Search Results for
BEC
The Internet of Things: Pacemakers
 Fit-bracelets, smart-watches, and other wearable technology have joined the “Internet of Things”, everyday objects that collect and exchange information (think: vehicles, smart thermostat systems, and any other…
Who are the most famous hackers in history?
Since the beginning of the internet, there have been hackers who have used the Net to benefit at the expense of other users. Â Some have…
Locky malware report
The main objective of the Locky malware is to encrypt certain system files and network drives to coerce the affected user into paying a ransom…
The first keyless car is on the way (with security in the hands of a smartphone)
First we had keys that could remotely unlock the car door at the push of a button, an almost universal feature today. Then came keyless…
10 things we learnt from viruses of the past
A very special museum has just opened its doors, albeit virtual ones. The gallery is online and its works aren’t paintings, nor sculptures, nor antiques:…
Knowing how many calories you’ve consumed is great, but be careful with fitness bracelets
Thanks to their inbuilt sensors, bracelets and other wearables have become the perfect tool for monitoring our fitness and wellbeing – they inform us of…
Panda Security launches its Practical Security Guide for avoiding cyberextortion in businesses
In order to stop an organization becoming a victim of cyber extortion a combination of security technology, company policy and training are the most important…