QR codes, those little black and white squares that we scan everywhere, have become a practical way to facilitate our payments. However, behind this simplicity lies a new ...

You may have noticed that in France, the number of data leaks really exploded in the third quarter of 2024. It's worrying, isn't it? This increase is partly ...

As we all know, online scammers are getting smarter and are now using artificial intelligence to create more credible scams than ever before. Until recently, these ...

The Darkweb, a mysterious place that we often hear about without really knowing it. Between scary stories and reality, what do we really find there? Many ideas circulate ...

Lately, there has been a lot of talk about DarkGPT, a supposedly mysterious, uncensored chatbot capable of providing secret or forbidden information. Several viral videos and articles leave ...

Recently, Telegram changed its rules to cooperate with law enforcement. Indeed, Pavel Durov, the founder of the app, announced that the app could now share IP addresses ...

OSINT, or open source intelligence, is an exciting field where you can exploit publicly available information to uncover hidden gems. What makes OSINT really cool is that ...

Do you receive an unexpected text message offering you an offer that's too good to be true? Be careful, it may be Smishing! Smishing is a mix between SMS and phishing. ...

Behind the image of the solitary hacker, typing frantically on his keyboard, lies a much more complex reality. These computer security experts use a range of tools, ranging from a simple screwdriver ...

Today, let's talk about a very specific and very particular hacking tool, still little known: Basilisk. With the rise of easy-to-use hacking tools, like ...

Today, I'm going to talk to you about a super interesting subject for anyone interested in hacking: the "Top 10 search engines dedicated to ethical hacking". Whether you are ...

In the world of cybersecurity, attacks are becoming more and more sophisticated. Among them, Watering Hole type attacks, does that mean anything to you? This is not ...

Yesterday, a regular reader of FunInformatique asked me a question after reading an article about how to control a PC remotely with a USB stick. Indeed, ...

Every year thousands of accounts are hacked. The current targets of hackers concern large sites with high traffic such as Facebook, Twitter,  Gmail, Yahoo... With the proliferation of accounts requiring ...

A proxy is a computer or module that acts as an intermediary between a web browser and the Internet. On the Internet, there are different types of proxies. The most common are ...

Want to locate a loved one to make sure they are safe? Do you want to locate your child without their knowledge? With so much technology today, it is more ...

When you receive an email, the content of the message is not the only information sent by the sender. Indeed, each email has a header, or header, containing ...

Has your Linux server been hacked? If you suspect that someone has managed to break in, it is very important to react quickly. Check the files that have been changed ...

While companies often spend considerable sums of money to ensure their IT security, hackers often resort to extremely minimalist means to prepare their attacks. This ...

On the Internet, you can quickly feel spied on or blocked when you want to go to certain sites. Fortunately, a French association, FDN, offers us a great tool: a VPN ...