Posts by author
Panda Security
Elections and e-voting: Is voting online safe?
E-voting has certain advantages, but it also has drawbacks. This is why this particular voting method still isn’t widespread.
Juan Antonio Calles: “Threat Hunting could improve an organization’s detection and response capabilities”
Juan Antonio Calles, CEO of Zerolynx and SCO of Osane. Before this, he worked as head of the KPMG cybersecurity laboratory.
Cyberwar against NATO: Who are Earworm and APT28?
The criminal record of the group Earworm, which first came to light in 2016, doesn’t go back very far, but is intense and far-reaching.
SS7, telecoms’ largest security hole
The SS7 protocol was created in 1975, and has hardly been updated since, which means that it lacks sufficient security for those that make use of it.
A new piece of malware that could endanger the healthcare sector
A new piece of malware developed by security researchers has further highlighted the persistent cybersecurity problems that the healthcare sector faces.
Is it possible to ensure the privacy of electronic voting?
On May 23, the Panda Security Summit 2019 (#PASS2019) will discuss the keys to protecting against cyberattacks on public administrations.
GOd vs. Germany: How did an amateur cybercriminal shake a whole country?
A data leak that affected a litany of public figures in Germany has proven a rising trend: cyberwar and cyber espionage between countries.