Category: Security System

secure kitchen

4 things that will make your kitchen Safe and Secure

Our home should be a safe place, and therefore all the rooms that comprise it should also be. However, it is inevitable that there are certain hazards or areas of greater risk than others, especially when small children live in homes. That is why safety in the kitchen is so important , and this is one of the rooms that can hide the most dangers for our crazy little ones. When there are children at home, the dangers multiply, and that is their inexhaustible curiosity and restlessness, makes them want to see everything, touch it, know it, discover everything hidden...

wireless speaker

Bluetooth, a flaw endangers your devices

A Bluetooth vulnerability would allow cybercriminals to track the activity of fitness tracker wearers or use Apple devices Together with Wi-Fi, Bluetooth is undoubtedly the best known and most used wireless connection. Now present on any type of device (from smartphones to smart bulbs, via wireless speaker, smartwatch and fitness tracker) it is extremely versatile and allows you to connect two devices without consuming too much energy. Despite the widespread use (or perhaps because of this), it sometimes happens that hackers are able to discover, and exploit for their sinister purposes, the flaws of the Bluetooth firmware . The last...

Wireless mouse and keyboard alarms

Wireless mouse and keyboard alarms: may be hacked

Computer researcher Marcus Mengs has discovered security flaws that affect wireless keyboards and mice and endanger our data If you have a wireless mouse or keyboard then be very careful: they could become the front door for viruses or malware and in a few minutes a hacker could use them to enter your PC and steal all your data , as well as destroy them. The alarm comes from the researcher Marcus Mengs, who explains how the problem lies mainly in some security flaws of the dongle (the small USB key used to send input from mice and keyboards, but...

Xiaomi announces a security camera that also controls home gadgets

Gateway and security camera all in one: Xiaomi security camera that also controls home gadgets

There are product ranges in which Xiaomi already has more than a dozen of them in the market. Some of them are headphones or mobile phones, but security cameras are another of Xiaomi’s specialties. The last one that they have launched to the market not only can be placed easily on any metallic surface, but also serves as a gateway to control all the smart devices of the home. Xiaomi Aqara Smart Camera G2 This camera, the Aqara Smart Camera G2 (Gateway Edition) has a magnetic base , thanks to which we can place it on any metal surface, like...

Samsung-Galaxy-S9 bloatware

What is bloatware and how to remove it from your Android mobile

You turn on the mobile that you just bought, and you see that the application drawer is full of applications that you have not installed or probably use during the entire time you have the phone. That is the bloatware. Although manufacturers are increasingly benevolent with users and little by little many have been leaving aside the habit of flooding the software of their phones of all kinds of applications , there are still those who refuse to part with these add-ons. that a good part of its users demonstrate not having the desire to use them. But not all...

Through ethical hacking , computer security knowledge is used to test systems, networks or electronic devices, looking for all those vulnerabilities that can be exploited to take those measures that avoid putting our system at risk

What is ethical hacking?

A specialist in ethical hacking must know how to determine the risks of the devices or components that are within their reach in order to strengthen their protection and evaluate the possible assets, threats or vulnerabilities. Despite the negative connotations that the media have given to the term Hacker, the truth is that this type of professionals in the field of computer security use all their skills and knowledge to identify and efficiently manage possible security breaches that may arise in a company or system. Ethical hacking and cybersecurity You could say that ethical hacking is a tool for data...