NetXee
Coronavirus is being used to spread computer viruses
News

Coronavirus is being used to spread computer viruses

The coronavirus has reached the cyber world through infected files containing instructions on preventive measures of the virus, ways to detect it and updates on the state of the epidemic in the world. The viruses covered in these videos or documents range from worms to Trojans and have the appearance of PDF, mp4 and docx with information on the epidemic declared as an international emergency. Malware are able to block, modify, delete and steal all kinds of information from the devices from...

New pishing scam on WhatsApp
Guides

New pishing scam on WhatsApp

The name of the malicious message that is being propagated by SMS is: "WhatsApp greeting". It is similar to the one received when you want to install the application in a new terminal or when you want to change your phone number, only in this case an additional link is added to do a “phone number verification” and it is there Where the deception is generated. It is one more attempt, among the many, of "pishing" (phishing). In other words, a hacker tries to enter and control the application...

Risks of charging the cell phone in the airport's public USB
General

Risks of charging the cell phone in the airport's public USB

Every person who has traveled by plane knows that these cargo terminals are often a "salvation" but ... the reality shows that they can have a very high risk to use them. This is because they can be manipulated by cybercriminals (hackers), which alter USB connections and thus install malware on cell phones that connect, as well as transfer data without authorization. The vice president of IDB Security's X-Force Threat Intelligence division, Caleb Barlow, compares connecting to these public...

Vulnerability of SmatTV to cyber attacks
General

Vulnerability of SmatTV to cyber attacks

It is common that some users use their SmartTV to surf the Internet, exposing in this way many data that are the perfect attraction for cyber attackers. Hackers can access Netflix keys, Spotify , enter a virus or even "hijack" the TV to request a ransom. Unfortunately, many televisions do not contain an efficient system to protect themselves from these cyber attacks, so it is recommended to navigate with certain precautions, secure sites, download official apps and have updated operating sy...

Este sitio web utiliza cookies propias y de terceros para ofrecer una mejor experiencia, servicios y mostrarte publicidad relacionada con tus preferencias mediante el análisis de tus hábitos de navegación. Si continuas navegando, consideramos que aceptas su uso. Puedes cambiar la configuración de tus cookies de tu navegador en cualquier momento u obtener más información aquí.