Noticias, Consejos, Laboratorio de seguridad

What is Pretexting in Cyber Security: Facts You Need to Know

Pretexting in Cyber Security: Facts to Know

El pretexto es un tipo de ingeniería social en la que un atacante obtiene acceso a la información., un sistema, or a service

What is eWallet? How to Protect Your eWallet

Durante una época de crisis, Americans turned to digital wallets called eWallets to purchase supplies without face-to-face interaction with payment

«This Site Can’t Provide a Secure Connection»: How to Fix

Cada usuario activo de Internet ha encontrado mensajes de error al menos una vez., especialmente los relacionados con la seguridad. Por ejemplo, el «This site can’t

42,000 Sites Generate Ad Traffic Pretending to Be Famous Brands

El grupo chino Fangxiao ha construido una enorme red de 42,000 Sitios web que se hacen pasar por marcas conocidas. (incluyendo coca cola, McDonald's,…

MSIL/Microsoft.Bing.A Detection (BingWallpaper.exe)

A lot of users on different forums complain about MSIL/Microsoft.Bing.A detection in ESET antivirus. This detection points to BingWallpaper.exe file

Farewell Windows 7 updates

Microsoft released farewell updates for Windows 7 and Windows Server 2008

En enero 14, 2020, Microsoft dejó de dar soporte a Windows 7 para…

Fancy Bear attacked Burisma

Fancy Bear Attacked Ukrainian Oil And Gas Burisma Company

oso de lujo, also known as APT28, orchestrated an attack on

Cable Haunt Threats Broadcom

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Danish researchers have published a report on the Cable Haunt

Researcher remotely hacked iPhone

Researcher remotely hacked iPhone using only one vulnerability

Researcher in a few minutes remotely hacked iPhone using only

Researchers hacked TikTok app

Researchers hacked TikTok app via SMS

Check Point experts found many issues in one of the

Homeland Security and Iran cyberattacks

US Homeland Security warns of possible cyberattacks by Iran

Homeland Security USA issued a warning about possible acts of

Shitcoin Wallet for Google Chrome

Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys

Una de las extensiones para Google Chrome, Shitcoin Wallet injects

Emotet topped the threat rating

Emotet topped the rating of the most common threats in 2022

Cualquiera.Ejecutar, interactive service for automated malware analysis has compiled a

ToTok turned out to be a tracking tool

ToTok messenger turned out to be a tool for total tracking

The New York Times reported that the ToTok messenger turned

Perfect encryption system presented

Perfect encryption system presented by team of scientists from three countries

An international team of scientists from the University of St.

MyKingz uses Taylor Swift

MyKingz botnet uses Taylor Swift photo to infect target machines

Sophos researchers noticed that the MyKingz botnet, también conocido como…