Industrial espionage: cyberattackers seeking out patents
With the amount of technological and scientific innovations in the world today, it is no surprise that they can become targets for industrial espionage.
How to Clean Your Social Media
Is your social media secure? What data are these sites collecting from you? We give you tips for spring cleaning your LinkedIn, Twitter and Facebook.
How much do period tracking apps share with companies?
How much do pregnancy and period tracking apps share with employers and insurance companies?
Xwo, the malware that scans the Internet for vulnerabilities
Xwo is a new piece of malware discovered by AT&T’s Alien Labs that searches the Internet to find possible vulnerabilities to exploit.
Juan Antonio Calles: “Without the appropriate professionals, security measures quickly become obsolete”
In the second part of our interview, Juan Antonio Calles discusses concepts such as digital forensic analysis, biohacking, SIRPs and cyber-resilience.
Case study: Alfa Kommun & Landsting AB and cybersecurity in the healthcare sector
Panda Adaptive Defense protects Alfa Kommun & Landsting AB, a Swedish healthcare systems company, against all kinds of advanced threats.
States are facing an increasing amount of cyberattacks
It is normally tricky to determine whether or not other states are behind most cyberincidents dealt with by states and governments.