3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
10 Secure File Sharing Options and Tips
In the current world of technology, pictures, documents and files are no longer shared in the physical form. Most are transferred through online tools. While…
Facebook: How to minimize the risk of vulnerabilities
Almost 50 million Facebook accounts were exposed to an attack that was possible thanks to a vulnerability. At Panda Security, we’ve prepared some advice on how to avoid being the next victim.
The consequences of not applying patches
Many recent cyberincidents in have shared one characteristic: they have been possible thanks to a vulnerability in an IT system that needed patches.
Intelligent Fake News Detection Becomes A Reality
The fight against fake news just became a lot smarter thanks to artificial intelligence
Panda Security has signed the Cybersecurity Tech Accord
Panda Security is joining the Cybersecurity Tech Accord and its commitment to protect users and clients, and improve the security of cyberspace.
90% of companies acknowledge that they are not cyber-resilient
90% of companies still need to implement, increase or improve their IT security processes in order to become more cyber-resilient.