Dear readers, It is a pleasure to be able to communicate with you again. I would like to take this opportunity to send a warm greeting of solidarity to our Peruvian brothers and readers for the tragedy that occurred with the earthquake that shook their country in mid-August. All our attention from here, wishing them a speedy recovery.
On this occasion we will talk about one of the scourges and risks that have become fashionable in the world of security: computer hacking and all the risks that are associated with it, such as the theft of confidential information, the theft of data through Trojans for espionage of remote machines and the extremely popular phishing (theft of financial information).
If we stop for a moment to think about what has happened since the enabling of the network of networks, at the beginning of the 90s, it is not crazy to say that what at one time was thought as the possibility to intercommunicate with the world, became a threat to people and companies, because no one can be sure that their information is 100% safe.
The most serious thing is that at this point there seems to be no real solution and such a statement is based on the fact that protection techniques are developed as a response to a particular fact, so it could be thought that always those who take the initiative - in this case computer criminals - are one step ahead than those who are engaged in countering such acts. In other words, man's ingenuity has no limits and the truth is that there are no foolproof security systems.
It is also serious that the Internet itself has become the channel through which circulate, in addition to the thousands of useful things we know, those dangerous instructions to become a hacker or hacker, without much effort or difficulty.
That is why it does not hurt that the people in charge of computer security in companies and even any ordinary citizen, regularly ask themselves is my information safe? Internet browsing and access routines can give us an idea of whether you are at least somewhat safe. From time to time I use the protection tools, because you never know what is behind the shadows of virtuality.
Leave your comment