Category: security
Review and increase the security of your Mac computer
When we work with the computer, it is very important that we keep in mind that the security of our equipment is essential, as well as all those documents that we store in it. In addition, the world of internet increasingly hosts different dangers, which we must avoid if we want our browsing to be secure and we are not in any danger in terms of theft of information, privacy, data etc…
See hidden browser passwords under dots
When we surf the internet continuously we are accessing sites where we need to register with a username and password. The problem with all this is that sometimes we may not select a password that is completely secure because of the fear of being forgotten. Also today, registering users and passwords on our computer is something totally common since a very large number of pages have a login in which we must register in order to access its content…
Free tools to monitor and analyze network traffic
One of the main tasks that as administrators we must perform is to ensure the optimal functioning of the network in our organization, and why not, on a personal level, since many factors and user productivity depend on this factor. A slow or faulty network is synonymous that something is wrong and therefore the users and computers of the domain will not have the same speed to perform their daily activities and therefore many internal and external elements will be affected…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
Best free proxy servers 2019 to navigate anonymously
Security must be one of the issues that are always present in all types of systems regardless of the size of the organization or the category of users who use these systems and the reason is more than enough, threats on the network are latent to each day and therefore we must take the necessary measures to increase security and privacy…
Configure security and privacy in social networks
When we register on many websites, we have the option to do so through our Facebook account, Twitter In short, from some social network. Each time we perform this action, which we generally accept because it is easier for us to press a button than having to be entering all our data, we may not be realizing that we are allowing and sharing the possibility of third parties accessing all our information …
How to manage WiFi networks with security and free apps
Nowadays being connected is something that seems essential for most of us. It seems we don't know how to live without Wifi. Wherever we go, we seek to connect and have access to the network. We have portable devices to be able to connect indifferently to the place where we are. When we talk about Wifi, we are talking about a wireless connection mechanism with electronic devices…
5 steps to protect your data on the network and computer
When we work with the computer, the most valuable thing we can host in it is all our personal data. It is likely that we have different files, folders, documents etc. of great personal and professional value. In the event that something happened on our computer, having all this protected is of vital importance since the data created by the user is something that if it is lost it will not be able to be recovered…
How to put password to folders or files on mobile or PC
Every day we are more people who have personal or confidential information on our computers, tablets, smartphones The fact that we use these devices as a work tool as well as personal, has caused the need to have some control over what we keep in your memory. There is no day that we do not carry any of these devices on top and that we go from here to there with him, without knowing on many occasions where we have left him or if we have closed all the sessions that we had open on the office computer for example…
Privacy in the internet world
The danger is not in giving certain data on the internet, the problem is not being aware of the level of information we are sending. With possible personal, business problems etc. that can cause us in the least thoughtful moment. Are certain services really free? Are my private personal information and data protected…
Know and delete all my information on Google
Surely on more than one occasion we have heard the mythical phrase "Google knows everything . " Well, that expression is no joke since more and more data are collected by this search engine, and when we talk about data we do not refer only to information, but to our personal data. The information that Google collects is immense, and remains in its database…
Best Android antivirus 2019
The operating system developed by Google, Android, is one of the most used in the world for its various benefits both in terms of performance and versatility and option to increase its benefits with thousands of free applications, precisely because of these practical options for use, Android becomes a favorite target for attackers…
How to surf the internet more securely
Browsing the internet is very common among the population since its access has been increasingly facilitated. We can do them from your home computer, work or from any of our mobile device such as a smartphone or tablet. We access our mail, social networks, and other websites where we enter different information about us…
New vulnerability in Intel allows an attacker to delete your BIOS
Security problems in the internet world, are the order of the day lately. Unfortunately, the constant attacks make users increasingly insecure and constantly alert. Undoubtedly one of the companies that is giving more talk in recent months, is being Intel. A month ago we saw how the giant finally launched a series of processors with patches for the famous Sprectre and Meltdown, vulnerabilities that significantly affected major brands…
Windows Defender and 5 other antivirus consider uTorrent threat
uTorrent was able to arrive at the right time and for this reason and for all the features it offered, it was very well received by users. All versions of uTorrent have translations in 54 languages and have been considered for a long period of time as one of the best clients to download Torrent. It…
Security patches on Android are not always real
Today, mobile phones are a personal and work tool that has become indispensable. That is why, if something torments us today, it is that our smartphone is not in the best possible conditions or that it can be infected. After the wave of vulnerabilities found in both mobile operating systems and computers, the alert has jumped among users who have seen the security and privacy of their data threatened…
Better security and hacking tools Windows, Linux and Mac
In a world where everything we do is based on the network, our emails, educational platforms, conferences, entertainment programs, request for medical appointments and thousands of additional things, it is more than vital to be clear about the best security options with which we have to avoid that the data that we have lodged in the equipment of local form and those that are transmitted through the network, are not violated in any moment…
Best Android antivirus 2019
The operating system developed by Google, Android, is one of the most used in the world for its various benefits both in terms of performance and versatility and option to increase its benefits with thousands of free applications, precisely because of these practical options for use, Android becomes a favorite target for attackers…
Signals and solutions to detect fake antivirus
Today the world of internet is used by millions of people every day, to perform searches on the web, information gathering, analysis but we also offer our personal information in many occasions without taking the necessary precautions. It is necessary that to prevent external attacks, we have some kind of defense on our device both at home and at work…
5 steps to protect your data on the network and computer
When we work with the computer, the most valuable thing we can host in it is all our personal data. It is likely that we have different files, folders, documents etc. of great personal and professional value. In the event that something happened on our computer, having all this protected is of vital importance since the data created by the user is something that if it is lost it will not be able to be recovered…
How to surf the internet more securely
Browsing the internet is very common among the population since its access has been increasingly facilitated. We can do them from your home computer, work or from any of our mobile device such as a smartphone or tablet. We access our mail, social networks, and other websites where we enter different information about us…
Increase your protection with an antimalware for Mac
There are a number of programs that do not really have any useful purpose, but simply bother us with advertisements whose sole purpose is for the developer of the advertising software to get money for it. Where do they come from? Usually a Malware is packaged in an installer for other software . This is usually due to what we have downloaded, we have done from a site that was not reliable…
Manage your passwords with LastPass
The privacy and security of our information is an issue that we must always keep in mind. In our computer we store many documents and files that often contain information that we would like to be protected. Put PDF password Put password Word and Excel Put password Android documents Put password iPhone notes When we talk about passwords, we should know that the two most important requirements are to create secure passwords and find the best way to use them without having to remember all of them…
Features VPN protocols (OpenVPN, SSTP, L2TP, IKEv2 and PPTP)
One of the most used technologies today for reasons of security, connectivity and simplicity of use is the VPN (Virtual Private Network - Virtual Private Network) which, thanks to its design, allows us to define various forms of connectivity either at the level from home or corporate level. What is a VPN…
Free tools to monitor and analyze network traffic
One of the main tasks that as administrators we must perform is to ensure the optimal functioning of the network in our organization, and why not, on a personal level, since many factors and user productivity depend on this factor. A slow or faulty network is synonymous that something is wrong and therefore the users and computers of the domain will not have the same speed to perform their daily activities and therefore many internal and external elements will be affected…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
The best free antivirus Windows, Mac and Linux
Having a good antivirus to protect our computer is something we must keep in mind to always be protected from possible threats on our computer. It doesn't matter which operating system we use since having a good antivirus is important in each of them. You just have to keep in mind that when you go to install them, it is important to select the "custom" installation, so that you do not install "toolbars" by default or any additional software to the antivirus that you do not want…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
Free managers to send encrypted and secure emails
