1638 posts
Watch out! The risks associated with BGP, FTP, and NTP protocols
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
A dating site and corporate cyber-security lessons to be learned
Analysts were able to draw some important conclusions from Ashley Madison that should be taken into account by any company that stores sensitive information. Protect your company!
Enrique Ávila: “Cybersecurity isn’t negotiable: the loss of resources can mean the end of your company”
Enrique Ávila is the director of the Spanish National Center for Excellence in Cybersecurity (CNEC), a key cybersecurity organization.
The Largest Facebook Hack Happened Last Week
The most massive hack in Facebook’s history happened last week. A Facebook code vulnerability caused the data breach.
3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
Facebook: How to minimize the risk of vulnerabilities
Almost 50 million Facebook accounts were exposed to an attack that was possible thanks to a vulnerability. At Panda Security, we’ve prepared some advice on how to avoid being the next victim.
90% of companies acknowledge that they are not cyber-resilient
90% of companies still need to implement, increase or improve their IT security processes in order to become more cyber-resilient.