1644 posts
With NFC, even the most expensive smartphones are vulnerable
Nowadays we are defined by our phones. When you buy a smartphone, you automatically become a convert, defending the benefits of your particular brand over…
AirHopper, the malware that infects your corporate network even though you are not connected to the Internet
Seems logical, doesn’t it? If your company has ever warned you that you must tread very carefully when browsing the Internet so that your computer…
Panda Internet Security 2015 achieves Virus Bulletin certification
Congratulations are in order! Panda Internet Security 2015 has achieved Virus Bulletin certification! In addition to this good news in itself, we also achieved it…
Rootpipe, WireLurker and Masque Attack, the latest vulnerabilities on Apple devices
You have heard it more than once but it is a myth. It always has been. It does not matter how many times you have…
Electronic voting may not be 100% secure (but neither is traditional voting)
You must start from a base: no voting system is 100% secure. Neither traditional nor electronic. Ballot stuffing is a practice as old as elections…
Access control for companies: Which system is the most secure?
Some time ago, the most common mechanism for getting into an office was a simple key. Simple but vulnerable. Conventional locks do not identify people…
WhatsApp encrypts messages for Android users
After the arrival of the blue double-check to confirm that the message has been read, WhatsApp has set out to clean up their image and transmit the idea that…