was hacked and all the data filtered, change the password now

The popular live streaming service Twitch has been affected by a massive data leak that contains a large amount of information from the platform's streamers, that is, they have been hacked and all the data obtained has been published. The data that has been leaked and that is already circulating on the Internet is the source code with the comments for the website and also for the versions of smartphones and consoles, references to competitors have also been filtered, payments made to streamers, and even hashed passwords. Do you want to know everything that has happened?

blog list image

Who is behind the biggest crash of Facebook and WhatsApp in history?

Yesterday Facebook has left 50,000 million dollars in the stock market, mainly due to the largest global crash it has suffered in its history, and from which it has not currently recovered. Around 5.30 p.m. all Facebook services, including the social network itself, Facebook Messenger, WhatsApp, and also Instagram were down. All this is due to a failure in the DNS services that Facebook itself has, the DNS records that lead us to the different Facebook services are completely down, these domains have literally disappeared from all the DNS servers in the world, and you can't access any Facebook domain or other services.

blog list image

LANtenna Attack, use network cables to create wireless signals and steal data

At a domestic and business level, it is much safer to use Ethernet network cables than WiFi connectivity, for this reason, all servers, and computers that move sensitive information use a network cable to connect to a switch, which is correctly configured to avoid or mitigate the main attacks on networks, and avoid information theft. A group of researchers has discovered how to create wireless signals through an Ethernet network cable, with the aim of stealing information, this new attack is called LANtenna Attack.

blog list image

QR codes: can they be dangerous?

There are many methods that can be used to infect devices or steal data when we browse the Internet and one of them can be through a simple QR code. Hackers can generate codes solely for the purpose of sneaking malware into our devices or getting our information. Let's see what types of common attacks they can achieve and how to be protected.

blog list image

Is it possible to be anonymous on the Internet and not appear on Google?

It is very common that when searching our name or even ID in Google, results appear. For example, if we are on a list of admitted in a course if you have indexed the profile of a social network, etc. Sometimes this is not of interest and in this article, we will explain what we can do to prevent our data from appearing published on the Internet and indexed in the search engine so that anyone can see it.

blog list image

Congested networks: what it is and how it affects us

Network congestion is a problem that can affect both domestic and professional networks. We are going to explain what it consists of and how it can put the proper functioning of the connections at risk. It is always important to achieve optimal speed, avoid coverage problems and failures when connecting devices to the network. But sometimes this is not possible and we have difficulties with correct navigation.

blog list image

Backdoor Trojan: what is it and how to avoid it

When using a computer, mobile, or any device connected to the network, there are many threats that we can find. There are many types of viruses, Trojans, and malware in general. Obviously not all act the same and it is important to know to what extent they can damage the operation of a computer, steal data or infect other devices on the network. In this article, we are going to talk about backdoor Trojans. We will see how they work and what to do to avoid them.

blog list image

Secure HTTPS connections? Almost all threats come this way

When browsing the Internet we can find pages that are both HTTP and HTTPS. The latter are considered safer and the truth is that it is so on paper. They are websites that encrypt content and prevent information from leaking if, for example, we are connected from an insecure public network and we log in. Now, are we really going to be 100% safe browsing these pages? The truth is that no. In fact, as we are going to see, most malware takes advantage of HTTPS sites.