Blog

RSS

2 results

  • Cifrado homomorfico

    Encryption and Privacy III: Homomorphic encryption

    In the framework of “Encryption and Privacy”, this article focuses on homomorphic encryption. This privacy by default technique is suitable for cases where a controller contracts a processor to carry out part of the processing and the controller wishes to ensure, from a technical point of view, that...

    Read more

  • Phishing Campaigns Regarding The Coronavirus

    The alert situation caused by the coronavirus at a global level is a dangerous breeding ground for phishing attacks, which are being carried out internationally through instant messaging services, e-mail and any social media. Cybercriminals always try to take advantage of situations of fear and...

    Read more