The privacy and security of our information on the network is a vital issue for all of us who are managing this medium every day. It seems that our data is increasingly public, ask Google what it knows about you to verify it, and this has caused that more and more frequently we are more we are looking for different alternatives to protect as much as possible our information on the network and the computer …
Configure security and privacy in social networks
When we register on many websites, we have the option to do so through our Facebook account, Twitter In short, from some social network. Each time we perform this action, which we generally accept because it is easier for us to press a button than having to be entering all our data, we may not be realizing that we are allowing and sharing the possibility of third parties accessing all our information …
Know and delete all my information on Google
Surely on more than one occasion we have heard the mythical phrase "Google knows everything . " Well, that expression is no joke since more and more data are collected by this search engine, and when we talk about data we do not refer only to information, but to our personal data. The information that Google collects is immense, and remains in its database…
How to manage WiFi networks with security and free apps
Nowadays being connected is something that seems essential for most of us. It seems we don't know how to live without Wifi. Wherever we go, we seek to connect and have access to the network. We have portable devices to be able to connect indifferently to the place where we are. When we talk about Wifi, we are talking about a wireless connection mechanism with electronic devices…
Reduce risks when using public Wi-Fi
It is very easy to see us in the position of being in an airport or a cafe with our tablet and having to solve a labor problem, however the public Wi-Fi network represents many risks for our confidential information to travel freely. We have to follow some tips that we will see next, to ensure that we minimize the risks of using public Wi-Fi to transmit data that may be sensitive to us or our organization…
Best free antivirus for Android 2017 mobile
The use of mobile devices has become a necessity in the different areas of our lives. It is normal that both a phone or a Tablet end up storing all the information that we generate daily and that there comes a time when we do not really know about all the space we have occupied in it. According to a study issued by Nokia, one of the leaders of mobile telephony, Android systems take 81% of virus attacks worldwide…
Recovering files after ransomware attack will be easier with OneDrive
IT security is one of the issues that bring more headaches to technology giants, which do not stop working on new features to improve the user experience. In this case Microsoft was not going to be less, and from here they strive to incorporate new features that improve security, either in their operating system, as in the Office package, or as in this case, which has touched Your OneDrive cloud storage service…
Configure security and privacy in social networks
When we register on many websites, we have the option to do so through our Facebook account, Twitter In short, from some social network. Each time we perform this action, which we generally accept because it is easier for us to press a button than having to be entering all our data, we may not be realizing that we are allowing and sharing the possibility of third parties accessing all our information …
How to surf the internet more securely
Browsing the internet is very common among the population since its access has been increasingly facilitated. We can do them from your home computer, work or from any of our mobile device such as a smartphone or tablet. We access our mail, social networks, and other websites where we enter different information about us…
Privacy in the internet world
The danger is not in giving certain data on the internet, the problem is not being aware of the level of information we are sending. With possible personal, business problems etc. that can cause us in the least thoughtful moment. Are certain services really free? Are my private personal information and data protected…
Protect your bank details in online purchases
We don't have to be alarmed, since if we take the necessary measures and are consistent about what data we enter on the internet and where we do it, we probably don't have any problems. Even so, it does not hurt to follow a series of small tips, to be calmer in this regard. How to protect your credit card when shopping online Security Only secure websites One of the most important and transcendental recommendations is to be sure about the reliability of the website in which we are entering our data…
Skygofree: Android spy virus steals messages, records and takes photos
Sometimes reality surpasses fiction. And it is that cybersecurity attacks are more the order of the day than ever. Cybercriminals devise lots of methods to infect computers with malware and get away with it. Security patches created for Specter and Meltdown have been very popular in recent days and lots of users have decided to download these patches to protect their equipment…
Best free encrypted programs and applications for Mac 2017
When we work with a computer every day, we may need to encrypt certain documentation, both work and personal, as this can be confidential or very valuable to us and we do not want anyone to have access to it without our consent. We never know who can get to see our information, so it is interesting that we consider protecting our files through an encryption program …
5 steps to protect your data on the network and computer
When we work with the computer, the most valuable thing we can host in it is all our personal data. It is likely that we have different files, folders, documents etc. of great personal and professional value. In the event that something happened on our computer, having all this protected is of vital importance since the data created by the user is something that if it is lost it will not be able to be recovered…
iOS and macOS already have security patch for Specter and Meltdown
Last week we could see how the design vulnerabilities of the Intel, AMD and ARM processors known as Meltdown and Specter came to light. These two vulnerabilities have been classified as very dangerous, since they affected most of the smart devices jeopardizing the security of all of them. Note Remember that this security flaw is what allows a web software to see contents of the kernel memory that is one that has access to passwords of all kinds…
Watch out! Fake Meltdown and Specter patches contain malware
Cybersecurity attacks are unfortunately a very topical issue that affects many users. During this last time some of the attacks that have given more talk are Specter and Meltdown. How you will know Specter affects Intel, AMD and ARM processors and the most serious problem it causes is that it can move Kernel information to other places that are under malware control…
Know who steals WiFi and how to avoid it
The first thing we have to detect is if our WiFi is being stolen. One of the first suspicions we have when they are stealing from us Wifi is generally that the internet connection becomes much slower especially at certain times of the day. If this is happening to you, the first thing you should do is perform a small test…
How to protect and secure your WiFi wireless network
Nowadays one of the most vital and fundamental technologies worldwide for everything related to communication and web browsing is Wi-Fi which allows us to connect easily to a router or modem without using cables and It becomes an ally for many users who require access to the network in places where it is not possible to use LAN, cables, such as airports, libraries, restaurants, etc…
See if your Windows 10 version is in danger and you should update NOW
Two years ago, Microsoft's main operating system was launched, with Windows 10 being the most current version so far. This operating system has been well received by users, with millions of people working with it. What we should keep in mind is that all those users who continue to run version 1511 of Windows 10, known as the Windows update of November 10, are recommended to update immediately…
Security tools for Linux systems
When managing Linux environments it is important to know some tools that give us the possibility of increasing security levels over multiple environment parameters. We have already seen the best free antivirus for Linux. Today Solvetic will analyze some tools that will be practical in everything related to the improvement at the level of security in Linux environments…
The best free antivirus Windows, Mac and Linux
Having a good antivirus to protect our computer is something we must keep in mind to always be protected from possible threats on our computer. It doesn't matter which operating system we use since having a good antivirus is important in each of them. You just have to keep in mind that when you go to install them, it is important to select the "custom" installation, so that you do not install "toolbars" by default or any additional software to the antivirus that you do not want…
Privacy in the internet world
The danger is not in giving certain data on the internet, the problem is not being aware of the level of information we are sending. With possible personal, business problems etc. that can cause us in the least thoughtful moment. Are certain services really free? Are my private personal information and data protected…
Know and delete all my information on Google
Surely on more than one occasion we have heard the mythical phrase "Google knows everything . " Well, that expression is no joke since more and more data are collected by this search engine, and when we talk about data we do not refer only to information, but to our personal data. The information that Google collects is immense, and remains in its database…
Be careful WiFi users! Hacked WPA2 security protocol
When we surf the internet, we like to be safe and feel that the protection of WiFi networks is adequate. The most common encryption protocol that can be found in networks, houses, places with public WiFi etc., is called WPA2 which offers high security, at least to date. This is a system that seemed impossible to hack and break your encryption system, but we just received the news that this protocol has just been hacked…
New Intel processors with Specter and Meltdown protection
Network attacks are becoming more dangerous and more constant. It is certainly a topic that worries users since their personal data, privacy and security can be affected by it. The vulnerabilities known as Specter and Meltdow detected at the end of last year, have meant more than a comedura of the head for many of the companies that were affected by this attack…
Intel recommends for security to uninstall your App Remote Keyboards
No doubt this 2018 has begun loaded with news related to the security and privacy of users on the network. In addition to the continued emergence of new viruses and attacks on operating systems, one of the issues that has most marked in recent days has been the "theft" of information by the giant Facebook…
The KRACK attack affects 41% of Android devices What to do?
