Seguridad Tutoriales

What is SEO poisoning and how does it affect users

How SEO Poisoning Works

We can say that SEO poisoning is one of the security issues that can affect a web page. A main objective for any private user or company that has a website is to position it correctly in search engines. In this way, visitors enter Google, for example, and through a series of terms they can reach that page.

This is what is known as SEO. It is all that entails that this same article becomes relevant to search engines. Now this can also be used by hackers to increase traffic to certain sites that are actually malicious. This is also what is known as Black Hat SEO.

Basically what a hacker is going to do with SEO poisoning is optimize a page so that it appears in the first results when search in Google or any search engine. The victim will click on that site thinking it is relevant, but they will find that they have actually accessed a page that may be dangerous.

Keep in mind that search engines more and more they improve their operation to know how to detect this problem. However, as with many types of attacks, pages that are fraud can sometimes sneak in and appear among the first results.

This is usually a website that belongs to the attacker. They can create it to report on a certain topic, promote a popular product or anything that can be successful and receive many visits. But they could also use a legitimate site, which they control and modify for their purposes.

What can they achieve with a Black Hat SEO attack?

We have explained what is SEO poisoning or also known as Black Hat SEO. It is something that logically could put Internet users at risk. Now let’s see how it could affect us. We are going to explain what cybercriminals can get with this technique.

Sneak malware

One of the most common uses of a website with SEO poisoning is trying to sneak malware To visitors. They can upload malicious files with the aim that the victim downloads them thinking that they are legitimate and that nothing is going to happen.

We already know that there are many varieties of malware. Many kinds of malicious software they can put our equipment at risk. In many cases they arrive through downloads that we make on sites that are not legitimate. Hence, cybercriminals make use of these techniques.

Stealing passwords with Phishing attacks

Of course they can also position a website well with the aim of steal passwords of the users. They can create a page to carry out Phishing attacks. In this way, the victim will log in thinking that they are in front of an official page, but in reality they are handing over their access codes to cybercriminals.

Redirect traffic to other scam sites

Another issue to take into account is that that web page could be used as a bridge to reach other places where the threat really is. That is, they could use SEO poisoning to attract traffic to a created website and this page has links that redirect to content hosted on other servers and that are really a danger to computer security.

This technique is also widely used for the two cases that we mentioned above: the theft of passwords and the delivery of malware. Hackers are constantly looking for ways to lure victims to dangerous sites.

Promote fake products

Of course they can also use Black Hat SEO to promote certain products that are actually a fraud. For example, let’s say a new mobile, a novel smart watch or any device comes out. They can create a fake page to attract users and even sell that product but in reality it is a hoax.

Malware on the network

How to avoid falling victim to SEO poisoning

Now we are going to talk about the most important thing of all: how to avoid being a victim of this problem. We must take into account certain recommendations that can help us to reduce the risk of having security problems in our equipment.

Verify that the website is official

Something basic will always be to verify that the website we are accessing is official. Must check url, the information they show and the general appearance. In this way we will avoid giving our data or downloading a file on a site that is actually false and has been created only to attack, but has appeared in Google in a good position due to SEO poisoning.

Always check the links we access

Another issue to take into account is to always check that we are going to click on a link and see that we are really going to a legitimate site. We have seen that a Black Hat SEO strategy is to redirect traffic to dangerous pages. Therefore, you always have to maintain common sense and not enter a URL that redirects us to a page that has nothing to do with what we expect.

Keep computers protected

On the other hand, the importance of keeping our devices properly protected cannot be overlooked. We must maintain security at all times. Intruders must be prevented from entering by security programs, in addition to having all the updates. In many cases vulnerabilities can appear that are exploited by cybercriminals, hence we must have all the patches.

In short, SEO poisoning is a problem to take into account when browsing the Internet and conducting a search. We must always check that we are entering a legitimate site and never put our equipment at risk.

Noticias Seguridad

Thousands of servers and cloud services are vulnerable

Remote work brings security problems

A group of security researchers has discovered hundreds of thousands of servers, ports and cloud services that are insecure. They can especially put children at risk remote workers, which have increased considerably in recent months. They are widely used services that are part of the day-to-day life of many companies and organizations.

It is especially necessary to highlight the danger of cloud services. We live in an age where it has become very popular. We have a wide range of possibilities and we are increasingly using this type of tool more and more. However, everything related to the pandemic has exposed many companies when using cloud services.

