CIA, iPhone and Mac laptop
Is CIA the only agency in the world that can penetrate your iPhone and Mac laptop? A few weeks ago, Wikileaks released documents that confirmed…
What Size Companies Do Hackers Target?
Cybercriminals are after any size company that has access to people’s information. Over the last few years, we have seen so many news about stolen…
AV-Comparatives awards the highest certification to Panda Security in protection against malware
Panda detected 99.98% of the more than 37,000 samples used by AV-Comparatives in the Malware Protection Test.
How the FBI Dismantled a Russian Spam Empire
According to the indictment, he’s “one of the most notorious spammers in the world.” Â The Russian Piotr ‘Severa’ Levashov, who has been arrested in…
Guiding Your Child Safely Into Digital Independence
One of the things that you see when hanging around at a busy mall or almost anywhere during the weekend is the picture of a…
What is an online troll?
You’ve probably heard about online trolls – but what are they? And what do you need to know about them? Digital bullies Online trolls are…
The Deep Web: Myths And Truths You Need To Know
Every now and then the media comes up with a sensational story about the Deep Web. Often these tales are shocking and frightening – but…