Uncategorized

    Yesterday, chaos broke out in Spain and Portugal due to an incident in the electrical grid interconnection with France and consequently with the European energy supply. As a consequence, the electricity supply collapsed, which caused a failure in telecommunications and almost immediately also in the gas and water supply. In the worst case, […]

SECURE&TIP: ATTACKS ON CRITICAL INFRASTRUCTURES Read More »

      What is AI or Artificial Intelligence? Artificial Intelligence is a functionality that new technologies are acquiring, which allows a device or medium (computer, machine, mobile, car, application, smart speaker, web, etc.) to engage in fluid communication with a person. To the point of answering questions, carrying on a conversation or solving problems,

SECURE&TIP: IA RISKS Read More »

    What do these cyber-attacks consist of? There are three types of cyber-attacks that can affect the integrity of PDF documents: & Manipulation of a legitimate PDF by infecting it with malware (malicious software). This method mainly involves, on the one hand, camouflaging conditional viruses that are installed on the computer when downloading the

SECURE&TIP: PDF CYBER ATTACKS Read More »

    What is “PHARMING”? From what has been discussed in previous TIPS, you already know about social engineering techniques, Phishing (email), Vishing (call) and Smishing (text message). Especially in the first and third of these, i.e. Phishing and Smishing, it is very common to find fraudulent links and that the cybercriminal expressly asks us

SECURE&TIP: PHARMING Read More »

        What is meant by “data in transit”? Data in transit is all information that moves from point A to point B. This movement can be by technical means (from one computer to another), or by physical means. When this is done by technical means, either because we send an e-mail that

SECURE&TIP: DATA IN TRANSIT Read More »

      Social engineering is the most widely used cyber-attack method today. And as we mentioned in the previous TIP, we would like to remind you once again of the differences between Phishing, Vishing and Smishing, so that you can be prepared and recognize any fraudulent communication in time. The objective of these three

SECURE&TIP: PHISHING, VISHING, SMISHING Read More »

      Depending on the country, the sector of activity and the people targeted, social engineering accounts for between 70% and 90% of cyber-attacks. Therefore, we would like to remind you once again what exactly it is, so that you can be prepared and recognize any fraudulent communication in time. What is social engineering?

SECURE&TIP: SOCIAL ENGINEERING Read More »

        Of all the methods used by cybercriminals to get easy money, we want to explain today the physical cloning of credit and debit cards (also known as cyber-attack of SKIMMING) and the fraudulent use of the same (called CARDING). So cybercriminals do not always use the Internet to get hold of

SECURE&TIP: CARD CLONING (SKIMMING & CARDING) Read More »

    GET EDUCATED AND INFORMED: Most of the time, when you contact us through these Secure&TIPS to ask personal or professional questions, you start the message with “I’m afraid that…”, “I am worried that…”. When do we feel afraid or worried about something? When the situation we have to face is unfamiliar, poses a

SECURE&TIP: GET EDUCATED AND INFORMED Read More »

    What are supply chain attacks? Whether our main activity is the provision of services or industrial, cyber-attacks derived from our suppliers are becoming increasingly common. Since 2021 there has been a 300% increase in this type of cyber-attacks and, in fact, it is predicted that by 2025, 45% of the attacks suffered by

SECURE&TIP: SUPPLY CHAIN ATTACKS Read More »