Posts by author
Panda Security
What is Hacktivism?: Its Motivations, Types, and Prevention
Hacktivism refers to cyber-activism, or the act of breaking into a computer system to wage an information war for political, social, religious, or anarchistic reasons.…
Vulnerability Assessment: What it is and How to Perform One
Quick answer: A vulnerability assessment reviews and assesses the risks of security weaknesses in an organization’s information and security systems. There are more than 180,000…
What is SSL? A Guide to How It Works and Why It’s Important
Secure Sockets Layer, otherwise known as SSL, is an encryption protocol that creates an authenticated channel between devices on the internet, so that information can…
What is Social Engineering and How Can You Protect Yourself?
Social engineering is a tactic that cybercriminals use to manipulate people into revealing private information or sharing sensitive data. If you’ve ever gotten an unexpected…
SSL Certificate: What It Is and How to Get One
Every user wants and expects a safe and secure internet experience. Whether they’re purchasing concert tickets or moving funds to a new bank account, online…
What Is a Router? Your Guide to At-Home Wi-Fi
If you are reading this over a Wi-Fi connection, you can thank a router. Simply put, a router is the gateway that sends information between…
Are Cookies Bad + How to Clear Them
Have you ever browsed an eCommerce site and added potential purchases to your cart, only to exit your browser and not submit the order? Did…