The printing press was one of the earliest steps towards democratization of knowledge, allowing the acquisition and spread of knowledge among the masses, and not just the privileged elite. Read more
The more things change, the more they stay the same. This age-old adage can certainly be applied to the realm of IT security where hackers continuously evolve their techniques to compromise their targets. Read more
Starting in June 2016, any DMARC-capable receivers will be instructed by Google to reject any emails that do not properly authenticate.
Electronic banking and payment systems are on the rise in Mexico and other Latin-American countries, with statistics showing significant growth of these channels. According to our recent study, Read more
As cybercriminals are constantly updating their strategies to avoid being detected, traditional fraud detection tools, such as expert rules, are less effective as Read more
A few years ago, it was common practice for ISPs to set Customer Premises Equipment (CPE) admin passwords that were known, simple and easy to remember strings. Read more
Earlier this week, researchers from Checkpoint software disclosed a vulnerability in What’sApp, that let hackers compromise personal data using just their phone number.While What’sApp quickly responded to that vulnerability, Read more