Yesterday the alarm went off when the news about the vulnerabilities of the WPA2 WiFi network security protocol became known. This vulnerability, known as KRACK, caused panic among the population, since most of us use Wifi networks for our connections. This attack allows attackers who can read our WiFi network traffic between wireless devices and access points…
Vulnerability discovered in Windows Defender and security patch
Unfortunately, cyber attacks are the order of the day. For this reason and to protect our security and privacy, prevention is fudamental, and one of the first actions we must take to ensure that everything remains in order and not to have such dislikes is the installation of an antivirus on our computer…
You can know if your Facebook data has been shared with Cambridge Analytics
Weeks ago the social network Facebook seemed to be on everyone's lips and not precisely because the news was good. The company became the object of criticism of many media outlets, as it raised the alarm about the privacy of user data. Users were soon alarmed, even many of them closing their accounts because of the "anger", disappointment or fear that this theft of information had meant for them…
Vulnerabilities discovered that infect Windows when entering the web
Unfortunately, cyberattacks are a topic of conversation day and day too, and that is why large technology companies give great importance to this aspect and investigate new attacks and how to protect themselves from them. A few days ago at Solvetic we reported a vulnerability discovered in Windows Defender that exposed your computer to malware and a security patch that had been released to solve it…
Facebook scam: Primark gives away € 500 vouchers when solving survey
Cyberstaffs are the order of the day. Deception to try to infect your computers with malware or even enter your bank details or subscribe to paid services without your consent. Cyber criminals do not stop investigating formulas with which to perform this series of acts not with very good intentions, and being informed about it is a very good way to protect ourselves and not fall into these traps. On…
Avast Secure Browser: the new security-based browser
We are living in a time when data privacy and IT security are issues that concern users especially when surfing the web. Due to the cyberattacks and the amount of malware that infect our computers for data collection such as the popular ransomware internet browsers do not stop including improvements dedicated to this important aspect…
New invasion of Spam extensions in Firefox Quantum
With the arrival of Firefox Quantum, there were many users who gave the opportunity to this browser that was renewed and offered really attractive features. No doubt this renovation by Mozilla was a success, and the company seemed to be in a good time. But nevertheless not everything was as beautiful as we expected since in December the warning about a wave of Spam extensions that had invaded the browser plugin store jumped…
Intel recommends for security to uninstall your App Remote Keyboards
No doubt this 2018 has begun loaded with news related to the security and privacy of users on the network. In addition to the continued emergence of new viruses and attacks on operating systems, one of the issues that has most marked in recent days has been the "theft" of information by the giant Facebook…
Trojan on Android steals data in Instant Messaging Apps
If 2017 was marked by different attacks on the network, this 2018 is not far behind and it is that since it began the year we have witnessed new malware that have been attacking and infecting the different operating systems. And if we talk about attacks, Android has undoubtedly always been in the spotlight of cybercriminals…
Site Isolation will be installed by default in Chrome 67 Beta
If we talk about web browsers, one of the first names that come to mind is Chrome, the popular Google browser. Some of the reasons why it is one of the most used today is the large number of open tabs that it supports, its ease of use thanks to its simple interface, the importance it gives to security and the large number of improvements that it incorporates in your new updates…
Vulnerability discovered in Windows Defender and security patch
Unfortunately, cyber attacks are the order of the day. For this reason and to protect our security and privacy, prevention is fudamental, and one of the first actions we must take to ensure that everything remains in order and not to have such dislikes is the installation of an antivirus on our computer…
AVCrypt: Attack that uninstalls your antivirus and encrypts your information
IT Security is one of the issues that most technologically concern in recent times, and that is that malware and ransomware attacks are unfortunately topics that are more on the agenda than we would like. That is why being informed about this type of attack, its prevention or how to act in case of being infected can be a great help if we are involved in such an unpleasant situation…
Signals and solutions to detect fake antivirus
Today the world of internet is used by millions of people every day, to perform searches on the web, information gathering, analysis but we also offer our personal information in many occasions without taking the necessary precautions. It is necessary that to prevent external attacks, we have some kind of defense on our device both at home and at work…
The best free antivirus Windows, Mac and Linux
Having a good antivirus to protect our computer is something we must keep in mind to always be protected from possible threats on our computer. It doesn't matter which operating system we use since having a good antivirus is important in each of them. You just have to keep in mind that when you go to install them, it is important to select the "custom" installation, so that you do not install "toolbars" by default or any additional software to the antivirus that you do not want…
Protect your bank details in online purchases
We don't have to be alarmed, since if we take the necessary measures and are consistent about what data we enter on the internet and where we do it, we probably don't have any problems. Even so, it does not hurt to follow a series of small tips, to be calmer in this regard. How to protect your credit card when shopping online Security Only secure websites One of the most important and transcendental recommendations is to be sure about the reliability of the website in which we are entering our data…
Best free proxy servers 2019 to navigate anonymously
Security must be one of the issues that are always present in all types of systems regardless of the size of the organization or the category of users who use these systems and the reason is more than enough, threats on the network are latent to each day and therefore we must take the necessary measures to increase security and privacy…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
Alert! Detect WhatsApp hacks through an SMS link
It is known by all that WhatsApp is one of the most used instant messaging applications worldwide. With more than 1200 million active users sending and receiving information in the form of text, images, videos or files, surely if we have the WhatsApp of a person within our reach we can collect enough information about it…
How to put password to folders or files on mobile or PC
Every day we are more people who have personal or confidential information on our computers, tablets, smartphones The fact that we use these devices as a work tool as well as personal, has caused the need to have some control over what we keep in your memory. There is no day that we do not carry any of these devices on top and that we go from here to there with him, without knowing on many occasions where we have left him or if we have closed all the sessions that we had open on the office computer for example…
Avoid remembering password in Chrome, Firefox, Safari or Edge
One of the best known features of current browsers is the possibility of storing the passwords of the multiple sites to which we access and this is partly functional if we want to access these sites quickly but it implies a security risk if more users access to the team or for any reason we move away and leave the team open…
Free managers to send encrypted and secure emails
The privacy and security of our information on the network is a vital issue for all of us who are managing this medium every day. It seems that our data is increasingly public, ask Google what it knows about you to verify it, and this has caused that more and more frequently we are more we are looking for different alternatives to protect as much as possible our information on the network and the computer …
See hidden browser passwords under dots
When we surf the internet continuously we are accessing sites where we need to register with a username and password. The problem with all this is that sometimes we may not select a password that is completely secure because of the fear of being forgotten. Also today, registering users and passwords on our computer is something totally common since a very large number of pages have a login in which we must register in order to access its content…
Features VPN protocols (OpenVPN, SSTP, L2TP, IKEv2 and PPTP)
One of the most used technologies today for reasons of security, connectivity and simplicity of use is the VPN (Virtual Private Network - Virtual Private Network) which, thanks to its design, allows us to define various forms of connectivity either at the level from home or corporate level. What is a VPN…
You can recover passwords with security questions in Windows 10
The field of security is one of the most concerned in these times. And it is that lately all the big companies worry about offering the best security measures to their users and thus improving their experience. And Windows of course is one of them. A few days ago at Solvetic we talked about a security flaw detected in the Windows 10 password manager and gave all the information regarding this issue…
Why avoid pirated software?
