We need more time than usual to spend with family and friends, deleting viruses of their computers and hacking the cleaning robot to obey our orders. Remember that this year is binary palindrome and this doesn’t happends every day, so start…
We need more time than usual to spend with family and friends, deleting viruses of their computers and hacking the cleaning robot to obey our orders. Remember that this year is binary palindrome and this doesn’t happends every day, so start…
Everyday, in our digital live, we have to introduce our credentials several times. And all we only need a magic word to access: your password. Unfortunately, if we want to make this magic word secure and hard to guess, it…
Many of you may be wondering what exactly is this type of attack, discover two of the most used techniques of social engineering (Traditional SE and Reverse SE). At the beginning of the last decade, an interesting film based on the novel titled Takedown appeared…
Why I think we need to bring back the user to the security and privacy scenario Every nerd who is reading this piece of my mind is probably thinking: “Man! That’s a cool reference to the hilaros bad translation of…
Although you think your wireless network is the most secure in the world, I am sorry to disappoint you but it’s pretty unlikely. If you follow security guidelines, congratulations , you are among the select group of people who pay…