Debate on the relationship of cybersecurity and electronic voting
The following can be defined as electronic voting: internet voting, voting on electronic devices (face-to-face) and, finally, the digitized counting of votes. Each of these variants entails its owns risks. Recently, has been palpable the influence that hackers...
read moreThe Fake News phenomenon and its implications for cybersecurity
The term Fake News has gained popularity over the last few years, but what exactly is it? It can be defined as false news that is published and circulated with the purpose of cheating, with the appearance of real news. Although this phenomenon is not new, the...
read moreNew WhatsApp vulnerability: an attack with a spyware through video calls
On May 14 was detected a vulnerability in the popular messaging application: WhatsApp. The threat allows hackers to install spyware on users’ devices, simply through a video call. The spokesmen of the application have commented: “we believe that an...
read moreE-government: how technology is changing the relationship with citizens
E-government (electronic-government) can be defined as a new form of relationship between governments and their citizens. This new form consists of the implementation, development and application of computer tools such as information and communication technologies....
read moreTOP 5 of the most famous hackers in history and their attacks
Currently, the frequency of cyber attacks has grown exponentially, as access to the Internet has increased, allowing hackers to find all the tools they need almost at zero cost. This problem has been sharpened little by little, with the work of people, who are now the...
read moreThe problem of cyberbullying, its consequences and how to deal with it
Cyberbullying is the harassment that takes place in digital devices such as mobile phones, computers and tablets. The means used to harass victims are very diverse: text messages, applications, social media, forums or interactive games. It may be considered...
read moreDigital privacy as a right: what are its limits and how to protect it?
Privacy can be understood as the right of every individual to separate aspects of their private life from the public domain, all human beings have this right. When we talk about digital privacy we refer to this privacy protection in the field of cyberspace. Currently,...
read moreGDPR: Balance of the first 8 months of application of the regulation
As the international day of data protection approaches, we thought it appropriate to make a small balance of how the first days of the new European data protection regulation have passed: the GDPR. This new regulation took many companies by surprise, even though it...
read moreSyneidis presents: 16 Cybersecurity predictions for 2019
In order to prepare these predictions of cybersecurity, we had to analyze what happened during 2018. We witnessed how cyber criminality has been increasing. Cyber criminals have improved their tactics, adopting more stealthy tendencies that allow them to go unnoticed...
read moreArtificial Intelligence: ally or enemy of Cybersecurity?
Artificial intelligence is advancing increasingly and is being incorporated into many business processes, and cybersecurity is no exception. Artificial Intelligence (AI) software is able to “learn” from studying the causes of past events and with this data...
read more6 reasons why your company should buy insurance against cyberattacks
We currently live in a world rapidly increasing its technological capabilities and this type of change affects all levels. Although this implies new opportunities, it also brings new risks to be address. The 21st century has shown us that the main threats are virtual...
read moreMassive data leak from Facebook users. The beginning of the end?
It’s been almost a month since a new security incident from Mark Zuckerberg’s Facebook social network has came to the public’s attention. The company revealed on September 28, that 50 million users had fallen victim to their accounts being exposed,...
read moreNew War Paradigm: Cyberterrorism and Cyberwar – Global Threat –
In the last decades we have experienced an unprecedented technological change, this has brought, as a consequence, a cultural revolution at all levels. Internet has meant changes in work, economics, urban trends, and educational systems. This change also affects...
read moreEverything you need to know about Social Engineering: Its risks and how to fight it
The wikipedia defines social engineering as, “the practice of obtaining confidential information through the manipulation of legitimate users. It is a technique that certain people can use to obtain information, access or privileges in information systems. It...
read moreDiscover your digital identity and the best way to protect it
Digital identity concept is recent and complicated to understand and assimilate. In 2013, Aparici, R. and Osuna Acedo, defined it as: “everything that we manifest in cyberspace and includes our actions and the way in which others perceive us in the...
read moreThe need to build a social conscience about cybersecurity
In the last decades the internet has evolved to the point that cybersecurity has become increasingly difficult to protect. Despite the serious evidence that shows risks of this technological change, It has not been the center of public debate until a few years ago....
read moreCyber attack to the Bank of Chile reopens debate on legislation on cybersecurity
On May 24, the Bank of Chile was the victim of a cyber attack involving various entities in South America’s financial system. They ended up settling with the theft of 10 million dollars of bank funds. As has been published in various media outlets and further...
read moreCybersecurity: Securing Personal Information
We invite you to read Hogan Injury’s post, our special guests: Technology has come a long way. The advancement of technology has paved the way for much more development in the fields of medicine, transportation, economics, finance, and many more. Along with the...
read moreCybersecurity Tips For Using The Cloud
The cloud computing services, have already conquered the personal and business territory. It greatly facilitates the logistics of data exchange and storage, the creation of collaborative work environments, and also adapts to the reality of mobility and multi-device...
read more12 Tips to Make Your Online Purchases Safe
Yes, Christmas is just around the corner! …and this means only one thing: time to buy presents for our loved ones! It is a fact that the existence of the internet and the evolution of e-commerce has transformed the way we buy presents by making things easier and...
read more