When we have a computer we like to install different software to increase the possibilities of the device. The first thing we have in mind is that in order for our order to remain safe, installing an antivirus must be something essential in our list. Remember that you have to select a reliable antivirus, since there are fake antivirus that can infect our computer…
Increase your protection with an antimalware for Mac
There are a number of programs that do not really have any useful purpose, but simply bother us with advertisements whose sole purpose is for the developer of the advertising software to get money for it. Where do they come from? Usually a Malware is packaged in an installer for other software . This is usually due to what we have downloaded, we have done from a site that was not reliable…
The best free antivirus for Linux 2017
Any operating system is vulnerable to attack. The security in our computers must be one of the main ones that we must take care of so that its operation is adequate and we avoid problems with our data. Computer viruses are a threat that can affect all the information that we have stored even though we have it protected and encrypted…
Prevent and detect phishing emails and prevent them from infecting you
The network has become a second home for most of us, and we do not spend a day browsing through it. We use the computer, smartphones and tablets frequently for this, these elements being almost a complement to us. The information we offer to the internet world is growing, leaving aside our privacy and security…
Security tools for Linux systems
When managing Linux environments it is important to know some tools that give us the possibility of increasing security levels over multiple environment parameters. We have already seen the best free antivirus for Linux. Today Solvetic will analyze some tools that will be practical in everything related to the improvement at the level of security in Linux environments…
How to protect yourself when surfing with free public WiFi
Currently in many public places such as libraries, parks, universities and others, we find free Wi-Fi areas where we can access this connectivity avoiding the consumption of our plan data and although this is interesting and practical we must be aware that it represents a failure of latent security for all the information that we handle in our devices since being an open or public network, all devices will be visible with their respective network data such as IP addresses, device name and others…
Security patches for critical vulnerabilities in Adobe
The giant Adobe, known by all for the large number of services it offers and that a matter of a month ago held a conference in which it presented the latest news of its products, today is in the spotlight of its users . On this occasion the news is not so good, since after its last security update a total of 67 errors have been detected, some of them critical in services such as Adobe Flash, Acrobat and Reader…
Do you use Intel processor? Vulnerability in Management Engine (IME)
Intel is one of the most powerful companies in the IT world and we all know that its focus is the processors which have evolved to currently have the 8th generation of these offering high speeds, multiple cores, hypervisors and many elements to make our equipment machines fast. Unfortunately, despite these benefits and benefits, not everything is satisfactory when we have Intel processors in our equipment…
Security tools for Linux systems
When managing Linux environments it is important to know some tools that give us the possibility of increasing security levels over multiple environment parameters. We have already seen the best free antivirus for Linux. Today Solvetic will analyze some tools that will be practical in everything related to the improvement at the level of security in Linux environments…
Download Windows Defender ATP Windows 10 Fall Creators
Microsoft shows us the new features available in Windows Defender ATP (Advanced Threat Protection) integrated in Windows 10 Fall Creators this fall. The expansion of the Windows Defender ATP service has been announced where they offer more and better security features where they improve: Prevention Detection Investigation Response time and administration WD ATP is a Windows Defender focused more on the business world to increase its security and can manage it integrally with the company's Windows systems…
The best free antivirus Windows, Mac and Linux
Having a good antivirus to protect our computer is something we must keep in mind to always be protected from possible threats on our computer. It doesn't matter which operating system we use since having a good antivirus is important in each of them. You just have to keep in mind that when you go to install them, it is important to select the "custom" installation, so that you do not install "toolbars" by default or any additional software to the antivirus that you do not want…
Avoid remembering password in Chrome, Firefox, Safari or Edge
One of the best known features of current browsers is the possibility of storing the passwords of the multiple sites to which we access and this is partly functional if we want to access these sites quickly but it implies a security risk if more users access to the team or for any reason we move away and leave the team open…
How to put password to folders or files on mobile or PC
Every day we are more people who have personal or confidential information on our computers, tablets, smartphones The fact that we use these devices as a work tool as well as personal, has caused the need to have some control over what we keep in your memory. There is no day that we do not carry any of these devices on top and that we go from here to there with him, without knowing on many occasions where we have left him or if we have closed all the sessions that we had open on the office computer for example…
Know who steals WiFi and how to avoid it
The first thing we have to detect is if our WiFi is being stolen. One of the first suspicions we have when they are stealing from us Wifi is generally that the internet connection becomes much slower especially at certain times of the day. If this is happening to you, the first thing you should do is perform a small test…
How to check shortened URLs without clicking on those links
The ease with which information moves in the internet world is abysmal. Every day we receive new messages in our email, social media account, WhatsApp etc. Many of these messages come from our friends, family, colleagues etc, but that does not mean that they can not contain any virus, malware or some type of attack such as the famous Ransomware, which can infect us…
How to erase and delete hard disk completely and safely
We have been told through the ages, whether at school, university, conferences, etc., that when we format a hard disk all the data stored there will be permanently deleted, the answer, today much later, is not true. Logically when we perform the process of formatting a disk we see the message "Full format" we can see that the information that was stored there is no longer visible, but this information still exists somewhere on the hard drive, Why …
How to erase and delete hard disk completely and safely
We have been told through the ages, whether at school, university, conferences, etc., that when we format a hard disk all the data stored there will be permanently deleted, the answer, today much later, is not true. Logically when we perform the process of formatting a disk we see the message "Full format" we can see that the information that was stored there is no longer visible, but this information still exists somewhere on the hard drive, Why …
Signals and solutions to detect fake antivirus
Today the world of internet is used by millions of people every day, to perform searches on the web, information gathering, analysis but we also offer our personal information in many occasions without taking the necessary precautions. It is necessary that to prevent external attacks, we have some kind of defense on our device both at home and at work…
The best free antivirus for Linux 2017
Any operating system is vulnerable to attack. The security in our computers must be one of the main ones that we must take care of so that its operation is adequate and we avoid problems with our data. Computer viruses are a threat that can affect all the information that we have stored even though we have it protected and encrypted…
Prevent and detect phishing emails and prevent them from infecting you
The network has become a second home for most of us, and we do not spend a day browsing through it. We use the computer, smartphones and tablets frequently for this, these elements being almost a complement to us. The information we offer to the internet world is growing, leaving aside our privacy and security…
Know and delete all my information on Google
Surely on more than one occasion we have heard the mythical phrase "Google knows everything . " Well, that expression is no joke since more and more data are collected by this search engine, and when we talk about data we do not refer only to information, but to our personal data. The information that Google collects is immense, and remains in its database…
Protect your bank details in online purchases
We don't have to be alarmed, since if we take the necessary measures and are consistent about what data we enter on the internet and where we do it, we probably don't have any problems. Even so, it does not hurt to follow a series of small tips, to be calmer in this regard. How to protect your credit card when shopping online Security Only secure websites One of the most important and transcendental recommendations is to be sure about the reliability of the website in which we are entering our data…
Why avoid pirated software?
