Man in the Middle Attack
What it is? This type of attack happens when a malicious actor introduce themselves in between you and the other systems/network you are communicating with. Analogy Passive strategy – John and you are in...
What is LLM? Large Language Models (LLMs) are like the brainy know-it-alls of the computer world, but way cooler because they don’t brag about their SAT scores. Imagine a robot that’s swallowed a library...
What it is? This type of attack happens when a malicious actor introduce themselves in between you and the other systems/network you are communicating with. Analogy Passive strategy – John and you are in...
The “I would update later” virus is one of the most common infections, and it is 100% preventable. The most effective attack vector takes effect from humans. Social engineering, weak password, and not updating/upgrading...
Cybersecurity / Easy Fix / Updates / Upgrades / Vulnerability
by Jose Cruz · Published June 26, 2019
The majority of us, if not all, have seen the message that says “Press Here to Update now or Schedule for Later.” I am sure that 99.9% of the time you press the let’s...
Bluetooth / Easy Fix / Free / Risk / Vulnerability / Wi-Fi
by Jose Cruz · Published March 24, 2019 · Last modified December 16, 2021
How comfortable would you be walking alongside someone who is constantly yelling: “Hey, do I know you?!! Hey, do I know you?!!! Hey, I know you? let’s talk”? That is pretty much what you...
The Cyberworld is full of risk, on this post I would like to give you six technics that will help reduce your risk surface. The first recommendation on the list is the most important...
If you do not use our…, if you click that link.., if you don’t change your password…. Have you heard these phrases from cybersecurity professionals or marketers before? I am sure you have. This strategy...
Cybersecurity / essential / Incident Response / Risk
by Jose Cruz · Published September 24, 2018 · Last modified September 25, 2018
Reality The reality is that we will never know when are you going to be hacked or be able to eliminate all possible risks to a system, network or application. Dealing with the reality of...
Delete Doesn’t Mean Destroyed I am pretty sure most of you think that when you delete a file or move to the recycle bin, it is removed from the system and is not recoverable....
Bookmarks / essential / webpages
by Jose Cruz · Published May 26, 2018 · Last modified September 20, 2018
Essential Webpage Today you finally decided to be more organized and start searching online for a list solution app. After typing “Top 10 apps to create a task list” you are overwhelmed by the...
Cookies / Cybersecurity / Easy Fix / Internet Sessions / Wi-Fi
by Jose Cruz · Published March 13, 2018 · Last modified March 29, 2018
How many of you log off your accounts after completing a bank transaction? Hopefully, this is your normal process while on a shared or public computer but, even in your private system, it is...
Cybersecurity / Microsoft / Operating System / Updates / Vulnerability
February 28, 2018
Cookies / Cybersecurity / Easy Fix / Internet Sessions / Wi-Fi
The Biggest Mistake Many of Us Make Online
March 13, 2018