Monday, April 23, 2018

Playing hide-and-seek among world powers

Relations between Russia and the United States haven’t been the greatest in a long time. The ways they’re attacking each other have evolved and what several years ago were tanks soldiers and bombs, nowadays are silent attacks that affect our devices and cause unthinkable harm to companies and infrastructures all around the world. These cyber-attacks have made the world against the player playing hide and seek: Russia. 



The United States are accusing directly to the Russian Government of aiming their attacks against their organizations to interfere in their presidential elections. These days, USA and British intelligence public servants are aware that these Russian hackers are trying to penetrate personal computers in order to make future cyber-attacks.  


Friday, April 20, 2018

Unfollow to cyberattacks on your smartphone

As times passes, smartphones have become an extension of our body. We communicate by them and we show private parts of our life without knowing how many people can actually see our information. Likes, Follows and Hashtags are often used by us, letting some of our information to some companies that might not be transparent. Today, we are going to talk about this week’s main news to share with you the last information in apps and smartphones security.  


Cybercriminals have discovered a great opportunity in apps vulnerability and in the blind trust we have in them. We install applications from third parties without checking the origins and we accept terms and conditions without reading them. We post information online. Technology has become the window to society.


Wednesday, April 18, 2018

Catfish business

Online flirting, what a world. Millions of profiles are created every day in dozens of apps to find the love of your life. But, do you know who is behind those profiles? In a sea of users, there’s always the “catfish”. This happens when a person lies about their identity in social networks and it can be just for fun or looking to swindle. These profiles aren’t only in flirting apps but on every social network. There will always be someone with dishonest intentions.  



Researchers from the Ben-Gurion University in Negev and the Washington University have created a new method to discover what profiles are fake in most social networks. 


Monday, April 16, 2018

Cybersecurity, a matter of humans

“Man is imperfect but perceptible”. This can be the sentence that bests define the human kind. As humans we are imperfect, but in our own nature we have the capacity to learn from mistakes and to achieve our perfection. We can’t forget that even if we are immersing in the seas of cybersecurity, what’s moving everything online is the human factor. 




It’s common to see cybersecurity as a technic factor, but that’s far from the truth. A lot of companies trust entirely in technology when protecting their information and, occasionally, there’s the mistake. Oz Alashe, Founder and CybSafe SEO, wants to change our mind, Understanding cybersecurity driven by humans.


Friday, April 13, 2018

When the data protection goes "Des-pa-cito"

Facebook, Instagram, Twitter, WhatsApp, Youtube, VEVO, Spotify, Uber... and so many more are the apps we are using in a daily basis. As users we can only use the recreational and social side of them. But the truth is that they know about us so much more than we know about them. As the “Despacito” song said “Let me exceed your danger zones…” and most of the time, that’s what’s happening. 



You could say it hasn’t been the best week for some of the social networks mentioned. Privacy Policy is still a delicate matter that we should not take lightly.