Smart camera privacy โ what you need to know
Smart cameras are very handy and make the life of parents easierโ but you must take care to ensure that they are protected from criminals.
How Endpoint Detection and Response gave rise to Threat Hunting
Rather than reactively responding to malware threats, our security analysts are actively engaging in Threat Hunting looking for new threats.
Should you ditch charging cables?
New smartphones now support wireless charging โ should you dump your old charging cables? We take a closer look and the advantages and disadvantages.
Panda Security verified by Citrix as Citrix Ready
Panda Adaptive Defense 360 is now a validated and recommended solution to help Citrix customers to strengthen their security stance. We are pleased to announce…
The Justice Department is suing Edward Snowden over a book
Whistlerblower Edward Snowden, released a book called ‘Permanent Record’ on Sept 17th. Now the Justice Department is suing him.
Internet scams – why do people keep falling for them?
There is a lot of misinformation on the internet but it is usually quite easy to check if a story is fake – so why do we keep falling for them?
Island hopping: the tactic de rigueur among cyberattackers
Cybercriminals have used a tactic called island hopping to carry out a ransomware attack on 22 local governments in Texas.