Privacy and security challenges when adopting cloud technology  

The implementation of technologies based on the infrastructure of the cloud in corporate environments is a reality. The many advantages of this type of...

Four simple tips to do a ‘back-up’

If your phone is suddenly damaged or if you try to use your computer one morning it asks for a password that you do...

ESET Internet Security 2018: An effective software against viruses

ESET Internet Security 2018: An effective software co ESET Internet Security 2018 is an effective defense software for computers with Windows operating systems, against...

Cybersecurity: the weakest link is the end user

Cybercrime, online scams, computer attacks, massive hacking. These terms, which refer to the different types of digital threats to which we are all exposed...

Five ways that attackers target gamers

Lets recall one of the largest cyber attacks in history, which affected PlayStation Network in 2011 and had shocking results: the data of 77...