![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cyber-for-all_s.webp)
Cyber for all - Page 3
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
![The Risks of Using Generative AI in Business: Protect Your Secrets](https://www.tarlogic.com/wp-content/uploads/2024/03/Riesgos-de-usar-IA-generativa-en-las-empresas.webp)
The Risks of Using Generative AI in Business: Protect Your Secrets
Companies developing AI systems and those contracting third-party applications should know the risks of using generative AI in business 2023 was the year that generative AI went ma[...]
Read more![How do you test a company’s cybersecurity?](https://www.tarlogic.com/wp-content/uploads/2024/03/cybersecurity.webp)
How do you test a company’s cybersecurity?
Continuously testing a company’s cybersecurity is essential to ensuring business continuity and preventing a cyber-attack from causing significant damage A few days ago, ther[...]
Read more![The 16 types of malware used by criminals](https://www.tarlogic.com/wp-content/uploads/2024/02/Tipos-de-malware.webp)
The 16 types of malware used by criminals
Viruses, Trojans, spyware, ransomware… the types of malware used by malicious actors have multiplied and become more sophisticated Ransomware to extort money from companies a[...]
Read more![How do you detect vulnerabilities in applications?](https://www.tarlogic.com/wp-content/uploads/2024/02/Como-se-detectan-vulnerabilidades-en-aplicaciones.webp)
How do you detect vulnerabilities in applications?
Security audits are essential to detect vulnerabilities in web and mobile applications before they are exploited. Just this February, the National Institute of Standards and Techno[...]
Read more![OWASP: Top 10 Mobile Application Risks](https://www.tarlogic.com/wp-content/uploads/2024/02/Top-10-riesgos-aplicaciones-moviles-2-1.webp)
OWASP: Top 10 Mobile Application Risks
The OWASP Top 10 Mobile Application Risks includes the most critical vulnerabilities that criminals can exploit As the saying goes, good things come to those who wait. Eight years [...]
Read more![Tips to avoid becoming a victim of CEO fraud and other impersonation attempts](https://www.tarlogic.com/wp-content/uploads/2024/02/Victima-fraude-del-CEO.webp)
Tips to avoid becoming a victim of CEO fraud and other impersonation attempts
To avoid becoming a victim of CEO fraud, be wary of any suspicious communication ordering a transfer or disclosing information. 38 million euros. This was the haul made by a Franco[...]
Read more![Cyber-attacks against the education sector. When criminals go to university](https://www.tarlogic.com/wp-content/uploads/2024/02/Ciberataques-contra-el-sector-educativo.webp)
Cyber-attacks against the education sector. When criminals go to university
Cyber-attacks against the education sector can paralyse universities and research centres and lead to personal data and intellectual property theft In mid-June, right at the end of[...]
Read more![Responding to a cyber-attack in less than 1 hour](https://www.tarlogic.com/wp-content/uploads/2024/02/Responder-a-un-ciberataque-en-menos-de-1-hora.webp)
Responding to a cyber-attack in less than 1 hour
Readiness Assessment is a proactive Incident Response task that allows you to respond to a cyber-attack in minutes and minimize its impact 49 million dollars. That’s how much[...]
Read more![Cryptocurrency fraud, social media hacking, malware, and AI](https://www.tarlogic.com/wp-content/uploads/2024/01/Fraudes-de-criptomonedas-1.webp)
Cryptocurrency fraud, social media hacking, malware, and AI
Social media hacking, crypto drainers and malicious use of generative AIs are enabling criminals to commit more sophisticated cryptocurrency frauds 2024 has started with turbulence[...]
Read more![Medical data theft. A high-voltage threat](https://www.tarlogic.com/wp-content/uploads/2024/01/Robar-datos-medicos-pacientes.webp)
Medical data theft. A high-voltage threat
Attacks on hospitals, insurers and healthcare software companies are on the rise, targeting medical data theft The worst-case scenario for a hospital is that its activities are par[...]
Read more