Posts by author
Panda Security
12 Women in Cybersecurity Who Are Reshaping the Industry
Women make up roughly 24% of cybersecurity professionals. While this is an improvement from a mere 11% since 2017, historical obstacles remain for women looking…
What Is a Smurf Attack?
A Smurf attack is a distributed denial-of-service (DDoS) attack in which an attacker floods a victim’s server with spoofed Internet Protocol (IP) and Internet Control…
How can you tell if a shortened link is secure?
At some time in our (digital) lives, we’re bound to come across shortened links or URLs, on social networks, for example, you can’t avoid…
7 Ways Teens Hide Online Activity + What You Can Do
Is your teen bypassing your privacy settings? Here are 7 ways they may be hiding their online activity and what you can do to stop them.
Your Digital Footprint Explained — and Why It Matters
Your digital footprint is the trail of data left behind from all your online activity. Anything you share or do online, from visiting a website…
The Evolution of Robotic Dogs: Where Is Cyber Fido Headed Next?
Robots have been a point of fascination and study for centuries as researchers and inventors have sought to explore the potential for automated technology. While…
What is an Evil Twin Attack?
An evil twin attack is a spoofing cyberattack that works by tricking users into connecting to a fake Wi-Fi access point that mimics a legitimate…