When we have a computer we like to install different software to increase the possibilities of the device. The first thing we have in mind is that in order for our order to remain safe, installing an antivirus must be something essential in our list. Remember that you have to select a reliable antivirus, since there are fake antivirus that can infect our computer…
Free Spotify Premium account: New scam circulates on WhatsApp
WhatsApp is one of the most used instant messaging services worldwide by users. In fact, in 2017, more than 1.2 billion WhatsApp users worldwide were already exchanging daily more than 43 billion messages. This data is due in part to the popularity of WhatsApp, which rises like the foam in a certain way thanks to the constant work they do to incorporate new features and new features that are useful for its users in its App…
Firewalls to protect servers with Linux
CSF: It is probably the best known of all. CSF stands for ConfigServer Security & Firewall, and as the name implies, it is a firewall of the firm ConfigServer. It is updated periodically, its installation has no complications and supports several server control panels such as cPanel, DirectAdmin, and Webmin …
Security tools for Linux systems
When managing Linux environments it is important to know some tools that give us the possibility of increasing security levels over multiple environment parameters. We have already seen the best free antivirus for Linux. Today Solvetic will analyze some tools that will be practical in everything related to the improvement at the level of security in Linux environments…
How to manage WiFi networks with security and free apps
Nowadays being connected is something that seems essential for most of us. It seems we don't know how to live without Wifi. Wherever we go, we seek to connect and have access to the network. We have portable devices to be able to connect indifferently to the place where we are. When we talk about Wifi, we are talking about a wireless connection mechanism with electronic devices…
How to protect privacy in Linux
The security of the data and the privacy of the information are fundamental factors that will allow us to be confident that we will always have the integrity and availability of the information. When using a Linux distro, in this case we will focus our attention on Ubuntu 17.04, we have the misconception that we will not suffer any type of attack or threat such as malware virus, identity theft, among others, but nothing is further from the reality that the recent attacks that we have seen worldwide and that reach any type of operating system and, although it is true that Linux suffers fewer att…
Best free encrypted programs and applications for Mac 2017
When we work with a computer every day, we may need to encrypt certain documentation, both work and personal, as this can be confidential or very valuable to us and we do not want anyone to have access to it without our consent. We never know who can get to see our information, so it is interesting that we consider protecting our files through an encryption program …
Amazon S3 launches new cloud encryption and security features
Every day while we surf the web we are exposed to security attacks that can affect our experience and even make it difficult for us to preserve the privacy of our data. Amazon is one of the Internet portals that receives more visits from users willing to leave their bank details to make their purchases online…
5 steps to protect your data on the network and computer
When we work with the computer, the most valuable thing we can host in it is all our personal data. It is likely that we have different files, folders, documents etc. of great personal and professional value. In the event that something happened on our computer, having all this protected is of vital importance since the data created by the user is something that if it is lost it will not be able to be recovered…
How to find iPhone off or without battery
It is rare the person who has never had the bad luck of misplacing his mobile with the consequent disgust that this generates, due to the disappearance of the device in question and the amount of data we lose and that sometimes it is not possible to recover. Normally the solution is usually easy: The first thing we do is call the device waiting for some kind person to answer and return it to us…
Be careful WiFi users! Hacked WPA2 security protocol
When we surf the internet, we like to be safe and feel that the protection of WiFi networks is adequate. The most common encryption protocol that can be found in networks, houses, places with public WiFi etc., is called WPA2 which offers high security, at least to date. This is a system that seemed impossible to hack and break your encryption system, but we just received the news that this protocol has just been hacked…
Avoid remembering password in Chrome, Firefox, Safari or Edge
One of the best known features of current browsers is the possibility of storing the passwords of the multiple sites to which we access and this is partly functional if we want to access these sites quickly but it implies a security risk if more users access to the team or for any reason we move away and leave the team open…
Privacy in the internet world
The danger is not in giving certain data on the internet, the problem is not being aware of the level of information we are sending. With possible personal, business problems etc. that can cause us in the least thoughtful moment. Are certain services really free? Are my private personal information and data protected…
iPhone 7 and Samsung Galaxy S8 hacked during a security event
Security events are always a claim for large companies. During the first day of the Mobile Pwn20wn event held in Tokyo for the sixth time, an event designed for experts from around the world to test the safety of companies, three of the flagship ships on the market, were hacked. On November 1, different groups of security researchers managed to demonstrate that these devices are not safe from the new Zero-day attacks…
Google and Firefox 57.0.4 with security patches to Meltdown and Specter exploits
Cybersecurity experts Google Project Zero discovered "speculative execution" security vulnerabilities, which is a technical technique used by most modern processors (CPUs) to optimize performance. This security flaw allows a web software to view contents of the kernel memory, which is one that has access to passwords of all kinds…
Review and increase the security of your Mac computer
When we work with the computer, it is very important that we keep in mind that the security of our equipment is essential, as well as all those documents that we store in it. In addition, the world of internet increasingly hosts different dangers, which we must avoid if we want our browsing to be secure and we are not in any danger in terms of theft of information, privacy, data etc…
Review and increase the security of your Mac computer
When we work with the computer, it is very important that we keep in mind that the security of our equipment is essential, as well as all those documents that we store in it. In addition, the world of internet increasingly hosts different dangers, which we must avoid if we want our browsing to be secure and we are not in any danger in terms of theft of information, privacy, data etc…
Android P will prevent Apps from spying on you through the camera
The new Android software is being cooked and it seems that soon we will attend its birth. At the moment we know it as Android P. In Solvetic we already advance some aspects of which we had knowledge, such as that Android P in its appearance will mimic the top notch of iPhone X to collect sensors. Here you have all the information regarding this topic: Little by little we are getting to know more features and this new one that affects security certainly seems a success: This new version will prevent applications that are running in the background in the terminals from accessing the camera…
Android P will also prevent malicious Apps from recording your mobile audio
Yesterday we woke up to the news that the new version of Android known as Android P, was going to have a new function which would prevent inactive applications from our phone from accessing the camera. This way only applications that are in use will have access to the camera since if the application is in the background or inactive, the phone will fail and cause the camera to be locked…
iOS and macOS already have security patch for Specter and Meltdown
Last week we could see how the design vulnerabilities of the Intel, AMD and ARM processors known as Meltdown and Specter came to light. These two vulnerabilities have been classified as very dangerous, since they affected most of the smart devices jeopardizing the security of all of them. Note Remember that this security flaw is what allows a web software to see contents of the kernel memory that is one that has access to passwords of all kinds…
What is BlueBorne vulnerability and what hack it performs in Bluetooth
As we have mentioned many times, and we will continue to do so, privacy and information security are two of the pillars that must be taken care of daily in any operating system that we manage. It is no secret to anyone that we are in an online world where thousands of actions are carried out every minute and where personal data such as bank accounts, card numbers, identification numbers, address and many more are involved, and with the growing boom of attacks such as ransomware or malware this data may be violated and used for malicious purposes…
Download Linux Kernel 4.15 with patches for Specter and Meltdown
After a long wait, Linux developers have finally announced the release of Linux Kernel 4.15 for all users. A new version that is undoubtedly marked by security. Linus Torvalds, the main creator of Linux, said that the delay in the launch of this update was splashed by the appearance of Specter and Meltdow, so trying to solve these types of problems consumed more time than expected…
Manage your passwords with LastPass
The privacy and security of our information is an issue that we must always keep in mind. In our computer we store many documents and files that often contain information that we would like to be protected. Put PDF password Put password Word and Excel Put password Android documents Put password iPhone notes When we talk about passwords, we should know that the two most important requirements are to create secure passwords and find the best way to use them without having to remember all of them…
Facebook protects its users and prohibits cryptocurrency ads
If there is something we do not stop hearing about, and in the last months even more it is cryptocurrency or cryptocurrency. Daily we hear about some cryptocurrencies that are enjoying more fame and popularity such as Bitcoin, Ethereum, Litecoin or Monero among many others. In the case of what we could call the cryptocurrency star for being the most popular, Bitcoin, already reached a value of $ 10, 000 in the market and this figure seems to be increasing…
Firefox launches an extension to prevent Facebook tracking
The giant Facebook is not going through its best moment and it is that the social network par excellence, has been in the crosshairs of millions of users for two weeks when a report is published from Cambridge analytics. After jumping the news that the platform collects different information from users beyond what would be strictly necessary, closing accounts and deleting content has been one of the trending topics of the internet world…
