Privacy
Security

Social Engineering, concrete examples and how to defend yourself

In the previous post, we introduced the concept of social engineering, exploring how this technique organizes itself, studies its victims, and attacks them. We concluded that the best defense strategy is knowledge. In this new article, we will put these...

Privacy
Security

Social Engineering, the cyber attack exploiting human weakness

Social engineering is a cunning technique that exploits human weaknesses to carry out attacks and obtain sensitive information for fraudulent purposes. There is no antivirus that can fully protect you from this threat. This technique relies on manipulating people through...

Privacy

Gaia-X and Data Sovereignty, why they matter for Europe

What is Gaia-X? Gaia-X is a major European project that aims to create a standard for the creation of a European Cloud that will be based on a transparent and sovereign data infrastructure. The aim of the project is the...

News
Privacy
Solutions

Be Compliant with the Cookie Law for Free with Open Source Software

With the arrival of the GDPR in 2018, the Cookie Law issued in 2014 began to show some weaknesses. It has therefore been strengthened and since the beginning of 2022 the owners of all websites must comply with the new...

Privacy
Security
Solutions

Emotet, the virus stealing email fragments to be more credible

Recently, users have reported emails being sent under their name, both to unknown recipients and contacts. Messages contained a virus-infected Office documents attached to them. What we have in front of our eyes is the return of Emotet, a very...

Privacy
Security
Solutions

Email Spoofing: emails from my email address that I didn’t send

Email spoofing is a technique used to send emails making the victim believe they are receiving emails from a trusted person. It is usually used in spam emails or to convey attacks. Although you may think that forging a sender's...

We use cookies to provide you a better browsing experience, by continuing you accept their use. For more information visit the Privacy policy page.

Accept