In many cases remote work was introduced without much margin. This meant that there was no adequate preparation, that the systems were not properly updated or protected. Many services had vulnerabilities And the fact that more users are using them has opened a significant opportunity for hackers.

We speak for example of remote desktop, the use of VPN or applications to work from home in a group with other users. All this has gained a very important weight in the last year. This allowed workers to perform their duties away from the corporate network. But of course, this has also brought certain complications in the form of vulnerabilities and bugs.

The cybercriminals they can exploit these exposed cloud services and servers to steal information, passwords, or sneak malware. They are based on existing vulnerabilities that are not fixed. They could, for example, log in remotely as if they were actually the victim and gain access to inside information of an organization.

Servers and cloud services, the most affected

These security researchers of which we echo have discovered a total of 392,298 servers that are exposed, 214,230 ports and 60,572 services in the cloud. All this after analyzing hundreds of companies.

In most cases, organizations are unaware that they really have servers, ports or services exposed on the network. They do not update the equipment and do not correct any bugs that may be present. Even in many cases they do not use correct encryption for the networks.

They have detected many vulnerabilities rated as high or critical severity Uncorrected. Should an attacker discover these flaws, they could carry out cyber attacks such as stealing information, passwords, or even carrying out ransomware strategies.

We must be aware that today a large amount of sensitive data is shared over the Internet. This means that in case of suffering any vulnerability that affects cloud services, it can seriously compromise all this information that we send and receive.

Noticias Seguridad

Many VPNs Find Uncorrected Vulnerabilities

Many VPN programs are not patched

First of all, it should be noted that the vulnerabilities and security flaws they are very present in our day to day. We can run into problems that affect the operating system and the different programs we use. This means that we must always keep everything updated, with all available patches.

The problem now affects VPNs. According to a safety report from SpiderLabs of which we echo, remote work has led to a considerable increase in the use of this type of program. It is something that we have been able to see a lot in the last year.

However, the important point is that 5% of all installed VPNs have uncorrected vulnerabilities. This means that there are many users who, without knowing it, are using a program that has a flaw that can be exploited by a third party. This logically puts security and privacy at risk.

It should be noted that a VPN will manage all the our network traffic. This means that our personal information, the sites we visit or the programs we use on the web, could be exposed. If we use a tool that has a security flaw, which can be easily exploited, we could run the risk that our privacy is affected.

We have seen on occasion that cracked programs are dangerous. We can also apply this to VPNs. Many of them are free and we can even find supposed offers or ways to download them from the Internet without paying. However, with this we would also be putting security at risk.

More VPN usage, more attacks

This is something that happens frequently. The hackers they set their sights on what has the most users or what is most used at any given time. Ultimately in this way they will have a greater chance of success.

And if we talk about VPN, in recent times its use has grown a lot. This has also sparked increased interest from cybercriminals. We have more and more possibilities for our day to day, but not all of them are going to be safe. Not all the services that we use are going to be guaranteed and we could even run into certain vulnerabilities without correcting, as we have seen.

Our advice is to choose the VPN very well. But beyond that, it is essential keep safe and do a periodic review. In this way we can solve certain errors that may appear and avoid attacks against our devices. A VPN could even allow you to use Google as if you were in another country. This is very useful at certain times, but it must be done safely.

Seguridad Tutoriales

what to do to encrypt it with password

Why it is important to protect our accounts

Any account that we create on the Internet must be properly protected. We must generate a password that is strong, that prevents the entry of any intruder. We should never leave our records unprotected.

Keep in mind that our personal information they have great value on the net. This will cause a possible intruder to collect information that can be put up for sale on the Internet, use it to attack our contacts on social networks, create personalized Phishing campaigns …

All of this makes us always properly protect any account In Internet. This also applies to the different programs and services that we use and where we are going to host personal content or data that may relate to us.

On many occasions we can make mistakes when protecting a registry or a device. Sometimes just creating a key is not enough, as there could be leaks. This makes it interesting to apply two-factor authentication whenever possible. This will add an extra layer of security. But without a doubt something that can not be missing is to have a periodic review and change the access code from time to time and thus avoid a possible leak that could affect us.

Steps to protect Google history

We have mentioned the importance of always protecting our accounts or whatever services we use. Now we are going to explain what to do to protect Google history. The search giant is going to store what we previously searched for. It will save our activity to offer us more personalized results and even also so that we ourselves obtain certain data.

