Home Tech News Cybersecurity

Cybersecurity

Can a wallpaper block your mobile? Yes, and here is an example

It is not the first time that we have heard that a threat reaches a mobile phone through an image and it is that,...

Immune, a fake email causes a virus to be downloaded instead of the Coronavirus app

On the day the news emerges that the Immuni app could already arrive on iOS and Android today, Agid-Cert, the structure of the Italian...

Piracy and ebook on Telegram: AGCOM closes 26 channels for copyright infringement

After the counter-offensive to the Telegram channels that published newspapers, AGCOM moved the radars to the illicit distribution of ebooks and books in other...

Android smartphones, uninstall these apps: dangerous spyware discovered

Here we go again: after the huge list last time, security experts have discovered others applications downloadable from the Google Play Store to uninstall...

Google Chrome now allows blocking abusive notifications

Version 84 of Google Chrome, both desktop and mobile, has introduced a novelty that will soon move to the stable version: the...

Most Commented

Android smartphones, uninstall these apps: dangerous spyware discovered

Here we go again: after the huge list last time, security experts have discovered others applications downloadable from the Google Play Store to uninstall...

We don’t have IPv6 yet and the industry announces that it is already working on IPv6 +

The IPv6 It is the protocol that is called to solve all the address allocation problems that we are currently experiencing. Although it is...

Android smartphones, uninstall these apps: dangerous spyware discovered

Here we go again: after the huge list last time, security experts have discovered others applications downloadable from the Google Play Store to uninstall...

Adidas and Nike together against racism: historic retweet on Twitter!

Nike and Adidas go down together to fight racism. The two clothing brands joined in memory of George Floyd, whose killing kicked off a...

Netflix secret codes in 2020 (updated list)

Sometimes it is difficult to find something that we really want to see on Netflix, but with these secret codes, you will have it...

BioShock: The Collection, Review for Nintendo Switch: heaven in your hands

The umpteenth trip to Rapture and Columbia, for the first time on a Nintendo console and a portable console, has been resolved with a...

Apple glasses already have a price and approximate launch date

It is not the first time that a company thinks of glasses as the perfect place to carry another computer that digitizes our real...

USB anti 5G for 350 euros and anti radiation stickers: the scam of the century?

There is a lot disinformation, hoaxes and false data related to the 5G and radiation. There are even those who believe that 5G has...

Find out how much your mobile applications track you with Exodus Privacy, a privacy analyzer

Each application on your mobile not only asks for permissions to function, it also uses tracking systems or 'trackers' to analyze how you use...

What security risks can we expect in the post-Covid-19 stage?

Companies will have to develop better risk detection policies and be more attentive to new and recurring attacks. The Covid-19 pandemic will affect not...

ETTV and ETHD stop uploading series and movie torrents to download

The torrent downloads they are more organized than you think. While anyone can create a torrent with any file, for movies, series and other...

Security bug in Thunderbolt ports: how to find out if your PC is affected

New research published by Bjorn Ruytenberg of the University of Eindhoven has unveiled one series of security holes in the Thunderbolt standard, which would...

Microsoft Word and PowerPoint for iPad introduce the Split View function

Microsoft has recently released a new update for its Office suite, including Word, PowerPoint and Excel apps. In particular, Word and PowerPoint for the...

Hospitals and health care centers targeted by cybercriminals

Among the reasons that lead cybercriminals to attack this type of institution are: the theft and commercialization of patient information. At a time when health...

Dark web: what products and services do cybercriminals offer

A cybercriminal group is made up of at least 10 people, each with different roles and tasks. Cybercriminal structures are becoming more complex and the...

Editor Picks

Can a wallpaper block your mobile? Yes, and here is an example

It is not the first time that we have heard that a threat reaches a mobile phone through an image and it is that,...

Immune, a fake email causes a virus to be downloaded instead of the Coronavirus app

On the day the news emerges that the Immuni app could already arrive on iOS and Android today, Agid-Cert, the structure of the Italian...

Piracy and ebook on Telegram: AGCOM closes 26 channels for copyright infringement

After the counter-offensive to the Telegram channels that published newspapers, AGCOM moved the radars to the illicit distribution of ebooks and books in other...

Android smartphones, uninstall these apps: dangerous spyware discovered

Here we go again: after the huge list last time, security experts have discovered others applications downloadable from the Google Play Store to uninstall...

Google Chrome now allows blocking abusive notifications

Version 84 of Google Chrome, both desktop and mobile, has introduced a novelty that will soon move to the stable version: the...

USB anti 5G for 350 euros and anti radiation stickers: the scam of the century?

There is a lot disinformation, hoaxes and false data related to the 5G and radiation. There are even those who believe that 5G has...