What is Alexa and how does she work?
Personal assistant? Entertainer? Shopping guide? Home automation hub? Amazon Alexa is all these things and more. Take a look at how she works.
Operation reWired: 281 BEC scammers arrested worldwide
Operation reWired, a joint effort between international law enforcement agencies led to the arrest of 281 people charged with carrying out BEC scams.
Internet Explorer and Microsoft Defender: vulnerable to RCE attacks
On September 23, Microsoft launched an urgent update for Internet Explorer to fix a critical vulnerability that is being exploited by cybercriminals.
Smart camera privacy โ what you need to know
Smart cameras are very handy and make the life of parents easierโ but you must take care to ensure that they are protected from criminals.
How Endpoint Detection and Response gave rise to Threat Hunting
Rather than reactively responding to malware threats, our security analysts are actively engaging in Threat Hunting looking for new threats.
Should you ditch charging cables?
New smartphones now support wireless charging โ should you dump your old charging cables? We take a closer look and the advantages and disadvantages.
Panda Security verified by Citrix as Citrix Ready
Panda Adaptive Defense 360 is now a validated and recommended solution to help Citrix customers to strengthen their security stance. We are pleased to announce…