Google allows you to protect this information. It allows us to encrypt the history and thus prevent a possible intruder from accessing the data that we have saved. This can be very useful in order to preserve privacy at all times.

The first thing we have to do to protect the Google history is to log in with our account. Once inside, we have to click on the Settings icon and enter Manage your Google account.

Subsequently, in the menu on the left you have to click on Data and personalization. It is the third option that appears. We have to go down until we see Activity and timeline. There you have to click on My activity.

A new window will automatically open. There we have to give Manage verification of My Activity.

Manage account verification

We have to mark the option of Need additional verification. We simply have to hit save.

Additional verification Google

From that moment on, Google will ask us for the account password in order to view the activity history. If, for example, someone has access to our computer or we leave the account open on the work team, it would be necessary to enter the access code to show the history.

Tips to protect your Google account

But we want to give some more tips to protect our Google account. We speak in a general way, some recommendations to prevent intruders that could compromise our privacy. We need everything to stay in good shape.

Create a strong password

Something essential is going to be creating a key code make it strong and complex enough. This means that we must create a unique password, which has letters, numbers and other special symbols. All this also in a random way. We should never use the same one that we already use in other services.

Ultimately this is the main barrier that will allow us to keep intruders out. We must have good protection and thus reduce the risk as much as possible. We can use key managers to help us generate strong passwords.

Enable two-step authentication

But the password is not the only security barrier we can have. There are more and more services in which we can use the two-step authentication. One of them is the Google account. We can add this extra layer to protect our account.

For this we have to enter once more in Settings. Later we go to Security and click on Verification in two steps. We will have to configure it as we want, since we can receive an SMS with a code or even use an application on the mobile.

Google 2-Step Verification

Use official apps

A very important issue that we must take into account is to use official applications. It is true that today we can count on many third-party programs that offer the possibility of surfing the net, logging in or making use of different features, but without becoming official programs.

If we use this type of software we run the risk of using something that has been maliciously modified. We don’t really know who may be behind that tool. This makes it very important to always opt for legitimate, official programs.

Common sense

On the other hand, one more point that we can take into account to protect our Google account is the common sense. We should never make mistakes such as logging in through a link that may be insecure or downloading programs from sites that are not legitimate.

Most cyber attacks are going to require user interaction. They are going to need us to click somewhere or download some dangerous file. Therefore, if we maintain common sense at all times we will have a lot of money to protect our Google account or any other service that we use on the Internet.

Ultimately, in this way we can protect the google history. We have mentioned the importance of keeping your account safe and also some recommendations to avoid problems at any time.

Seguridad Tutoriales

What to do to prevent intruders from entering your computer

Methods they can use to get into a computer

The cybercriminals they constantly refine their techniques to attack users. They always look for a way to break any vulnerability, to sneak malware, to put computers at risk. When we talk about methods for them to enter our computer, they can use different ones to achieve their objective. Let’s see the main ones.


Undoubtedly one of the most used methods to be able to control a computer in an illegitimate way, to be able to access a computer, is through a trojan. There are many different types, but basically we can say that it is a malware that allows remote control from another device.

Trojans can sneak in, creating a back door on your computer. The antivirus does not detect it and the hacker would have full access. It could control system functions, change settings, sneak even other varieties of malware, etc.

Vulnerabilities in remote desktop

Today it is very common to use the remote Desktop. Very useful to work without having to be physically in a place. Windows and other operating systems have a large number of options. Some of them are integrated, while we can also make use of external programs.

However, on many occasions there may be vulnerabilities. We may be using programs without patching, without updating correctly. This could be exploited by hackers and carry out their attacks. They could access our computer through this type of failure.

Malicious program download

Another widely used method is by programs we download from the internet and they are not safe. They can sneak in any variety of malware that allows a hacker to access your computer. For example, Trojans could sneak in, as we saw earlier, but also other varieties that can compromise us.

This is a very common reason for our computers to get infected. The software we download may have been maliciously modified and contain any variety of malware that affects us.

Insecure Wi-Fi network

Of course they can also use insecure wireless networks to steal information or access our equipment. Nowadays it is very common to enter a Wi-Fi in public sites like a shopping mall, airports, etc. Intruders could be on that network without our knowledge, waiting for the victim to connect.

Detect intruders on your computer

We will also see different methods that can help us detect intruders on the computer. They can tell us that something is wrong and that we need to take action as soon as possible. Only then can we improve security.

