Posts by author
Panda Security
North Korean Hackers Target USA Critical Infrastructure and Military Bases
North Korean hackers have been actively targeting critical infrastructure and military operations located in the USA. The hacker group Andariel, also known as APT45 and…
British politicians show exactly what NOT to do online
Proving that politicians are human after all. A new report reveals they experience the same cybersecurity risks as the citizens they represent. Over two-thirds of…
Can I create and amend a PDF file on an iPhone for free?
Sometimes, people are not as excited when they receive an image file when they’ve been expecting a PDF. However, creating a PDF file on an…
How the EU is about to violate your privacy
European Union (EU) lawmakers continue to press ahead with plans to scan private messages in an effort to crack down on criminal activity. This new…
Cyber criminals target Apple users with smishing attacks
Since the launch of Apple’s iPhone nearly two decades ago, the device and all its consecutive versions have been among the best-selling smartphone devices in…
How to recover deleted files on a Mac
We all know the feeling. You hit delete and suddenly realize that you’ve made a mistake. Is the file gone forever? Probably not, no. Here’s…
PSA: This Microsoft Update is essential
There are always risks when connecting to unknown public WiFi networks. Scammers will sometimes create ‘fake’ hotspots that capture and steal sensitive data from their…