Creator of the worldwide computer network Sir. Tim Berners-Lee launched a global plan over the weekend to implement initiatives that prevent the spread of political manipulation, fake news, privacy violations, and other content that makes the online medium a non-toxic medium. Called the Web
Even with increased investment in digital security, companies still suffer from the reuse and adoption of weak passwords adopted by employees, points to LastPass by LogMeIn's 3rd Annual Global Password Security Report. The study provides insight into employee password adoption behavior and analyzes
The social networking site Twitter said this week that emails and mobile numbers sent by users to enable two-factor authentication were "inadvertently" used for advertising. According to the company, the data was not shared with third parties, but used to target ads made within the platform.
Hacker attacks on criptomoedas exchanges are more common than we would like. Robberies can range from a few billion to billions of dollars, hurting not only businesses, but also their customers and investors. Those responsible for the exchanges should stick to the flaws their systems may ha
Any company is likely to fail data security regardless of its size. Want an example? Even major players in the market, such as Amazon, Google and Yahoo, have already been affected by virtual attacks and stealth data leakage. Not coincidentally, at least eight of the ten most common data sec
Spoofing is the most popular type of hacking attack in recent times, where one person impersonates another or a legitimate company to steal data, break into systems and spread malware. Learn how spoofing works and protect yourself. The term spoofing comes from the English verb spoof (imitat
Here is a sincere question to ask you: do you know how much your digital campaigns are exposed to fraud? How secure are your data and data on your leads? How safe are the consumers who are making a purchase on your site? In digital marketing, fraud is a real problem. So real that, by 2015 a
Bluetooth, a technology present in cell phones, computers and other electronics, makes file sharing easier, but experts say it may be safer to keep it turned off. The technology was the target of a flurry of criticism at Def Con, the world's largest hacker conference, held in Las Vegas from August 8
Data breach means a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. It may involve exposure of personal information like social security numbers, credit card numbers or bank details, healthcar
By 2017, Gartner estimated that there would be 8.4 billion Internet Stuff (IoT) devices in use - a 30 percent jump from 2016. But all of this advanced, integrated technology leaves room for potential security threats such as hackers and malware. If you use a smart device, increase your safety with t
Anyone investing in or planning to invest in cryptocurrencies needs to keep in mind that one of the essential precautions to avoid problems is to reinforce care about information security. According to Galeno Garbe, Bitcoin Market CSO, just like any other online transaction, trading in virtual curre
Enter social networks and talk to friends, access that online store, browse the categories and choose the ideal product. Sign in to YouTube or Netflix to watch your favorite channels and series. Interact with the virtual assistant to know the agenda of the day and the weather forecast for the weeken
How do you feel safe? A camera installed at the entrance to the building? Alarm in the car? Walls and fences? We need certain protections to feel safe. In the digital universe, it is no different, to protect our information and maintain our privacy we need certain tools. A VPN protects our
Gartner has identified seven emerging security and risk management trends that will affect security, privacy and risk leaders in the long run. Gartner defines "top" trends as ongoing strategic changes in the security ecosystem that are not yet widely recognized, but are expected to have a b
EY Consulting, which has heard more than 1,400 executives globally, pointed out that for 54% of national organizations, the great vulnerability in the company are malicious and inattentive collaborators, while 45% said they could hardly foresee threats of data theft. The fact is that the th