Posts by author
Panda Security
What are supercomputers? What are they used for?
Supercomputers are also used to perform complex calculations such as climate studies, marine life investigations and advanced manufacturing. The two most powerful supercomputers are in China.
Protect yourself against technical support scams
For some time now, a variant of scam is being used by attackers to try to break into your computer. The fraudsters usually call you…
Twitter frauds: the blue bird with the power to verify your business
What separates Twitter commoners from Twitter royalty? A blue badge indicating who has a special account verified by Twitter. Beware of the cybercriminals who are taking advantage of this.
You have less than 30 days before Whatsapp shares your information with Facebook
You now have less than 30 days to change your mind if you recently accepted Whatsapp’s new Terms of Service and Privacy Policy.
You don’t realize how many devices in your workplace are connected to the Internet
The Internet of Things is growing and more devices are connected to the internet everyday. The number of smart gadgets connected to the network in your company is growing. Learn how to boost your company’s security!
Tales from Ransomwhere: Shadow Copies
It is difficult to recover files that were kidnapped by ransomware without paying the criminals. In this new chapter we will clue you in on some tricks.
The biggest vulnerability in businesses: the lack of qualified IT professionals
While the risks associated with digitalization increase, the number of trained cybersecurity professionals remains low. In a recent study, it was estimated that around one million IT experts are in need worldwide.