Analyze the system

A basic initial step is to perform a system analysis. For this, we must have an antivirus installed that allows us to detect possible varieties of malware. For example, it could detect Trojans, something that would alert us that something is wrong and could mean that there are intruders on the computer.

Notice a malfunction

Another important issue to consider is whether we notice a malfunction general computer. For example, if we notice that it works slowly, that when browsing the Internet there are errors, that the network speed is very limited …

All this could indicate that our computer is malfunctioning and that there could be a cybercriminal. This would help us make decisions with the aim of improving security and preventing personal data from being stolen.

View programs or folders that shouldn’t be

Did we notice anything weird about the team? They may have appeared programs or files that were not there before. This could be software that an intruder has installed or folders that have been moved. This could also give us a clue that our computer has been infected and a cybercriminal has taken control.

How to prevent them from entering your computer

It is very important to always keep our equipment safe. We are going to give some essential recommendations to avoid intruders on the computer and to minimize the risk of being victims of any type of attack.

Always use security programs

Something basic and that cannot be missed is the use of security programs. We are talking, for example, of a good antivirus, as well as a firewall that can protect the network. There are many security threats on the Internet. Many types of attacks that in one way or another affect us.

Thanks to security software we can prevent hackers from taking control of our computer. We can reduce the risk and also avoid other varieties of malware that can compromise us.

Windows Defender Security

Upgrade systems

On many occasions, security flaws appear that can be exploited by cybercriminals. We have discussed the case of remote desktop programs, but it could also affect the operating system itself.

Our advice is to always keep the updated equipment adequately. You have to avoid any obsolete program or have without updating the firmware of the network card or any device. This is very important to reduce the risk of problems.

Download only from legitimate sources

Of course, something else we should mention is the fact that you only download from sources that are official. We must avoid downloading files from third-party sites, since they could have been maliciously modified and be a threat to our computers. We must always use pages and platforms that are legitimate.

Common sense

Yet another issue is the fact avoid making mistakes. We should not, for example, download email attachments if we suspect that they may be a threat. Also, do not open links that could be malicious.

In most cases, the intruders will need the interaction of the victim. They are going to need us to take some action. This makes common sense vital to avoid security concerns.

Therefore, these are some essential tips to prevent them from entering our computer. It is essential to maintain security and not take any kind of risk.

Noticias Seguridad

Malware can fool antivirus and attack a computer

A hacker can fool the antivirus

Antiviruses are the main security bar that users install on their computers. However, we must bear in mind that it is not the only thing we can count on. We can also install firewalls and other tools that will also help increase protection.

Keep in mind that many antivirus have ransomware protection. It is one of the threats that have been most present in recent years. There are also Trojans that are capable of hiding themselves on a computer and waiting until the right moment to attack or serve as a gateway for cybercriminals.

However an attacker, through a malware, it could manage to fool the antivirus. You can do it so that it allows the entry of a specific malicious software, but also so that this malware is the one that activates the button so that other different types of threats, such as ransomware, could penetrate without being detected by the security program .

One of the most used methods to cheat the antivirus is control an app make it reliable. The security program will not detect this tool as dangerous. Therefore, what the cybercriminal is going to do is control that legitimate software, link it to malware, and thus enter the computer without being detected.

This could even allow ransomware to enter. After all, there are legitimate programs that have access to certain folders. If the attacker manages to control them, they could encrypt them through a variety of ransomware.

I could also just stop the antivirus. It could in some way modify certain functions of the computer or even simulate the movements of the mouse to go to the security program and stop it. This would allow free entry for other varieties of threats.

Antivirus is not enough for security

This we mentioned makes it not enough to have an antivirus to maintain security. It is necessary that we have other programs, tools and of course take into account certain recommendations to maintain maximum protection.

First of all, remember the importance of always keeping the updated equipment. Hackers can take advantage of many vulnerabilities that appear in the computers and applications that we use. They could exploit those glitches. Thanks to patches and updates we can easily fix them and make everything work fine.

Another essential point is not to trust everything to the antivirus in terms of security programs it means. We can have other tools, such as a firewall or even extensions for the browser that can detect the entry of malware.

But without a doubt something that cannot be missing is the fact that avoid making mistakes. Maintaining common sense is always going to be the best protection of all. Avoid downloading files that may be malicious or clicking on links that may be Phishing in order to steal information.

