Posts by author
Panda Security
Beware this malware: it can even survive operating systems being reinstalled
LoJax is a piece of malware that is able to survive an operating system being reinstalled making it especially dangerous for companies and institutions.
Who is to blame for the majority of data breaches?
A report has shown that in the United Kingdom the number of security incidents that have led to data breaches has grown by 75% in the last two years.
How to Problem Solve Like a Hacker
When you choose to go online, most internet users would say their goal is to find something they are looking for, or accomplish a task.…
Ten useful tips for online security in Cybersecurity Awareness Month
For Cybersecurity Awareness Month, we’re sharing a list of tips to encourage greater safety and protection among all computer users.
Watch out! The risks associated with BGP, FTP, and NTP protocols
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
A dating site and corporate cyber-security lessons to be learned
Analysts were able to draw some important conclusions from Ashley Madison that should be taken into account by any company that stores sensitive information. Protect your company!
3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.