Watch out! The risks associated with BGP, FTP, and NTP protocols
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
A dating site and corporate cyber-security lessons to be learned
Analysts were able to draw some important conclusions from Ashley Madison that should be taken into account by any company that stores sensitive information. Protect your company!
Enrique Ávila: “Cybersecurity isn’t negotiable: the loss of resources can mean the end of your company”
Enrique Ávila is the director of the Spanish National Center for Excellence in Cybersecurity (CNEC), a key cybersecurity organization.
The Largest Facebook Hack Happened Last Week
The most massive hack in Facebook’s history happened last week. A Facebook code vulnerability caused the data breach.
3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
10 Secure File Sharing Options and Tips
In the current world of technology, pictures, documents and files are no longer shared in the physical form. Most are transferred through online tools. While…
Facebook: How to minimize the risk of vulnerabilities
Almost 50 million Facebook accounts were exposed to an attack that was possible thanks to a vulnerability. At Panda Security, we’ve prepared some advice on how to avoid being the next victim.