Android or iOS: which operating system is the most secure for mobiles?
Following the recent XcodeGhost attack on the Apple Store in China, the eternal debate has reignited:Â iOS or Android? This is the dilemma that you face…
XcodeGhost: What it Is and How to Avoid it. The Sheen Comes off Apple’s Invincibility
In what is a timely reminder that even the largest, and seemingly controlled, companies can face a cyberattack, Apple revealed that its Chinese App Store had…
Trouble accessing Skype? The company has advised its users of a problem with its service across the globe
Have you been unable to log onto Skype today? Don’t worry, you’re not the only one! The company has informed its users that if they…
Panda Security launches Adaptive Defense 360, the first advanced security service with blocking and disinfection capabilities
Today, with more than 230,000 new malware samples daily and ever more sophisticated infection techniques, businesses are facing increased threats that put their confidential information…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
As Adobe Flash gets phased out, we certainly won’t be pining after it
This September 1 didn’t just bring with it the usual back-to-school (or work!) rush that we see every year, but also the ushering in of…
Facebook ads. How to avoid them?
Have you ever wondered why the advertisements that appear on your Facebook feed offer you the exact product and service that you are supposedly interested…