Uncategorized

  “The cybercriminal has learned to write without faults.“ What is “Phishing”? Phishing is one of the cyber-attack techniques within social engineering, which we talked about in last week’s TIP. The term “Phishing” derives from the English word “fishing” and is always related to the capture of data and information through the use of e-mail […]

SECURE&TIP: FRAUDULENT PHISHING E-MAILS Read More »

  “More than half of the discounts, are fake.“ Every year the Christmas season is getting closer and closer and the so-called BLACK FRIDAY and CYBER MONDAY discounts are already announced. That’s why we wanted to bring this TIP forward and send it to you before you are exposed to false discounts or frauds and

SECURE&TIP: FALSE DISCOUNTS Read More »

  “Be the best version of yourself“ Why is it important to update? As cyber-attack techniques and types of existing viruses are constantly improving and evolving, the technology companies from which we buy computers, phones, tablets and all kinds of digital products, are forced to constantly correct bugs and make security improvements, to continue to

SECURE&TIP: UPDATING IS PROTECTING YOURSELF Read More »

  “Saying you don’t care about privacy because you have nothing to hide, is like saying you don’t care about free speech because you have nothing to say.” All holders have the following rights regarding the use of our personal data by third parties, known as ARCOPOL or SOPLAR rights: Access: That we may request

SECURE&TIP: DATA PROTECTION RIGHTS Read More »

    “Amateurs hack systems, professionals hack people.” What do cyber extortion attacks consist of? Most often we receive an e-mail sent to ourselves from our own e-mail account or from an unknown e-mail address. In this e-mail the cybercriminal alerts us that he has had access to our devices and, therefore, has both confidential

SECURE&TIP: TRICK OR TREAT? Read More »

    “Don’t learn about security by accident.” Can cybercriminals harm us on a physical level? When we talk about cyber-attacks, we always associate them with risks in the use of new technologies and especially the Internet. However, on some occasions, when a cyberattack is directed at a specific company, entity or individual, the cybercriminal

SECURE&TIP: PHYSICAL SECURITY Read More »

    “True security is only found in privacy.” Personal data, that information that makes us different from other people and that allows us to identify ourselves, must be protected both by ourselves and by third parties who may have access to it. It is not always easy to know how a company or entity

SECURE&TIP: PERSONAL DATA PROTECTION Read More »

    “Every scam is driven by a desire for easy money. It’s the one thing the scammer and the scammed have in common.” Pyramid schemes have always existed. In the 80’s and 90’s it was very fashionable to receive the typical invitation to a mattress exhibition, which turned out to be a hook to

SECURE&TIP: PYRAMID SCAMS Read More »

    Cybercriminal: “You’ve been hacked and I have ALL your passwords.” User: “Oh that’s nice, thank you very much, can you share them with me? I don’t remember them.” At Ciberseguridad we are aware that it is difficult to memorize both personal and professional passwords, and that they are also different for each app,

SECURE&TIP: PASSWORD MANAGERS Read More »

      “The best way to know if a piece of content has been generated by an AI is precisely to ask an AI.“ At the request of some readers, we send you again a SECURE&TIP related to Artificial Intelligence, still very unknown to many people. For us, as experts in Cybersecurity, the most

SECURE&TIP: DETECTS IF IT IS IA OR NOT, IN SECONDS Read More »