Posts by author
Panda Security
Security forecast for 2015
Our colleagues at PandaLabs have been making their predictions about what will be happening in the world of IT security in 2015. Do you want…
Can they spy on you through your smartphone microphone?
Smartphone users are highly sensitive about privacy, not least because so much personal data is stored in just a few square centimeters. We shudder at…
Why has Twitter logged me out?
You may have woken up this morning to find a Twitter notice asking you to re-enter your Twitter account details. Has your password been stolen?…
Major security attacks in 2014 โ Part 2
A few days ago we published a summary of six of the most important security attacks in 2014. Today we continue this list with some…
Prevention is better than cure: These eleven threats could compromise your corporate systems in 2015
We donโt know what next year has in store for us, yet predictions are always useful to be better prepared for what might be around…
Christmas contest! – Help us to get a safe Christmas!
As you have no doubt seen, these days we have been posting a series of articles to help ensure everyone enjoys a safe and happy…
The number of leaked email addresses and passwords has exploded in 2014
The statistics speak for themselves: The emails you send and receive every day at work are a time-bomb. This is not just because they can…