Posts by author
Panda Security
Pirate Party: the Future of Politics?
Could Iceland’s Hacker-founded Pirate Party be the Future of Politics? So, Donald Trump is president of the leading world power. Yes, that really happened. While…
Why Your Business Needs a Security Strategy for Social Networks
Many companies don’t have a system of rules in place for social media use in the workplace, putting their security at risk.
The Cruelest Ransomware Propagates Like a Meme
Popcorn Time is a ransomware that gets its victims to collaborate with it by giving them the option to either pay the ransom or pass it along to their contacts.
Adaptive Defense 360 Given Stamp of Approval by AV-Comparatives
The esteemed AV-Comparatives Institute endorses Adaptive Defense 360, the most advanced end-user cybersecurity software on the market.
Health Care Legislation Raises Ransomware to Level of Cybersecurity Breach
Data theft and ransomware attacks with a direct financial impact on their victims are some of the primary threats that the health care industry is facing.
Eddy Willems Interview: Smart Security and the “Internet of Trouble”
PandaLabs speaks with Eddy Willems, Security Evangelist at G Data Software AG, about security in the age of the Internet of Things.
Now Hackers Can Spy On Us Using Our Headphones
Hackers can access your data through your headphones Mark Zuckerberg has a revealing routine he carries out on a regular basis which says as much…