-
These are the differences between vulnerability and threat.
These are the differences between vulnerability and threat. Although there are many people that use them as synonyms, in reality they are two different things, related but different. Published in Computerhoy.com by Sandra Arteaga Today, with the news related to cyber-security in all the covers, we're more...
-
5 ways to spot an email phishing, the scammers are constantly evolving.
The scammers of this malware are constantly evolving, and their methods are becoming more crafty and difficult to locate. Published in PCworldenespanol.com by William Peña No one wants to believe that he is the victim of a phishing scam, but the...
-
How to create a secure password, according to science to protect us.
Every precaution is little to prevent us from stealing the account in the social networks, email, and other services and applications. Published in Computerhoy.com by Sandra Arteaga Every precaution is little to prevent us from stealing...