Noticias Seguridad

Get to know this feature in Asuswrt-Merlin to use VPN

VPN management with Asuswrt-Merlin

The Asuswrt-Merlin firmware has VPN servers such as OpenVPN and IPsec, as well as different advanced VPN clients, including an OpenVPN client. One of the most important characteristics of this firmware is that we can forward all the traffic of a certain client on the LAN through an OpenVPN tunnel that we build. Now, the Asuswrt-Merlin developer has done a full review on OpenVPN routing, serving as the basis for the new VPN Director functionality, which is coming soon, and which is currently in beta for testing.

Starting with the new version 386.3, all OpenVPN routing will be done directly by the firmware, instead of the OpenVPN client that we configure and the firmware modifies later. Now the internal routing will be cleaner, it will no longer be necessary to remove unwanted routes that were incorporated by the OpenVPN server. Thanks to this revision, now the possibility of “redirecting Internet traffic” will behave much better, because the remote server will not override it silently, in addition, we can allow or not certain routes to be installed from the OpenVPN server (when we we act as a customer). Now there will no longer be a policy and a strict policy as previously in the Asuswrt-Merlin firmware, now we will simply have a single policy.

Another feature that has changed is the operation of the so-called Kill-Switch, a function that allows you to block traffic if it does not go to a remote OpenVPN server, with the aim of protecting us from possible tunnel drops and filtering information. Now the Kill-switch will not activate if we manually stop the VPN tunnel, either through the graphical user interface or via SSH by commands. Now the Kill-switch works in these cases:

  • If the VPN client is configured to connect to the router startup, and the kill-switch is enabled, then all traffic will be blocked until the OpenVPN client connects.
  • If the VPN client terminates the connection abruptly, then this Kill-switch will work too.

In addition, this Kill-switch would also work in the case of configuring a policy of “redirect all traffic through a VPN client”.

What is VPN Director?

VPN Director replaces the strict policy and policy-based routing policies that we had up to now. Now all the rules will be configured in a centralized location that will be in charge of managing all the VPN client connections (only with the OpenVPN protocol), ideal for making it easier for users to configure them. The new menu will be in the “Advanced / VPN Settings” section, as you can see below:

This new functionality will allow us to configure in detail all the policies we want, up to 199 rules in total, and assign which VPN tunnel we want a specific client on the LAN to access. In this way, we can easily configure certain clients to go to the Internet through different VPN services, or to go directly if we select the Internet WAN interface. In this menu we can also start the different VPN clients, see if we have the kill-switch enabled and much more.

A very important detail is that the “policy” to be followed by this VPN Director will be:

  • OpenVPN clients to redirect all traffic will have the highest priority.
  • WAN rules will also have high priority, but below total traffic redirection.
  • The OpenVPN 1 client rules will take precedence over the OpenVPN 5 client rules.
  • The rules can be easily enabled and disabled by clicking on the “Enable” section in the rules.

Another important aspect is that we can “mark” specific IP addresses, or using CIDR notation to put subnets.

As you have seen, for users who use the OpenVPN client with VPN services such as Surfshark, PureVPN, NordVPN and many other services, this new functionality is ideal because we can see all the rules directly in a single menu. All these rules will be stored directly in JFFS (internal FLASH memory), and not in NVRAM, with the aim of saving space and being able to store up to 199 rules in total. We recommend you access the VPN Director beta thread where you will find all the details.

Noticias Seguridad

how can they use them to attack

Data they can collect on the Internet

As we have mentioned, when surfing the net, when registering on sites, making purchases or using different services, we can leave a lot personal information. Here we can include our name and surname, email address, telephone number and even the purchase details of the bank card.

By registering on an online platform we are trusting that that site is legitimate and will not use that information for bad purposes. For example, when we enter a web page to make a purchase, the normal thing is that we put at least our e-mail, home address, name and surname, as well as the telephone number.

In case that site is attacked or there is some kind of filtration, all that data could end up in the wrong hands or end up being public on the network. We have seen numerous such cases. But one of the most common problems is that we forget a social network or a forum in which we registered years ago. That service may have been forgotten, that it is no longer used by users, but our data is still there.

Keep in mind that our personal information has great value on the net. It can be used for different techniques that hackers use, as we will see. Hence, it is very important to avoid leaving a trace and control the information that we make public.

What can they do with our personal data

If a hacker manages to get hold of our personal data on the Internet, they could have a wide range of possibilities to use it and profit from it. An example is the fact of being able to include ourselves in spam campaigns. At the end of the day they could know our email address, name and even phone number. They can also have information about our tastes, since they will obtain data from pages we have visited, stores where we have bought, etc.

