Syneidis
  • HushApp
  • About
  • Partners
  • Contact
  • Blog
Select Page
Everything you need to know about Social Engineering: Its risks and how to fight it

Everything you need to know about Social Engineering: Its risks and how to fight it

by Syneidis Team | Sep 21, 2018 | Cybersecurity

The wikipedia defines social engineering as, “the practice of obtaining confidential information through the manipulation of legitimate users. It is a technique that certain people can use to obtain information, access or privileges in information systems. It...
Discover your digital identity and the best way to protect it

Discover your digital identity and the best way to protect it

by Syneidis Team | Aug 27, 2018 | Online Privacy

Digital identity concept is recent and complicated to understand and assimilate. In 2013, Aparici, R. and Osuna Acedo, defined it as: “everything that we manifest in cyberspace and includes our actions and the way in which others perceive us in the...
Ranking of the 12 most harmful types of malware

Ranking of the 12 most harmful types of malware

by Syneidis Team | Nov 23, 2017 | Uncategorised

The first question that arises when reading this article’s headline is: what exactly is a malware? The word is an abbreviation of “malicious software“, therefore, it is considered malware to any program or code whose objective is to damage a computer...
The Equifax case: causes and consequences

The Equifax case: causes and consequences

by Frederic Thenault | Nov 13, 2017 | Blog, Cybersecurity, News

You may have already heard about the Equifax case. Its repercution is not only due to the magnitude of the theft of data, but also to the sensitivity of the type of data handled by this American company.   Equifax is the largest credit reporting agency in the...

Subscribe

Categories

  • Blog (10)
  • Cybersecurity (23)
  • European Cybersecurity (1)
  • Events (1)
  • News (8)
  • Online Privacy (5)
  • Uncategorised (8)

Recent Posts

  • Debate on the relationship of cybersecurity and electronic voting
  • The Fake News phenomenon and its implications for cybersecurity
  • New WhatsApp vulnerability: an attack with a spyware through video calls
  • E-government: how technology is changing the relationship with citizens
  • TOP 5 of the most famous hackers in history and their attacks

More Content:

cyberattackciberdelincuentesGDPRciberataquesCyber attackssecuritycontrol parentalciberataqueseguridadprivacycybersecuritytipspasswordciberatacpimescontraseñaCyber ​​attackpasswordscybercriminalsciberseguridadprivacitatconsejosidentitat digitaldigital identityphishingpymeshackersmalwareciberseguretatvirus

About us

Who we are
Press
Work with us
Privacy policy
Terms of use

Products

Hush

  • Facebook
  • Twitter
  • Google
  • LinkedIn
  • YouTube

Designed by Syneidis | All rights reserved © 2017

Aquest lloc web utilitza cookies per millorar la seva experiència. Si està d'acord, premeu el botó per acceptar.acceptar Llegir més
Privacy & Cookies Policy

necessary Always Enabled

non-necessary