Loading...
HTTPS connection to a less secure HTTP

Guides

How to protect yourself from SSL stripping attacks 

10 January 2025

SSL stripping, also known as SSL channel strip, is a cyberattack technique where a hacker downgrades a secure HTTPS connection to a less secure HTTP connection.  This type of attack, often associated with a man-in-the-middle scenario, allows attackers to intercept…
Design of the digital euro

News

Digital euro: cyber security risks? 

9 January 2025

The digital euro is a new frontier in the world of digital payments, designed as an electronic version of cash. According to the official website of the European Central Bank, the digital euro is a modern and free alternative to…
Salt Typhoon malware attacks USA

News

Salt Typhoon: the new cyber nightmare

8 January 2025

Salt Typhoon is a name gaining notoriety in the world of cyber security, associated with a series of advanced and persistent cyberattacks targeting critical infrastructures, businesses, and government agencies in the United States and beyond. This Chinese hacking group, believed to be state-sponsored, has…
Artificial intelligence protection shield

News

Artificial intelligence in cyber security 

7 January 2025

In recent years, artificial intelligence (AI) has become a fundamental tool for cyber security, serving both to enhance defense strategies and to create new methods of cyber attack.  The constant growth of cyber threats, along with increasingly targeted and complex…

Most Viewed

Latest Posts

News

Mobile security: protecting smartphones and tablets 

It is well known that today it is difficult to imagine ourselves without smartphones and tablets. These devices have become essential tools in our daily lives; we use them for everything, from personal communications to managing finances, and they contain a lot of sensitive data. However, with all the convenience [...]

Guides

IT security policies: how to create and implement them 

In this article, we will explore IT security policies that not only help prevent cyber attacks, but also provide guidelines on how to respond in the event of a security breach. IT security policies are fundamental for protecting an organization's digital resources. With the rise of cyber threats, it is [...]

Guides

Personal data security: a guide for users and companies 

In this article, we will explore ways in which, both as a user and as a company, you can effectively protect yourself while adhering to privacy and security principles. We will provide a guide to improving the security of your personal data in 10 simple steps. In an increasingly connected [...]

To top