Posts by author
Panda Security
Don’t be careless when throwing away your used boarding cards!
Despite the need to print off documents having a less important role in our lives in the era of smartphones, there are still some things…
10 Tips to Avoid Viruses on Halloween
Halloween is one of the most celebrated holidays, and cybercriminals always want to be part of it. As we get closer to Halloween, hackers…
How a drone can hack into your home’s network just by flying over it
Drones can be used to record incredible scenes for movies, to follow thieves from above, to save lives, or to carry out home deliveries at…
How to protect your company from Zero-Day attacks
Any attack that takes advantage of the “window of opportunity” produced by recently discovered vulnerabilities is called a Zero-Day attack. In other words, a rapid…
Pay with Bitcoins to save a hacked phone? It’s a scam!
The Telematics Crime department of Spain’s Guardia Civil has warned of a new type of fraud which affects mobiles. This new operation consists of cybercriminals…
5 security measures that experts follow (and so should you!)
When you’re watching a movie and you see the typical computer screen filled with green coding (you know the type, rows of 1s and 0s)…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…