Search Results for
POS
Luis Corrons: “Companies should act as if they’ve already been attacked, if they really want to remain safe”
The director of Pandalabs, the laboratory which Panda Security set up to fight against malware, shares with us the main tips that businesses should follow…
The lessons we’ve learnt from the Ashley Madison leak
The shockwaves that were caused by the massive leaking of user information from the online dating site Ashley Madison can still be felt. The attack…
Is there for a future for traditional text passwords?
“It doesn’t matter how complex or unique they are, your passwords can no longer protect you” (Matt Honan, Wired) It is relatively easy to find…
The invisible trail left by your device’s battery which leads right to you
While smartphones and tablets continue to have more features which help make our lives easier, their battery life isn’t usually something which users are happy…
Google will block extensions that try to deceptively install themselves on your browser
Surely this has happened to you before: you’re browsing online and you come across a blog or website that has a plugin for Chrome that…
EDR technology – much more than just standard protection
Traditional viruses, defined as executables that were sent en masse to cause infection on a large scale, are already controlled by protection systems (Endpoint Protection…
Virus in the name of WhatsApp! Now via email!
WhatsApp – VocĂŞ recebeu uma menssagem de voz… Have you also received this notification and understood it to mean that you have a voice message in…