Do you know how far the U.S. Presidential Election debate has gone? Would you believe that there are websites that compare both candidates to liars, dictators or half-­gods?

Read More

Despite the widespread notoriety of the processes used in phishing campaigns, they continue to claim victims. In general, acts of fraud can be detected by paying close attention to the URL.

The French researcher Florian Courtial recently demonstrated that this visual verification could be rendered useless by manipulating the punycode characters to create real homographs.

Read More

You may have had your email hacked without even measuring the consequences. Today, hackers can make use of your personal data by only exploiting your email account. How should you react in case of emergency? How to protect yourself and to prevent effectively these attacks?

Read More

Did it backfire? In June 2013, Edward Snowden revealed to the public the NSA surveillance program targeting Internet users around the world. Now, a group of hackers named “Shadow Brokers” has announced that it allegedly hacked the NSA and collected a lot of data -spyware, exploit kits, settings files, etc.

Read More

On 14 June, the US Democratic National Committee (DNC) acknowledged that hackers had access to thousands of internal emails, chat messages and many research documents.
These documents started to leak in large numbers on 25 July on the whistleblower site Wikileaks with the release of almost 20,000 email exchanges between Party officials.

Read More