<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>
  • content/es-es/images/repository/isc/2017-images/spam-img-01.jpg

    Spam y Phishing

    Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

    Read more
  • content/es-es/images/repository/isc/2017-images/malware-img-54.jpg

    What is Spyware? - Definition

    Spyware is something of a grey area, as there’s really no copy-book definition of it. As its name suggests, however spyware is generally loosely defined as software that’s designed to...

    Read more
  • /content/es-es/images/repository/fall-back/55.jpg

    Robo de dinero electrónico

    In addition to using Trojan viruses to steal money from personal and corporate bank accounts , cybercriminals are also creating and distributing Trojan spy programs that steal ‘online currency’ from users’ personal e-wallets – for example, from a user’s e-gold or WebMoney account...

    Read more
  • content/es-es/images/repository/isc/2017-images/mobile-img-05.jpg

    Amenazas para móviles

    The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive-by attack may seem positive, but only at a first glance.The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive...

    Read more
  • content/es-es/images/repository/isc/2017-images/malware-img-32.jpg

    ¿Quién crea el malware?

    If you’re mystified as to why someone would want to put so much effort into attacking your computer or your mobile device, let’s take a moment to consider the type of people that become malware creators… and how they benefit from creating malware...

    Read more
  • content/es-es/images/repository/isc/2017-images/virus-img-03.jpg

    Ciberdelincuencia y Ciberdelitos

    In everyday life, there are vandals that seem to enjoy destroying things – even though it can be hard to understand how they derive any tangible benefit from their acts of vandalism. Unfortunately, the same type of behaviour is also present in cyberspace...

    Read more
  • content/es-es/images/repository/isc/2017-images/virus-img-16.jpg

    ¿Qué es un troyano?

    Trojans are malicious programs that perform actions that have not been authorised by the user...

    Read more
  • /content/es-es/images/repository/fall-back/07.jpg

    ¿Los ordenadores Mac son más seguros que los ordenadores de sobremesa?

    In the past, there was a general belief that Macs were much more secure than Windows PCs – and that Mac users were much less likely to suffer from the negative effects of malware and cyber-attacks. However, the events of recent years have led many users to question just how secure Macs really are.

    Read more
  • content/es-es/images/repository/isc/2017-images/malware-img-57.jpg

    The Rise of Ransomware – Most Glaring Examples from 2015-2016:

    Ransomware: It's the stuff of nightmares: You open your laptop one morning and discover all your documents and pictures have been encrypted or that non-ransomware programs prevent your computer from booting. 

    Read more
  • content/es-es/images/repository/isc/2017-images/malware-img-48.jpg

    Ransomware que es

    Ransomware Trojans are a type of cyberware that is designed to extort money from a victim...

    Read more
Resources not available.