The UK government has been working on a bill that would grant Ofcom, the government telecommunications agency, the possibility of fineing large social networks.
h the new contactless card systems, payment is made more convenient and business arrangements are quicker, but different techniques to hack cards and steal as much money as possible begin to emerge.
Google has just announced that it will increase the security of the products and services included in G Suite (a package of web applications so that companies can manage their business, including services such as Gmail, Calendar, Google Docs, Google Sites…) , as well as in Google Cloud Platform and Google Cloud Identity.
Tinder has launched a feature called Traveler Alert to keep its users safe in almost 70 countries that have discriminatory LGTBI laws.
Liam Booth, head of personal security for Mark Zuckerberg, founder of Facebook, has been accused
A new day, a new security scandal for Facebook. On this occasion, it affects his social photo network, Instagram.
If you have ever burned with the desire to know which people have seen your WhatsApp profile picture, we tell you what options exist with respect to this section and what red lines Zuckerberg’s have to know it.
After the Cambridge Analytica scandals, Facebook announced the launch of a tool that would allow users to remove all the history of data contained in the platform.
Virtual assistants are increasingly popular: only Google Assistant already brings together almost 1,000 million users on its platform.
Instagram will incorporate a new rule when determining when an account should be deleted.
2018 was the year in which there was a greater number of security threats in history and the forecasts for this year are not at all promising.
In Germany, the authorities have managed to put an end to the Wall Street Market, the second largest market in the world of the dark web, in which drugs, stolen data and malware are commercialized.
Navigators change from year to year, the one that is pointer one day can become obsolete in a matter of months.
We tell you how much Microsoft pays to ethical hackers who detect vulnerabilities in their software through the HackerOne rewards program, founded in 2012.
The pendrives or USB memories are an increasingly attractive flank used by hackers to cyber attack companies through malicious code, as pointed out in a recent Trend Micro report.
Spyware is similar to a gray area, since there is not really a manual definition.
A Trojan horse is a type of malware that is often camouflaged as legitimate software.
Every day new dangers appear on the Internet and cybercriminals use more sophisticated techniques to deceive Internet users and gain control of their computers, access personal information and, in addition, enrich themselves by requesting users a certain amount of money.