8 things your kids shouldnât do online
Itâs not unusual nowadays to hear people say that if you want to know how to operate any technical device, ask a child, and theyâre…
âMacro virusâ are back: threats of the past that will haunt us in the future
Maybe you donât remember, but in 1999 Melissa was an extremely popular name within cybersecurity. This cyber virus infected more than 100.000 computers in only…
Panda Security audits the risk level of applications and users
Panda Security today announced the launch of Panda Audit Service, a new audit service to detect vulnerable applications, users and computers at risk, Advanced Persistent…
Fusion: Cloud Security, Management and Support for your IT network
You know Fusion is an integrated solution that provides security, management and remote support for all devices on your IT network. Why Fusion? Because you…
Security challenges in the digital era
The boom in information technology has led to a transformation which has been increasing in recent years due to the widespread adoption of Internet and…
A JPEG may jeopardize your companyâs network
We daily capture them on our phones. We have dozens of them stored on our computers. We share them on social networks and we love…
Russian models that fall in love with you⊠itâs a scam!
âI want to chat with youâ if you have received an email with this subject, or something similar, with the picture of a beautiful Miss…