Phishing is an attack technique in which a cybercriminal creates a fraudulent copy of a page in a social network or of an email and contacts the user to ask... read more →
Mining cryptocurrencies through the equipment of users without their consent is known as cryptojacking. This concept comes from the words “crypto” (cryptography) and “hijacking”. In computer science, these concepts aren’t... read more →
Cristina Carrascosa is the only Spanish woman chosen to be part of the Observatory and Blockchain forum of the European Union. As a lawyer, her mission in this working group... read more →
Logging onto any of your social networks or services on the Internet; putting the correct username and password and finding access denied because someone has changed your key is the... read more →
Let’s get to the point. We can say that no one forgets their electronic devices when it’s time to take a vacation. Actually, it doesn’t matter if it’s a business... read more →