Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.
NIST chose four algorithms, and four others are pending
NIST chose the first four quantum-resistant cryptography algorithms. Here you'll learn about it with an intro to public key cryptography and quantum computing.
Find out about LockBit, now in its menacing 2.0 version
In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.
Tips for understanding the Apple–China controversy
In this post, we will understand why the Apple data center inaugurated in Guizhou reopened the controversy over data privacy in China.
The first ransomware (as a gift) for this new year
Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption scheme, its injection, operation, and other basic things about it.
Some pieces of information about ransomware attacks
Everyone could be a target for ransomware attacks. Here we give an introduction to this topic and tips that could help you prevent being a victim.
A very short introduction to password cracking
After I wrote this post, I decided to change some of my most important passwords, and after you read it, we think you might want to modify your passwords too.
Intercept applications in newer Android phones
Android is one of the most suitable targets for hackers. Here we show how to intercept Android apps' web traffic by installing a self-signed certificate.
A chat with Andrés Gómez
For this post, we spoke with Andrés Gómez, a former Fluid Attacks' member, who is researching to protect a computer grid supporting experiments at the LHC.