Search Results for
BEC
How to find your phone – 3 alternatives to the rescue
Have you ever wonder if there is a way of locating your phone in case you lose it or it gets stolen? Well, relax, because…
Panda Security Uncovers Ongoing Attack Against Oil Tankers
Panda Security has released “Operation Oil Tanker: The Phantom Menace”, a groundbreaking report that details a malicious and largely unknown targeted attack on oil tankers.…
The Chief Financial Officer as the new guarantor of corporate cybersecurity
Technology has for a long time been out of the laboratories and has held, in its own right, a position in the companies’ executive committees.…
CryptoLocker: What Is and How to Avoid it
CryptoLocker is a family of ransomware whose business model (yes, malware is a business to some!) is based on extorting money from users. This continues…
Windows 10: Use bug-free Android Apps with it!
When Satya Nadella became Microsoft’s CEO, one year ago, he suggested that things were going to change and mobility will be his main focus. Although…
8 things your kids shouldn’t do online
It’s not unusual nowadays to hear people say that if you want to know how to operate any technical device, ask a child, and they’re…
‘Macro virus’ are back: threats of the past that will haunt us in the future
Maybe you don’t remember, but in 1999 Melissa was an extremely popular name within cybersecurity. This cyber virus infected more than 100.000 computers in only…