Search Results for
POS
MS10-002 Exploit Constructor
As humans beings, we tend to be a bit lazy, at least in most of the cases. And cybercriminals are human beings, and therefore, lazy…
Panda @ AV-Comparatives
After some years we have decided to participate again in the AV-Comparatives.org tests. The main driver for this decision has been the evolution of the…
Blog Comment Spam Honeypot
One of the most common vectors for distributing malware nowadays is spamming blogs with comments pointing to malicious sites that host exploits, malware, rogue antiviruses…
What are you doing? Hello Twitter!
Twitter (to utter a succession of small, tremulous sounds, as a bird) is a free service that allows users to send text messages called tweets.…
Blog Comment Spam Honeypot
One of the most common vectors for distributing malware nowadays is spamming blogs with comments pointing to malicious sites that host exploits, malware, rogue antiviruses…
Panda Security, leading Spanish software vendor in the 2009 Truffle 100 Europe index
For the second year running, Panda Security has been rated the leading Spanish software company in the 2009 Truffle 100 Europe index (http://www.truffle100.com/2009/edito.php), which lists…
Cyber Criminals Target New Year
You might be in for a rude awakening if you’re looking for a new years eve party or anything related to new years eve tonight. …