Posts by author
Panda Security
How hackers are targeting your phone through Bluetooth
Keeping Bluetooth enabled on your devices allows hackers to break into them and access your data. This is how, and some tips to stay safe.
Personal information of 24,000 WeLeakInfo customers leaked online
The tables have turned and now it is the hackers who bought personal data from WeLeakInfo who have had their own information leaked.
Hackers are switching to credential theft – hereโs how to stay safe.
Email scammers are sending less malware-infected messages. They use phishing techniques to steal credentials directly because they are harder to detect.
Hacktivists Breach a Security Company, Get Access to 150,000 Camera Feeds
No damage was caused, and thr group claims they did it to raise awareness about the dangers of mass surveillance.
Is USA at cyber war with the rest of the world?
Recent attacks backed by Russia, China and North Korea against public agencies, large businesses, and even individuals, raise the question.
How Google is Being Used to Deliver Malware
Millions of people trust Google to deliver services every day โ but hackers have found a way to use it to deliver malware too.
Sextortion attacks are on the rise in the UK
Cybercriminals are playing dirty in their attempts to extract cash from their victims.