Facebook back to the fore: The App collects call info and SMS
Last week different media around the world were filled with news about the collection of personal data by Facebook. The social network that had connected millions of people across the globe since its inception, saw its survival in danger after the publication of this news. After a few hard days for the company, this new week does not seem to be better for its workers since different security experts have discovered that the mobile applications of the platform have also been storing much unknown information for most users…
Site Isolation will be installed by default in Chrome 67 Beta
If we talk about web browsers, one of the first names that come to mind is Chrome, the popular Google browser. Some of the reasons why it is one of the most used today is the large number of open tabs that it supports, its ease of use thanks to its simple interface, the importance it gives to security and the large number of improvements that it incorporates in your new updates…
Trojan on Android steals data in Instant Messaging Apps
If 2017 was marked by different attacks on the network, this 2018 is not far behind and it is that since it began the year we have witnessed new malware that have been attacking and infecting the different operating systems. And if we talk about attacks, Android has undoubtedly always been in the spotlight of cybercriminals…
eye! Numerous Firefox extensions rated as Spam
When we surf the web it is important that the browser we select is the one that best suits our needs. Undoubtedly, Google Chrome is currently the most widely used by users, thanks to its great features and functions. But Chrome has always had a very close competitor, Firefox. And as in any situation of life, if something better appears, users do not take in adapting and changing sides…
RottenSys malware infects 5 million devices on Android
It seems that after a 2017 in which malware attacks have only expanded, this 2018 does not look like it will be more relaxed in that regard. One of the operating systems that has suffered the most in this regard is Android. There have been many criticisms that the company has heard about this issue and it seems that today it is again in the spotlight…
AVCrypt: Attack that uninstalls your antivirus and encrypts your information
IT Security is one of the issues that most technologically concern in recent times, and that is that malware and ransomware attacks are unfortunately topics that are more on the agenda than we would like. That is why being informed about this type of attack, its prevention or how to act in case of being infected can be a great help if we are involved in such an unpleasant situation…
Firefox launches an extension to prevent Facebook tracking
The giant Facebook is not going through its best moment and it is that the social network par excellence, has been in the crosshairs of millions of users for two weeks when a report is published from Cambridge analytics. After jumping the news that the platform collects different information from users beyond what would be strictly necessary, closing accounts and deleting content has been one of the trending topics of the internet world…
DiskWriter: Virus that blocks Windows and asks for $ 300 ransom
Cyber attacks are, unfortunately, the order of the day. And it is that cybercriminals are increasingly studying the different ways of infecting equipment and always with not very good purposes. In recent months we have not stopped hearing news related to this issue that affects the safety of all. In…
Facebook back to the fore: The App collects call info and SMS
Last week different media around the world were filled with news about the collection of personal data by Facebook. The social network that had connected millions of people across the globe since its inception, saw its survival in danger after the publication of this news. After a few hard days for the company, this new week does not seem to be better for its workers since different security experts have discovered that the mobile applications of the platform have also been storing much unknown information for most users…
RottenSys malware infects 5 million devices on Android
It seems that after a 2017 in which malware attacks have only expanded, this 2018 does not look like it will be more relaxed in that regard. One of the operating systems that has suffered the most in this regard is Android. There have been many criticisms that the company has heard about this issue and it seems that today it is again in the spotlight…
Watch out! Entering piracy websites could infect you with malware
It is no secret that piracy of copyrighted content has always been an issue in the sights of the authorities. Even so, the websites that provide content of this type have not stopped growing in recent times. Over the years, downloads through the internet have been growing, and this has caused hackers to have seen business in this field…
Your Firefox master password has been in danger for 9 years
When we browse the internet, one of the things that most often concern us is the security and privacy of our data. In many of the pages we access, we need a username and password. That is why, among others, one of the security options offered by the Firefox browser, is the possibility of using a master password which allows us to encrypt all other keys stored in the browser or email client…
How to protect and secure your WiFi wireless network
Nowadays one of the most vital and fundamental technologies worldwide for everything related to communication and web browsing is Wi-Fi which allows us to connect easily to a router or modem without using cables and It becomes an ally for many users who require access to the network in places where it is not possible to use LAN, cables, such as airports, libraries, restaurants, etc…
New Intel processors with Specter and Meltdown protection
Network attacks are becoming more dangerous and more constant. It is certainly a topic that worries users since their personal data, privacy and security can be affected by it. The vulnerabilities known as Specter and Meltdow detected at the end of last year, have meant more than a comedura of the head for many of the companies that were affected by this attack…
Banking Trojan detected in 42 low cost models of Android mobile
In these times that run one of the issues around the technology that most worries users is that of IT Security. The different types of malware that can infect our computers and steal information from us are a reality with which we live, so all measures are few to ensure the privacy of user data, and therefore their peace of mind…
Beware of selfies! They are sold on the Dark Web with data
Cybersecurity and data privacy are two of the issues that increasingly concern both companies and Internet users, for the large amount of personal data that may be circulating without our knowledge and the doubtful use that can be made thereof. All large companies are aware of this danger and study new measures to prevent such actions from being committed from their platforms…
MWC18: ESET launches protection for Smart TVs with a free antivirus
Today we all have devices connected in our homes such as computers, tablets or of course our Smartphones. However, more and more homes have Smart TV connected and therefore vulnerable to attack. How can I protect my Smart TV against malware attacks? To answer this question, ESET, a leading company in the IT security sector, has decided to announce during the MWC 2018 held in Barcelona, the launch of ESET Smart TV Security and has told us how it works. Wh…
Banking Trojan detected in 42 low cost models of Android mobile
In these times that run one of the issues around the technology that most worries users is that of IT Security. The different types of malware that can infect our computers and steal information from us are a reality with which we live, so all measures are few to ensure the privacy of user data, and therefore their peace of mind…
Beware of selfies! They are sold on the Dark Web with data
Cybersecurity and data privacy are two of the issues that increasingly concern both companies and Internet users, for the large amount of personal data that may be circulating without our knowledge and the doubtful use that can be made thereof. All large companies are aware of this danger and study new measures to prevent such actions from being committed from their platforms…
DiskWriter: Virus that blocks Windows and asks for $ 300 ransom
Cyber attacks are, unfortunately, the order of the day. And it is that cybercriminals are increasingly studying the different ways of infecting equipment and always with not very good purposes. In recent months we have not stopped hearing news related to this issue that affects the safety of all. In…
Best free antivirus for Android 2017 mobile
The use of mobile devices has become a necessity in the different areas of our lives. It is normal that both a phone or a Tablet end up storing all the information that we generate daily and that there comes a time when we do not really know about all the space we have occupied in it. According to a study issued by Nokia, one of the leaders of mobile telephony, Android systems take 81% of virus attacks worldwide…
Phishing and its daily threat
Although we may consider ourselves lucky or lucky, the above cases are nothing more than attempts to violate our privacy and blatantly steal our money and our identity, this is what is known as Phishing malicious attacks where the perpetrator pretends to be someone more to try to inspire "trust" and thus take away money, data, or force us to install a program with which we can infect our device…
Do you use Intel processor? Vulnerability in Management Engine (IME)
Intel is one of the most powerful companies in the IT world and we all know that its focus is the processors which have evolved to currently have the 8th generation of these offering high speeds, multiple cores, hypervisors and many elements to make our equipment machines fast. Unfortunately, despite these benefits and benefits, not everything is satisfactory when we have Intel processors in our equipment…
You can recover passwords with security questions in Windows 10
The field of security is one of the most concerned in these times. And it is that lately all the big companies worry about offering the best security measures to their users and thus improving their experience. And Windows of course is one of them. A few days ago at Solvetic we talked about a security flaw detected in the Windows 10 password manager and gave all the information regarding this issue…
Best free antivirus for Android 2017 mobile
The use of mobile devices has become a necessity in the different areas of our lives. It is normal that both a phone or a Tablet end up storing all the information that we generate daily and that there comes a time when we do not really know about all the space we have occupied in it. According to a study issued by Nokia, one of the leaders of mobile telephony, Android systems take 81% of virus attacks worldwide…
Know who steals WiFi and how to avoid it
The first thing we have to detect is if our WiFi is being stolen. One of the first suspicions we have when they are stealing from us Wifi is generally that the internet connection becomes much slower especially at certain times of the day. If this is happening to you, the first thing you should do is perform a small test…
Avoid being infected by malvertising Do you know how to protect yourself?
