Loading...
Cold boot attack warning screen

News

Cold boot attack: a real threat

4 October 2024

The cold boot attack is a cyber attack that allows sensitive data to be extracted from the RAM memory of a computer by exploiting the fact that the data can persist for a short time after the system has been…
Rowhammer attack exploiting system vulnerabilities

Guides

Rowhammer: vulnerability in DRAM memory 

4 October 2024

Rowhammer attacks pose a threat to the security of DRAM memories, which are commonly used in computing devices. This attack technique exploits an inherent vulnerability in DRAM, where repeated accesses to certain rows of memory cells can induce bit flip…
Bluebugging mobile phone attack to access personal data

Guides

Protect your data from bluebugging

3 October 2024

Bluebugging is a type of cyber attack that takes advantage of weaknesses in Bluetooth connections to gain unauthorized access to mobile devices. This attack allows hackers to take control of devices, access confidential data and send messages or make calls…
Scheme with fundamental aspects of ICT

Guides

The 5 fundamental aspects of ICT

3 October 2024

Cyber security is crucial in our daily lives to protect information systems and personal and corporate data. This discipline is based on five fundamental aspects of ICT, which are the cornerstone of cyber security policies and information protection practices.

Most Viewed

Latest Posts

News

Preventing Business Email Compromise (BEC) 

Business Email Compromise (BEC) is an advanced form of fraud that affects companies of various sizes, causing significant economic losses globally. This fraud involves the compromise of corporate email accounts, typically through phishing or spear phishing techniques, with the aim of inducing employees to make money transfers or disclose confidential [...]

News

Cyber war: the digital weapons of modern warfare 

Cyber warfare, or cyber war, is the use of information technology to attack another state's critical infrastructure, causing significant damage and compromising national security. These attacks can range from viruses to complex DDoS attacks. The term “cyber cold war” derives from the 20th century Cold War, describing a modern digital [...]

Guides

Hard disk destruction and disposal: a complete guide

Data security is crucial when disposing of a hard disk drive, whether it is part of a personal, corporate or public entity system. Final data destruction and proper disposal of these devices are essential to prevent unauthorised retrieval of sensitive information and to minimise environmental impact. This article discusses best [...]

News

Automotive cyber security and vehicle information security

The increasing connectivity and intelligence of modern vehicles have introduced new risks of cyber attacks in the automotive sector, making cybersecurity a key aspect of vehicle and occupant safety. UN Regulations 155 and 156, together with the ISO 21434 standard, set crucial standards for automotive cybersecurity. Attacks, such as the [...]

Guides

Cyber security of graphics cards 

The security of video cards is a fundamental but often underestimated aspect of computer security. These hardware components, essential for displaying images and video on the computer, can become vulnerable if not properly protected. Keeping drivers up-to-date and following security best practices are crucial steps to protect your system. Graphics [...]

Guides

How to update a software: useful tips

Updating software is crucial for the security and efficiency of computers and mobile devices. This article will explore topics such as how often to look for software updates, where to download them, how to perform them, and the definition of software itself. Updates are important for fixing bugs and security [...]

Guides

Vishing: what it is and how to protect yourself from this form of fraud 

Vishing, short for ‘voice phishing’, is a form of scam that uses telephone calls to obtain personal and sensitive information from victims. Fraudsters often pose as representatives of banks or other reputable institutions, using ‘spoofing’ techniques to make their numbers appear legitimate. During calls, they convince victims to reveal data [...]

News

The secure software development life cycle (SDLC)

The secure software development life cycle (SDLC) is a fundamental process that ensures the creation of a high-quality, secure, and reliable software product. This cycle includes a series of well-defined phases, each playing a crucial role in ensuring that the software is developed according to high standards and effectively meets [...]

Guides

What is smishing and how to protect yourself

In recent years, the term "smishing" has gained increasing relevance in the world of cybercrime. But what is smishing? The word is a combination of "SMS" and "phishing" and represents a form of phishing that uses text messages (short message service or SMS) to deceive users and obtain sensitive information. [...]

Guides

Protecting your business website from Cross-Site Scripting 

Cross-site scripting (XSS) is a cybersecurity vulnerability that allows attackers to insert malicious scripts into web pages, exposing users to risks such as stealing session cookies, manipulating web content, and controlling accounts. These attacks can severely compromise the security of corporate websites, expose sensitive data, and damage a company's reputation. [...]

Guides

Protecting your business website from cross-site request forgery

Cross site request forgery (CSRF) is an attack that exploits the sessions of authenticated users to send fraudulent HTTP requests without their consent. Using techniques such as hidden forms on malicious sites, attackers can, for example, induce users to transfer money unintentionally. In this paper, strategies to prevent CSRF attacks [...]

Guides

How to protect your business website from SQL injection 

SQL injection is a type of cyber attack that exploits vulnerabilities in a web application's SQL commands to manipulate the database, allowing access to sensitive data, modification or deletion of data, and potentially complete control of the server. This attack can be particularly damaging to companies, such as ecommerce companies, [...]

To top