Categories
Security

Real-time map of DDoS attacks

Digital Attack Map is a live data visualization of DDoS denial attacks worldwide. A DDoS attack is a planned attack on a computer system or networks that attempt to make the resource inaccessible. It is created through a collaboration between Google Ideas  and  Arbor Networks. The tool displays anonymous attack traffic data to allow users […]

Categories
Security

Steal Instagram accounts with tokens

Instagram is a social network to share images about you or your business. There are many profiles that monetize your account and it is very appetizing for cyber criminals. In this article I will comment on how they manage to access your instagram account by sending you a login token or tokens. A token is […]

Categories
Internet Security

Check for redirects in a web page

Have you ever wondered: where does this link that just arrived in the mail go? A URL redirects checker follows the URL path, that is, where the link that has reached us points. It will show us the full redirect path of URLs, abbreviated links or small URLs. It is also known as URL verifier, […]

Categories
Security

Gab.com compromised the data of its users

Gab.com is a free speech social network, you can say whatever you want without being censured. It has been very fashionable lately and has mostly attracted the attention of the right (and far right) of the United States. On February 26, 2021, database passwords were leaked or stolen from this website. In Fig. 1 you […]

Categories
Security

Reasons why your email address is blocked

Sometimes it may have happened to you that you send an email to a person and that email doesn’t reach the destination mailbox. The message is blocked. This article explains some of the reasons that may occur so that a sent email is not received in the recipient’s email address. Browsing the Internet you immerse […]