![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cyber-for-all_s.webp)
Cyber for all - Page 2
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
![How is the security of a mobile application evaluated?](https://www.tarlogic.com/wp-content/uploads/2024/06/Como-se-evalua-la-seguridad-de-una-aplicacion-movil.webp)
How is the security of a mobile application evaluated?
Assessing the security of a mobile application is essential to detect problems in apps and mitigate them before cybercriminals exploit them In early May 2024, it became public that[...]
Read more![Infostealer: How criminals steal device credentials](https://www.tarlogic.com/wp-content/uploads/2024/05/Infostealer-1.webp)
Infostealer: How criminals steal device credentials
Infostealer is malware that can steal passwords, cookies and other credentials from a device’s browsers, apps and documents «Meow, meow, meow». In this way, an X account an[...]
Read more![How shimming works and how you can prevent it](https://www.tarlogic.com/wp-content/uploads/2024/04/Asi-es-el-shimming.webp)
How shimming works and how you can prevent it
Shimming is a malicious technique that allows criminals to steal EMV microchip data from bank cards to create fraudulent cards If there is one economic sector that cybercriminals h[...]
Read more![Malvertising, when ads are a trap](https://www.tarlogic.com/wp-content/uploads/2024/04/Malvertising-3.webp)
Malvertising, when ads are a trap
Malvertising is a malicious technique that involves using fake ads on search engines and social networks to deploy malware What are the products or services that people want to buy[...]
Read more![What is SEO poisoning?](https://www.tarlogic.com/wp-content/uploads/2024/04/Envenenamiento-SEO.webp)
What is SEO poisoning?
SEO poisoning is a malicious strategy in which social engineering techniques and malware are combined to commit fraud and attack companies What is the first thing you do when you n[...]
Read more![Phishing as a Service: Kits to steal money and data from companies](https://www.tarlogic.com/wp-content/uploads/2024/04/Phishing-as-a-Service.webp)
Phishing as a Service: Kits to steal money and data from companies
Phishing as a Service platforms provide the infrastructure to launch social engineering campaigns against companies and citizens Not only malware or denial-of-service attacks can b[...]
Read more![Tips for measuring the level of IT security in your company](https://www.tarlogic.com/wp-content/uploads/2024/04/Medir-el-nivel-de-seguridad-informatica-1.webp)
Tips for measuring the level of IT security in your company
Measuring a company’s IT security level is critical to detect and address weaknesses before criminals exploit them In early April, it became public knowledge that the US hote[...]
Read more![How is a web security test carried out?](https://www.tarlogic.com/wp-content/uploads/2024/04/test-seguridad-web-1.jpg)
How is a web security test carried out?
One of the most effective practices for controlling the resources allocated to cybersecurity is to perform a web security test In 2023, the most relevant security breaches detected[...]
Read more![Industrial cyber espionage and theft of business secrets](https://www.tarlogic.com/wp-content/uploads/2024/04/Ciberespionaje-industrial.webp)
Industrial cyber espionage and theft of business secrets
Industrial cyber espionage and the theft of strategic information can lead to huge economic losses and damage to companies’ competitiveness At the end of December 2023, Akira[...]
Read more