Microsoft thinking about open sourcing Windows 7 OS
A few days ago Microsoft announced the end of support for Windows 7, so the operating system would no longer receive free security updates, although apparently there are many interestedRead More →
A few days ago Microsoft announced the end of support for Windows 7, so the operating system would no longer receive free security updates, although apparently there are many interestedRead More →
For the development of its day-to-day operations, the United Nations (UN) employs multiple technological developments with the highest information security standards, including a vulnerability bounty program to solve security flawsRead More →
Using Social Media platforms in Cyber Criminal activity is very common from last decade. Creating fake profiles with same name, details and it looks same replica of the original. FacebookRead More →
Although tech companies always seem to be moving forward, they sometimes have to take more measured positions. This appears to be the case of Google and Alphabet Inc, its parentRead More →
Back in 2016, the US Army managed to stop a massive online propaganda campaign deployed by the Islamic State. For this, the armed forces designed a complex hacking operation againstRead More →
This is a very serious disclosure for the data protection and privacy of Apple users. International media report that, after receiving a complaint from the FBI, the tech company abandonedRead More →
The methods used to secure technological developments can sometimes seem drastic. Web application security specialists report that an anti-hacking watchdog has threatened to reveal the code base of the popularRead More →
One of the main reasons why governments and financial institutions refuse to accept virtual asset transactions is their potential use for illicit purposes. Cybersecurity firm Chainalysis shows this in itsRead More →
As the security measures applicable to computer systems advance, new malicious hacking methods are also developed, so it is vital for technology companies to protect their creations with the bestRead More →
Combating crimes such as possession of child pornography is a complex task and often limited by the privacy, data protection and cybersecurity measures for tech device users, although Apple seemsRead More →