Category: Cybersecurity

Learn more cybersecurity, discovering threats digital, vulnerability, best practices and practical strategies to protect data, systems and devices in the company and in daily life.

  • Why are computer viruses called viruses?

    When I was a kid, I often played online, clicked on a little game and... boom. Sudden popups, fake "X" buttons that did not close anything and automatic downloads that you had never requested. The computer began to become slow, improvised, sometimes unusable. Well, I dumped viruses unintentionally. But why are they called viruses?

    Why are computer viruses called viruses?
  • How does a contactless payment really work?

    Have you ever paid by card or phone at the restaurant and wondered how those few seconds really move money from your account? But how does the contactless payment actually work from the point of physics? And above all, is it safer to pay by card or phone?

    How does a contactless payment really work?
  • Computer security: who has too many accesses?

    You know that password you use everywhere? Or that access you gave "just for a moment" and never took away? Computer security doesn't collapse because of a hacker, it collapses because of something you do every day without realizing it. Find out what it is and how to avoid it with 3 simple habits.

    Computer security: who has too many accesses?

More Articles!

Why are computer viruses called viruses?

When I was a kid, I often played online, clicked on a little game and... boom. Sudden popups, fake "X" buttons that did not close anything and automatic downloads that you had never requested. The computer began to become slow, improvised, sometimes unusable. Well, I dumped viruses unintentionally. But why do you...

Continue reading

NEWSLETTER
If these articles are useful, you can join the newsletter.
Writing only when I have something worth sharing.

×