Introduction to intellectual property Copyright, patents, trademarks, industrial design, geographical indications, trade secrets, there are so many things that fall under the category “intellectual property”. But what in fact is intellectual property? Generally speaking, intellectual property is characterized as a… Read More
Tips to protect your mobile devices
Tips to protect your mobile devices There is no secret that nowadays the technology we use can make us a target to cyber-attacks if we do not have basic knowledge on how to properly protect against these. No manual comes… Read More
Working onsite in cybersecurity
Working onsite in cybersecurity Even if the pandemic situation is still present in our daily lives, cybersecurity doesn’t have to stop. And sometimes working in this field requires engineers to travel to the client’s location to work. There are many… Read More
How to keep your crypto wallet safe?
How to keep your crypto wallet safe? As cryptocurrencies become more popular and valuable, more and more cybercriminals are turning their attention to them. There are 2 main types of crypto wallets: hot wallets and cold wallets. Hot wallets are… Read More
How to secure web and mobile applications
How to secure web and mobile applications Security online is crucial, and we all can imagine why. Hacks and breaches could have a huge negative impact on companies: Loss of customer trust; Financial losses; Leaked user data; Legal issues. You… Read More
How to keep yourself invisible on the web?
How to keep yourself invisible on the web? Did you ever wanted to be invisible? Pretty hard to achieve this in real life. But can you be invisible online? Well, there are 2 ways of doing it. One in which… Read More
How to keep your identity and your personal financial information safe in 2021
How to keep your identity and your personal financial information safe in 2021 Surfing the internet Nowadays, billions of people use the Internet and are sharing their personal information through social media and different other ways. Knowing how to keep… Read More
How to Bypass RootBeer’s Root Detection
How to Bypass RootBeer’s Root Detection During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device. The most common library that… Read More
Machine Learning in the context of SIEM
Machine Learning in the context of SIEM In this article we are going to see how machine learning was used to help automate a task in cyber security. In order to see if the activity in a system is generated… Read More
Branding Protection, how we do it?
Branding Protection, how we do it? Our world is surrounded by brands, even if we talk about global brands or small local brands that are trying to become popular, we see them everywhere. But why do we trust a brand?… Read More