All articles from Security

    May 2022

    18 May
    • How to avoid Bitcoin and cryptocurrency scams?

      The use of Cryptocurrencies is increasingly widespread, be it the well-known Bitcoin, or any of the others that have been emerging in recent years. Virtual currencies have the advantage of being secure, anonymous, and immediate. One of their main allures is that they do not require a bank or other types of intermediaries to function.

    17 May
    • How to know if your phone is being tracked?

      Spying on someone's phone is a crime in most places, and trust is a basic pillar for any relationship. No, we are not going to tell you how to spy on someone's phone, but we do want to help you in case you are being spied on. Your right to privacy is fundamental, so we will explain some basic tips. Remember that if someone has been spying on you without your consent, in most cases you can report it to the authorities.

    • Block spam calls: on iPhone, Android

      If you would like to stop annoying calls, there are apps specially designed to identify these numbers, then filter and block them. These apps usually request access to some phone details to work optimally, however, if you don't want an application to have access to your call history, you can block every suspicious number on your phone manually. We also explain below how it works.

    16 May
    • How can you tell if the app is real or fake?

      More people are using smartphones worldwide, and connection speeds are constantly improving. Attracted by this tech phenomenon, cybercriminals are increasingly exploiting mobile apps to gain access to users' private personal information. It's possible to reduce the risk of being exposed to one of these fake apps, and this FAQ will show you how to get started.

    12 May
    • How to check an email address

      Emails are a powerful weapon for hackers and fraudsters, with some email addresses being created for the sole purpose of spamming other users. Such emails are used to steal important information, which could even include your financial information. Thankfully, you can use the following process to verify that an email address is authentic.

    5 May