Microsoft Falls Victim to SolarWinds Vulnerability
To end 2020 well, a large number of companies and organizations around the world have recently been the victims of a massive cyber attack via […]
To end 2020 well, a large number of companies and organizations around the world have recently been the victims of a massive cyber attack via […]
Whenever we surf the net we can have problems that affect our security. We can come across sites loaded with malware, programs that we download […]
The 5G networks are a reality and are increasingly present in major cities. It is true that there is still a long way to go to reach a […]
An ethical hacker has nothing to do with what we might call a cybercriminal or hacker. We are dealing with a user who, either for […]
The network is made up of many elements so that we can connect and have access to the Internet. We can mention the devices, the […]
We have at our disposal numerous devices that allow us to connect computers in a network. We speak for example of routers, network switches or […]
For years now, extensions have been one of the main malware gateways to computers. Although both Google and Mozilla have security measures in their stores […]
Connecting to the Internet anywhere is something that is present in our day to day. We use services and platforms that need to be permanently […]
Whenever we use our devices to surf the web, we can be victims of a wide variety of attacks. There are many threats that in […]
Windows, being the most widely used operating system for both home and business, is the main target of hackers. Creating malware to attack this OS […]
There are many varieties of malware that can affect our computers. Many types that in one way or another could compromise the security and proper […]
In a security investigation, it has been discovered that confidential data can be extracted from computers via Wi-Fi. The attack has been dubbed AIR-FI. Thanks […]
DDoS attacks are very present in our day to day. They are one of the most important threats that can compromise the security of computer […]
When we pay online we can use very different methods. We can use bank cards, send a bank transfer, use a payment platform … In […]
Computer security threats are very present in all types of systems and devices. They can steal information, compromise the proper functioning of equipment, impersonate identity, […]
Copyright © 2026 ITIGIC | Privacy Policy | Contact Us | Advertise