Posts by author
Panda Security
Watch out! The risks associated with BGP, FTP, and NTP protocols
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
A dating site and corporate cyber-security lessons to be learned
Analysts were able to draw some important conclusions from Ashley Madison that should be taken into account by any company that stores sensitive information. Protect your company!
3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
10 Secure File Sharing Options and Tips
In the current world of technology, pictures, documents and files are no longer shared in the physical form. Most are transferred through online tools. While…
The consequences of not applying patches
Many recent cyberincidents in have shared one characteristic: they have been possible thanks to a vulnerability in an IT system that needed patches.
The future of security lies in quantum computing
The future of computing is in quantum mechanics, and the sector that has most to gain from quantum computing is the security sector.
What is the difference between sandboxing and honeypots?
Today we take a look at two strategies that are very common in the sector: honeypots and sandboxing, two IT risk prevention strategies.