24 C
Barcelona
Friday, August 17, 2018

Security

How to protect Salesforce’s login using Latch TOTP

Latch TOTP is a tool created by ElevenPaths that does not require an internet connection to work properly. It offers two ways to protect our accounts: the first way is named “Lock,” which will block the account even if the password entered is correct....

Tsunamis of the web: how DDoS attacks evolved

Display overflown with DDoS
Cybersecurity is getting better. That much is clear, but experts warn that there’s still work to be done. The thing is, there will always be more work to be done. That’s just how it works. As companies and programmers get better at designing and building...

How stronger data protection can empower users

Tensions regarding privacy and data protection have been high as of late. People, media and politician’s worries about how our data is being handled is probably one of the defining topics of the decade. And private companies are at the center of it all. As...

5 steps to improve cybersecurity resilience

Cybersecurity is improving, but there’s more work to be done. The last few years have been tough for tech companies, as they’ve had to deal with prominent and much covered cyber attacks that have even seen the entertainment industry fall to its knees. As...

Auditing from your pocket with Intercepter-NG

Intercepter –NG is an application for Android which let us capture traffic of a local network if we are connected using ARP Poisoning attacks. We can get this free App from Google Play Store, but to use it we need to have a rooted...

4 ways blockchain can be used beyond cryptocurrency

For anyone who wouldn’t know better, blockchain might just be another word for cryptocurrency. Or even worse, another word for ‘Bitcon’. The truth, however, is far from that: cryptocurrencies are just one of the several ways blockchain can be used. And we’re here to...

Signaturit: taking electronic signatures to the next level

Signaturit wants to make things simple. Founded in 2013 in Barcelona, Spain, Signaturit facilitates the completion of any signing processes by providing a solution to requesting and making legally binding electronic signatures. In less than a year Signaturit consolidated itself as the most intuitive eSignature...

Deepfakes: the unexpected ethical consequences of new, disruptive tech

Starting in December and gaining traction through 2018, a new tech has shaked the internet for several reasons. As of now, you can find several videos online of people (mostly celebrities) having their faces inserted into others. They’re called “deepfakes.” Everything points to this...

Interview: Soledad Antelada, an expert and influential woman in cybersecurity

Soledad Antelada is the first and only woman at the Lawrence Berkeley National Laboratory, the laboratory where 12 Nobel prizes have come from. She was born in Argentina but raised in Málaga, Spain. This Professional (with a capital "P") is responsible for developing cybersecurity projects...

Your data is your own: what data transparency is about

Big companies leading with clients or user’s data is nothing new in the corporate world. But now, the practice of collecting data has risen in such an explosive way that we’ve finally started to grasp the implications of its potential, and we’ve even given...

Latest news

X

Send this to a friend