How to check if an antivirus works well?
Tech Information




- Jan 31
- 2 min
Wifi eavesdropping or eavesdropping on public networks


- Jan 26
- 1 min
What are the 'passkeys ’?, The Google system to log in without introducing the password


- Jan 12
- 2 min
How to hide malware in images


- Jan 10
- 2 min
Browse safely with a password generator and a VPN connection


- Dec 30, 2022
- 2 min
How to detect a fraudulent SMS


- Dec 15, 2022
- 1 min
The new EU cybersecurity rules that devices will have to comply with


- Nov 29, 2022
- 2 min
Some of the most imaginative phishing attacks


- Nov 22, 2022
- 2 min
Advantages of encrypting email to reduce the risk of data leaks


- Nov 15, 2022
- 2 min
Mistakes you make when inventing a password


- Nov 9, 2022
- 2 min
How to recover a stolen google account?


- Oct 18, 2022
- 1 min
What is 'doxing' and how can we avoid it?


- Oct 11, 2022
- 2 min
5 Dangerous Trojans that can empty your account


- Oct 4, 2022
- 2 min
How to carry out a correct security strategy


- Sep 27, 2022
- 1 min
Dumpster diving: How do cybercriminals access deleted data?


- Sep 20, 2022
- 1 min
What to do if my PC has been infected by ransomware


- Sep 15, 2022
- 2 min
Four objects that can spy on you without you realizing it


- Sep 8, 2022
- 2 min
The danger of shortened URLs

- Sep 2, 2022
- 2 min
Risks of browser autocomplete

- Aug 22, 2022
- 2 min
These are the scams that can reach your Gmail email

- Jul 26, 2022
- 2 min
How do hackers choose their victims?

- Jul 19, 2022
- 2 min
8-character passwords made up of numbers can be cracked instantly.

- Jul 12, 2022
- 2 min
The data of millions of users is leaked through Telegram for using free VPNs

- Jun 14, 2022
- 1 min
Recover deleted files on Windows