We are in a world where security is one of the pillars that we must always keep in mind and be aware of every moment since the attackers every minute are developing new techniques to find vulnerabilities and steal information or perform their malicious activities. We have seen how the attacks have increased and one of them is malvertising and that is why today Solvetic will make a detailed analysis of this new threat and we will see how it can affect us if we do not take the necessary protection measures…
Free managers to send encrypted and secure emails
The privacy and security of our information on the network is a vital issue for all of us who are managing this medium every day. It seems that our data is increasingly public, ask Google what it knows about you to verify it, and this has caused that more and more frequently we are more we are looking for different alternatives to protect as much as possible our information on the network and the computer …
How to erase and delete hard disk completely and safely
We have been told through the ages, whether at school, university, conferences, etc., that when we format a hard disk all the data stored there will be permanently deleted, the answer, today much later, is not true. Logically when we perform the process of formatting a disk we see the message "Full format" we can see that the information that was stored there is no longer visible, but this information still exists somewhere on the hard drive, Why …
Watch out! New zero-day attack introduces malware in Adobe Flash
After hearing the news yesterday about the attack suffered by the WPA2 security protocol of WiFi networks, it seems that many of the internet users panicked when they did not know what consequences this event could have. Well, if this had not been enough, today Solvetic echoes the news that happens on the day…
Chrome and Firefox mark Torrentz2.eu as dangerous web
Chrome and Firefox are two of the most used browsers worldwide. The concern for the security and privacy of users is one of the issues that has most worried these companies in recent months. Both browsers have a security function which ensures that certain web pages are blocked since they can be malicious for different reasons…
Fake technical supports block your browser due to Chrome failure
Cyber attacks and cyber attacks are two of the most current issues today, and it is that cybercriminals who perform this type of action are pending any failure in order to reach their goals. For all technology giants, IT Security is one of the main issues of concern and Google was not going to be less. La…
How to surf the internet more securely
Browsing the internet is very common among the population since its access has been increasingly facilitated. We can do them from your home computer, work or from any of our mobile device such as a smartphone or tablet. We access our mail, social networks, and other websites where we enter different information about us…
Unbuntu 18.04 wants to start collecting data from your system
For Linux users, Ubuntu is one of their favorite distributions. This distribution of free software based on GNOME, announced that next April 26 will launch the Ubuntu 18.04 a new version of this distro highly anticipated by many Linux fans. However, not everything is as beautiful as it seems since news about the new privacy policy has set off alarms…
The best free antivirus for Linux 2017
Any operating system is vulnerable to attack. The security in our computers must be one of the main ones that we must take care of so that its operation is adequate and we avoid problems with our data. Computer viruses are a threat that can affect all the information that we have stored even though we have it protected and encrypted…
Sophos warns about new Ransomware trends
Yesterday, November 16, the Sophos Day 2017 was held, which brought together more than 400 cybersecurity professionals. The leading global security company for the protection of networks and edpoints presented an analysis about Ransomware. The event was led by the analysis of current trends in cyber threats and hacking tools…
Bad Rabbit: Next large-scale ransomware attack?
We are still aware of the latest attacks received this year 2017, as were the well-known WannaCry or Petya. We have on the horizon a new attack known as "Bad Rabbit", a name that links the Darknet website in the screenshot of the rescue. At this time Bad Rabbit ransomware has infected several important Russian media and news, such as Interfax and Fontanka…
The best free antivirus for Linux 2017
Any operating system is vulnerable to attack. The security in our computers must be one of the main ones that we must take care of so that its operation is adequate and we avoid problems with our data. Computer viruses are a threat that can affect all the information that we have stored even though we have it protected and encrypted…
Free tools to monitor and analyze network traffic
One of the main tasks that as administrators we must perform is to ensure the optimal functioning of the network in our organization, and why not, on a personal level, since many factors and user productivity depend on this factor. A slow or faulty network is synonymous that something is wrong and therefore the users and computers of the domain will not have the same speed to perform their daily activities and therefore many internal and external elements will be affected…
Try in Firefox 59 your new feature to bookmark unsafe websites
Having a good browser when we move through the network is increasingly important for users. Currently the fight to be on the podium of Chrome and Firefox has caused both to strive to include improvements that conquer the user. The new recent updates of both have left us improvements in something as important as speed…
Best free encrypted programs and applications for Mac 2017
When we work with a computer every day, we may need to encrypt certain documentation, both work and personal, as this can be confidential or very valuable to us and we do not want anyone to have access to it without our consent. We never know who can get to see our information, so it is interesting that we consider protecting our files through an encryption program …
How to put password to folders or files on mobile or PC
Every day we are more people who have personal or confidential information on our computers, tablets, smartphones The fact that we use these devices as a work tool as well as personal, has caused the need to have some control over what we keep in your memory. There is no day that we do not carry any of these devices on top and that we go from here to there with him, without knowing on many occasions where we have left him or if we have closed all the sessions that we had open on the office computer for example…
Best free antivirus 2019 for Windows 10
One of the first most important things that we should think about having in our computers is to have a good antivirus installed since it will help us to sleep peacefully in the face of the number of possible threats that haunt us. Nowadays it is very easy to find different scams and thefts of information on the web so we must be extremely careful and be careful when surfing the web…
Phishing and its daily threat
Although we may consider ourselves lucky or lucky, the above cases are nothing more than attempts to violate our privacy and blatantly steal our money and our identity, this is what is known as Phishing malicious attacks where the perpetrator pretends to be someone more to try to inspire "trust" and thus take away money, data, or force us to install a program with which we can infect our device…
What is BlueBorne vulnerability and what hack it performs in Bluetooth
As we have mentioned many times, and we will continue to do so, privacy and information security are two of the pillars that must be taken care of daily in any operating system that we manage. It is no secret to anyone that we are in an online world where thousands of actions are carried out every minute and where personal data such as bank accounts, card numbers, identification numbers, address and many more are involved, and with the growing boom of attacks such as ransomware or malware this data may be violated and used for malicious purposes…
How to check shortened URLs without clicking on those links
The ease with which information moves in the internet world is abysmal. Every day we receive new messages in our email, social media account, WhatsApp etc. Many of these messages come from our friends, family, colleagues etc, but that does not mean that they can not contain any virus, malware or some type of attack such as the famous Ransomware, which can infect us…
YouTube Kids update to create profiles and protect minors
YouTube is the largest video platform worldwide developed by Google in which we find millions of videos of all kinds at our disposal. Many of us have not verified that within the whole scheme that YouTube offers its users we have a section dedicated to the little ones which has the name of YouTube Kids…
Facebook protects its users and prohibits cryptocurrency ads
If there is something we do not stop hearing about, and in the last months even more it is cryptocurrency or cryptocurrency. Daily we hear about some cryptocurrencies that are enjoying more fame and popularity such as Bitcoin, Ethereum, Litecoin or Monero among many others. In the case of what we could call the cryptocurrency star for being the most popular, Bitcoin, already reached a value of $ 10, 000 in the market and this figure seems to be increasing…
Phishing attack uses the message "Connect with Facebook
Cyber criminals do not stitch without thread and spend all the cartridges and possible options to reach their goals. In this case they have found their reef in the phrase "Connect with Facebook" so recurring on some websites. Pressing this button causes an unwanted redirection by the user and is how they make the scam possible. Th…
How to protect privacy in Linux
The security of the data and the privacy of the information are fundamental factors that will allow us to be confident that we will always have the integrity and availability of the information. When using a Linux distro, in this case we will focus our attention on Ubuntu 17.04, we have the misconception that we will not suffer any type of attack or threat such as malware virus, identity theft, among others, but nothing is further from the reality that the recent attacks that we have seen worldwide and that reach any type of operating system and, although it is true that Linux suffers fewer att…