Another very important question is that all this could be used to launch custom phishing attacks. This is important, as the probability of success is greatly increased. That is, it is not the same as a hypothetical victim receiving a generic email to log into a site and that it is actually a trap, to a more personalized email, with our name and even with a platform that we use as bait. They could be significantly more likely to succeed.

They could even reach impersonate our identity. This is dangerous since they could create profiles on social networks with our data, add friends or relatives who would not suspect anything and, in this way, attack them as well. For example, they could do this if they send messages through social networks that contain malware or malicious links. That is why it is always important to detect bots on social networks.

Therefore, as we have seen, it is very important to prevent our personal data from remaining on the network on platforms that we stop using. You always have to protect the information and not take risks of any kind. Otherwise we could be victims of multiple cyber attacks.

Noticias Seguridad

DeadHash, a free program to generate hash on Windows or Linux

DeadHash, a program to analyze the hash of a file

DeadHash is a program Open Source that we can use on both Linux and Windows systems, as well as Android. It is completely free and allows us to check if the hash of a file that we have downloaded from the Internet is legitimate.

Keep in mind that many developers provide this information precisely so that users can verify that they are looking at the correct file. One way to ensure install legitimate software and that it has not been maliciously modified.

Using DeadHash is very simple. The first thing we have to do is download it. There we will meet the different versions. For Windows we can also see the portable version alternative, so as not to have to install it.

How DeadHash works

The mode of use of DeadHash It is very simple. Once we install it or run it through its portable file, we will find a first screen like the one we see in the image below.

On the left we will see the section of File. There we have to click to select the file that we want to analyze. You just have to go to the route where we have it saved and that’s it. We can also simply drag the file that interests us there. Later we will give Calculate, to show us the information.

Calculate hash with DeadHash

Keep in mind that the time it takes for DeadHash to process it will depend on the File size. However, it is usually not more than a few seconds. Once it is finished we will see the list of hash values ​​of the file.

We can easily copy the values ​​or give it to export in a CSV file and be able to use it in the future. DeadHash supports hash algorithms such as MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD160, and CRC32. It is an option to generate hashes of files.

If we enter the menu we can change the language, as well as other parameters of the program. We can also select or remove different algorithms to show them or not. This is useful if we only want something specific. We will not find many more options, since it is a simple application that has the essentials.

DeadHash Menu

In short, DeadHash is a simple program to analyze hashes of files that we have downloaded. A way to maintain security at all times and not have problems when installing a program that we have downloaded and that we do not know if it has really been modified in a malicious way and be a problem for our security.

Noticias Seguridad

Attacks against VPNs have increased a lot this year

Attacks against VPN on the rise

The hackers they are constantly looking for a way to steal information and attack what is most used. Without a doubt, VPN services are today, so they have a possibility there to carry out different strategies and attack users.

According to data provided by NuspireSpecifically, attacks against Fortinet SSL-VPNs increased by 1,916% and against Pulse Connect VPNs by 1,527% during the first quarter. In the first case, they took advantage of the CVE-2018-13379 vulnerability and in the second, CVE-2019-11510. These flaws could allow malicious file download and disclosure.

In both cases they launched security patches, as usual. It is very important to always have the latest versions and updates that may be available. In this way we can correct possible bugs that may appear and preserve privacy when using VPN or any program.

However, not only have attacks increased through these two vulnerabilities that we mentioned. The truth is that they have done it against different VPN programs, the amount of fake software that tries to look like legitimate programs and scams targeting both private users and companies that use this tool has increased.

It is a fact that in recent times the use of VPNs has grown due to the rise of teleworking as well. We need to connect to computer equipment that we do not have physical access to. This also opens the door for hackers to carry out attacks.

Decrease in malware and other attacks

It should be noted that, unlike what has happened with attacks against VPN, in general malware has decreased in the first quarter of the year. According to the Nuspire report, malware has decreased by more than 54%. Keep in mind that there are many varieties of viruses.

There has also been fewer botnet attacks and similar threats. Much of this significant decline has been due to the dismantling of Emotet. This has been a fact of great importance in cybersecurity so far in 2021.

However, security researchers indicate that it is not ruled out that hackers devise new formulas to distribute malware, through new threats that they can distribute on the network.

This means that we must be protected at all times. We must avoid the entry of malicious software, for which we will need to have security programs, such as an antivirus or firewall. It is also very important to update the equipment and in this way prevent them from exploiting vulnerabilities.