Close panel

Close panel

Close panel

Close panel

Internet

28 Oct 2019

12 Sep 2019

Crooks have tapped into a goldmine by getting personal data over the phone. This scam, known as vishing, is a new method of social engineering, which is rooted in the psychological manipulation of its victims.

09 Sep 2019

Internet shopping is more and more common: grocery shopping, movie tickets, airline travel, and more. Shopping online has become habitual day-to-day practice, though occasionally potential buyers leave themselves open to fraud or data theft. The following cybersecurity tips serve to reduce the risks associated with card payments on the Internet.

03 Sep 2019

This summer, approximately 400 children and teens between the ages of 9 and 17 enjoyed BBVA’s cybersafe Fridays. The bank held a series of different workshops to raise awareness and educate employee families about how to use technology and social networks safely.

30 Aug 2019

After coming back from summer vacation, the back-to-school shopping preparations get underway. We frequently choose to buy school materials online in order to save time and money. Consequently, we should familiarize ourselves with security measures to be sure we are making our back-to-school purchases with trusted ecommerce sites and protecting our personal data.

14 Aug 2019

Although ransomware attacks (holding a victim’s data ransom) and phishing have recently become more and more frequent, distributed denial of service (DDoS) attacks continue to top of the lists of those techniques most used by cybercriminals.

09 Aug 2019

04 Jul 2019

In the business world, the CISO or Chief Information Security Officer is the person responsible for ensuring and upgrading information security within the organization. At home, we can apply many of the basic principles that are foundation of the CISO role to protect and preserve our family’s private information. No matter how daunting the task may seem at first, it is really not that hard to achieve this goal without being an expert on the subject.

01 Jul 2019

24 May 2019

21 Feb 2019

18 Feb 2019

08 Feb 2019

Social networks and the conversation created by the media on the internet provide a reliable source of information to gauge society’s feelings or perceptions on certain topics. In a new report, BBVA Research applies big data and artificial intelligence techniques to analyze the reach, the topics, the key players and the perception of the fintech phenomenon based on the information published on Twitter and traditional media.

30 Jan 2019

28 Jan 2019

10 Jan 2019

texto foto

The 49th World Economic Forum, known as the Davos Forum, is set to begin on January 22 in the Swiss district of Davos-Klosters. For four days politicians, businessmen, and representatives from social and cultural organizations will gather to discuss global problems and identify solutions. This year, the forum will place special emphasis on international collaboration, giving the world a voice.

14 Dec 2018

30 Nov 2018

16 Nov 2018

The market for influencers is in full expansion mode. This trend has proven to be an opportunity not only for the influencers themselves – or those who aspire to become one – but also for companies that see an opportunity to promote their products or services.

12 Nov 2018

26 Oct 2018

23 Oct 2018

22 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

21 Oct 2018

20 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

19 Oct 2018

18 Oct 2018

17 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

02 Oct 2018

14 Sep 2018

If our digital identities are only guided by the recommendations fed by an artificial intelligence, we risk creating a virtual world with polarized opinions.

04 Sep 2018

03 Sep 2018

Summer has come to an end, and the usual back-to-school season gets underway. It’s the time of the year to prepare school supplies, and it can also be a good time to take stock of our digital habits to be sure to start the year safely on the right foot:

10 Aug 2018

06 Aug 2018

24 Jul 2018

There’s a fix for confusing economic terms or not being up-to-date with financial news: “influencers” aren’t just gamers or it-girls; many experts in the finance domain use the virtual world to provide information, data, and opinions about financial and economic topics.

18 Jul 2018

06 Jul 2018

Technology changes our lives day by day, offering us capabilities that were unimaginable just yesterday, but also complex challenges and potentially frightening conflicts. In other words: the perfect raw material for the best TV comedy and drama, which has found fertile ground in anti-establishment hackers, genius programmers, start-ups in distress, indolent IT guys or dystopian visions that seem a little too much like the world we live in.

05 Jul 2018

Digitalization encompasses both a process and a habitat. As a process, digitization transforms analogue content. For example, converting the 1604 edition of ‘Quijote’ printed by Juan de la Cuesta into a digital ‘Quijote’. The content that was drawn, printed, or typed is input into a computer via numeric codes. The result can even simulate the original typography. But the letters that appear on the screen are, in reality, digits that the computer converts into images.

25 Jun 2018

Where do most internet users go online from? What devices do they use? How often do they upgrade their smartphones? This a snapshot of the current internet and smartphone use habits across the planet.

04 Jun 2018

28 May 2018

Virtually everybody today has a username and password. We are required to provide them to log on to popular online services, including social media, online stores and streaming services. By default, browsers will ask you if you want to save passwords to save you the trouble of typing them again. If you are inclined to answer ‘yes’, keep reading because you’ll find this information of use.

21 May 2018

Throughout history, there have been several versions of the family and different models of relating with one another. The latest version is the family 2.0.

Generation T refers to those born from 2010 onwards. These are children who know the world through a digital screen and what is more important through touch. Hyperconnectivity, speed and instantaneousness are some of the words that go along with these children as they grow up.

16 May 2018

New modes of communication have transformed the way news is delivered. Thanks to the Internet, access to information has never been so fast. Each minute more than 3.5 million Google searches are made, Facebook is accessed 900,000 times, and 156 million emails are sent. The compulsion to be informed every minute of the day has provoked a surge in so-called “fake news.”

16 Apr 2018

Malware, or malicious software, covers different programs which, when run in devices, cause different types of damage and complications such as interrupting their operations, disrupting how they work, stealing information and displaying unwanted advertising.

02 Apr 2018

28 Mar 2018

27 Mar 2018

That surfing on the internet means leaving a trail of personal information is nothing new. Browsers gather preferences and habits thanks to the cookies installed in computers when surfing.

23 Mar 2018