Alert! Email scam to steal data from Netflix subscribers
Scams are the order of the day in the internet world. Phishing attacks through emails are nothing new, but this does not prevent many people from still biting the hook. Hackers who are the most ingenious, do not miss opportunities to try to scam people thanks to the popularity of large companies. This time the claim has been Netflix, and the victims all their subscribers…
Skygofree: Android spy virus steals messages, records and takes photos
Sometimes reality surpasses fiction. And it is that cybersecurity attacks are more the order of the day than ever. Cybercriminals devise lots of methods to infect computers with malware and get away with it. Security patches created for Specter and Meltdown have been very popular in recent days and lots of users have decided to download these patches to protect their equipment…
KB4078130 for Windows: Troubleshooting Intel Specter Variant 2
If there is a topic that is on everyone's lips when it comes to technology and security, it is undoubtedly that of the Specter and Meltdown vulnerabilities, which is giving the big tech giants a headache in recent days. Both allow cyber attackers to reach information that the central disk drive should never leave…
Loapi, new Trojan on Android that can disable your mobile
During this 2017, we have not stopped receiving news about different attacks for data theft, passwords etc. A problem that, unlike being solved, seems to increase over time as we are increasingly interconnected in every way. Android remains one of the key points for virus creators. But unlike other occasions perhaps less dangerous, in this case the malware turns out to be very strong…
Meet the new Ransomware attack with a planet name: Saturn
Cyberattacks is one of the issues that most headaches give to large technology companies, which ensure the IT security of its users. During the last months of which we have heard the most have been the popular Specter and Meltdown and we have heard a lot about how to protect ourselves from them. For the giant Microsoft security is important and has already put measures to recover from a Ransomware attack that we already told you in Solvetic: Now, and as reported by Bleeping Computer, the Ransomware attacks have returned after giving us a small truce…
Android P will also prevent malicious Apps from recording your mobile audio
Yesterday we woke up to the news that the new version of Android known as Android P, was going to have a new function which would prevent inactive applications from our phone from accessing the camera. This way only applications that are in use will have access to the camera since if the application is in the background or inactive, the phone will fail and cause the camera to be locked…
Android P will prevent Apps from spying on you through the camera
The new Android software is being cooked and it seems that soon we will attend its birth. At the moment we know it as Android P. In Solvetic we already advance some aspects of which we had knowledge, such as that Android P in its appearance will mimic the top notch of iPhone X to collect sensors. Here you have all the information regarding this topic: Little by little we are getting to know more features and this new one that affects security certainly seems a success: This new version will prevent applications that are running in the background in the terminals from accessing the camera…
MWC18: ESET launches protection for Smart TVs with a free antivirus
Today we all have devices connected in our homes such as computers, tablets or of course our Smartphones. However, more and more homes have Smart TV connected and therefore vulnerable to attack. How can I protect my Smart TV against malware attacks? To answer this question, ESET, a leading company in the IT security sector, has decided to announce during the MWC 2018 held in Barcelona, the launch of ESET Smart TV Security and has told us how it works. Wh…
Two new Avira Apps land in Microsoft Store
The Microsoft application store known as the Microsoft Store is increasingly receiving applications from leading Software developers. In this case it has been Avira who has launched the publication of two apps called Avira Cleaner Express and Avira Password Manager. Avira is a computer security company that offers antivirus for different operating systems…
A vulnerability in Skype allows to obtain system privileges
Conversations via internet and video calls are increasingly used and that is why Skype has been gaining strength over time. No doubt a good application if we want to keep a video call with people who are on the other side of the world. However, this Microsoft application is in the spotlight this week, as a security flaw in the update process can allow an attacker to gain system privileges on a vulnerable PC…
Meet the new Ransomware attack with a planet name: Saturn
Cyberattacks is one of the issues that most headaches give to large technology companies, which ensure the IT security of its users. During the last months of which we have heard the most have been the popular Specter and Meltdown and we have heard a lot about how to protect ourselves from them. For the giant Microsoft security is important and has already put measures to recover from a Ransomware attack that we already told you in Solvetic: Now, and as reported by Bleeping Computer, the Ransomware attacks have returned after giving us a small truce…
Found 85 apps in Play Store that steal passwords
That security is one of the issues that worries Google the most is not something new. And is that "the great G" constantly works to offer reliable and safe products to its users. They have already recorded their concern for the safety of their users when they launched their own antivirus function for Chrome users or when they announced that they would remove many of the Android applications available for download on their Google Play platform, news that we already echoed in Solvetic…
Why avoid pirated software?
When we have a computer we like to install different software to increase the possibilities of the device. The first thing we have in mind is that in order for our order to remain safe, installing an antivirus must be something essential in our list. Remember that you have to select a reliable antivirus, since there are fake antivirus that can infect our computer…
Profile of the computer attacker
Although our security measures probably do not depend on the profile of the attacker, it does allow us to know the motivations or reasons for trying to break the different third-party information systems. By knowing the attacker we can establish additional prevention measures, such as developing an image that does not make us so attractive to those who can try to make an attempt to hack against our infrastructure…
How to respond to a security breach
Although many managers do not like to hear this, we must allocate resources and a plan for when it happens and it is not a matter of being defeatist or negative, it is that as good administrators of the technology area we must be prepared for the worst possible scenario, so We have to have a plan for when a gap happens…
Best free encrypted programs and applications for Mac 2017
When we work with a computer every day, we may need to encrypt certain documentation, both work and personal, as this can be confidential or very valuable to us and we do not want anyone to have access to it without our consent. We never know who can get to see our information, so it is interesting that we consider protecting our files through an encryption program …
Google and Firefox 57.0.4 with security patches to Meltdown and Specter exploits
Cybersecurity experts Google Project Zero discovered "speculative execution" security vulnerabilities, which is a technical technique used by most modern processors (CPUs) to optimize performance. This security flaw allows a web software to view contents of the kernel memory, which is one that has access to passwords of all kinds…
eye! Numerous Firefox extensions rated as Spam
When we surf the web it is important that the browser we select is the one that best suits our needs. Undoubtedly, Google Chrome is currently the most widely used by users, thanks to its great features and functions. But Chrome has always had a very close competitor, Firefox. And as in any situation of life, if something better appears, users do not take in adapting and changing sides…
Try in Firefox 59 your new feature to bookmark unsafe websites
Having a good browser when we move through the network is increasingly important for users. Currently the fight to be on the podium of Chrome and Firefox has caused both to strive to include improvements that conquer the user. The new recent updates of both have left us improvements in something as important as speed…
Even if you deactivate the location on Android, Google knows where you are
In Google they offer many applications and services that make our day-to-day life much easier, some of which are your personal assistant, Google Assistant, your map and Google Maps or your Google Chrome browser. At Google they update their services almost weekly to offer users an improved and rewarding experience…
Best free antivirus for Android 2017 mobile
The use of mobile devices has become a necessity in the different areas of our lives. It is normal that both a phone or a Tablet end up storing all the information that we generate daily and that there comes a time when we do not really know about all the space we have occupied in it. According to a study issued by Nokia, one of the leaders of mobile telephony, Android systems take 81% of virus attacks worldwide…
Google now pays for vulnerability detection in Play Store
In the developer event called Playtime, Google is always one of the main representatives with Play Store applications. In this event, new tools and good practices are sought for greater user safety. This time the Google team has presented a series of new tools for developers, new features for the Play Store and even a security reward program…
Alert! Malicious applications as a complement to Minecraft
The number of millions of people using the Android operating system is increasing. That is why lately we find ourselves more frequently so that our device may be infected or in danger for some reason. A few days ago we saw how the attack on the security protocol for WPA2 WiFi networks had infected about 41% of Android devices…
Articles