1644 posts
How web 2.0 are you?
Posted by Leyre Velasco, 27th October, 2009 The term Web 2.0 is associated with web applications which facilitate interactive exchange of information, data sharing, and…
Panda Security launches its 2010 product versions compatible with Windows 7
Panda Security, The Cloud Security Company, has today announced the availability of its 2010 solutions compatible with Windows 7. All users with this operating system…
Banking trojans. Do you want to be an innocent victim?
Posted by Sean-Paul Correll, October 21, 2009      Banking Trojans are one of the most prevalent Malware species in the threat landscape today. Malware authors aim…
What is SPAM and what isn’t?
Posted by Cristina Bermudez, October 16, 2009 This is a relatively common question and the answer is: Spam is the massive sending of UNSOLICITED email. …
Panda Managed Office Protection wins Rising Star Award for Best Security Software 2009 from PCWorld LA
Panda Managed Office Protection (PMOP), the security as a service (SaaS) solution from Panda Security, has received the Rising Star award from PCWorld Latin America,…
Fake antivirus programs hijack and block computers
The rogueware business has evolved to incorporate ransomware techniques, based on the hijacking of users’ information Infected computers are extremely difficult to clean manually, forcing…
Panda Security Days in Sweden 09
Just as we did last year and other years before that, last week we had our Panda Security Days in Sweden. This year we started…