Posts by author
Panda Security
Kemoge: Google Play faces new app attack
Android users will be well aware of the fact that the Google Play store, and their Android device, are constantly under the watchful eye of…
Inside the mind of a cybercriminal: what is he looking for and why has he chosen your business?
One of the first steps to ensure that your private information isn’t accessible is to understand the reasons that drive hackers and cybercriminals to do…
How to protect your company from Zero-Day attacks
Any attack that takes advantage of the “window of opportunity” produced by recently discovered vulnerabilities is called a Zero-Day attack. In other words, a rapid…
The advantages of having a managed security service
In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex, and budgets tighter and tighter. The world of technology in…
Caution! Your smartwatch could reveal what you’re doing on your computer
In case you didn’t know it, according to the latest report issued by the International Data Corporation, sales of smartwatches have increased by 200% during…
All it takes is a laser pen to confuse the so-called “smart car”
Besides radars, cameras, or a GPS system, Google decided that its driverless car would also have a powerful eye mounted on top of the vehicle…
The main information security certifications for businesses
Just being aware of all the headlines is enough to realize that new threats and vulnerabilities in the field of information security are constantly emerging.…