Quantum Steganography
Quantum Steganography A brief history on Cryptography and Steganography The word Cryptography comes from the ancient Greek, and is history is as long and old as the Greeks themselves. See Cryptography largely refers to the study and techniques required to deliver a hidden message so that even if the data is clearly visible by anybody […]
Protect your home network

In general, when you hire the internet service a technician visit your home to install the router so that so you can have your own home network … But there is a detail, that same technician generates a username and password to access the network. The best thing is that you secure and personalize your […]
DNA use

Like the biological DNA, the digital one requires compatibility, that is, only the two users that own it can communicate through it. This unique implementation of our technology allows us to ensure completely secure communication between two communicating points, that is, the integrated chat brings Cyphertop. Only, both users who connect with each other, have […]
Listen to the users!!

So many technological advances have opened more risks for users. Yes, the internet of things will help automate many of the tasks that could or are a nuisance. To be more honest, this has opened the door that may not be visible to the user, but they are very dangerous because they have access to […]
Cost of a cyberattack

In a recent study that was carried out it was possible to discover that financial companies in Mexico suffered numerous cyber attacks that reached 107 million dollars. Many events were detected, including successful and unsuccessful. In some cases, user information became exposed, however the attack could be counteracted and the problem was not allowed to […]
Free Netflix?

The magicians do not exist, if the illusionists. And this is framed in the context of cybersecurity, malicious social engineering tactics continue to grow every day, and go through all those naive users, who believe that a company like Netflix will create magical software to violate its protocols Do you think that there will be […]
5 TIPS to prevent a RANSOMWARE

We want to help the majority of small, medium and large companies to avoid some kind of attack through RAMSOMWARE, that is why we leave you 5 prevention tips: 1- Educate your staff, do not leave them at random. 2- Make one or several copies of data in backup, save time to time and avoid […]