Posts by author
Panda Security
How to share your internet mobile connection safely
Are you aware of the dangers of sharing your internet mobile connection? Most smartphones have a built-in function that allows you to share the mobile…
Porn filter: is it enough to protect our children?
UK to create new porn filter – but is it enough to protect your kids? The UK government has recently announced a range of new…
Did you know your eReader can be hacked?
Could be your eReader a potential target for attack? Most people think that hackers only target PCs and laptops. Some may also be aware that…
How a Smart Toy Could Get Hacked
This holiday season, the Internet of Things makes its way to toy stores. This new brand of entertainment brings along with it considerable security risks that must be addressed.
Is WeChat set to shake up the tech industry?
It’s very easy to write off any instant messaging app that isn’t Whatsapp as a clone of the famous messaging giant. How could anyone possibly…
What is a VPN and How Does It Work?
Watch your favorite shows anywhere, and other useful VPN functions In simple terms, a VPN, or Virtual Private Network, is a connection between a group…
How to avoid hacking to Critical Infrastructure
Panda Security launches a Whitepaper about how to avoid IT attacks on Critical Infrastructures. Known here the latest data!