Interview with Rubén Santamarta about security in SCADA systems
Luis Corrons – Rubén, could you first tell the readers of the blog a little bit about yourself. Despite being quite young, you’ve been involved…
Twitter used for Rogueware Distribution
Cyber criminals are using social media more frequently to distribute their malicious creations. Pft! As if Blackhat SEO, fake advertisements, and hacked websites weren’t enough?!…
New contents in our YouTube support channel!
Published by Blanca Carton, December 2010 Our aim when we created Panda’s support channel on YouTube last year was to post a series of video…
New contents in our YouTube support channel!
Published by Blanca Carton, December 2010 Our aim when we created Panda’s support channel on YouTube last year was to post a series of video…
Panda Security’s Independent Awards and Business Momentum for 2010 Put Company on Top of Cloud Security Market
•   Company honored with 35 awards worldwide for outstanding achievements in technology innovation and sales strategies •   Cloud products achieve extraordinary market adoption, surpassing industry…
10 leading security trends in 2011
Hacktivism and cyber war: making the headlines in 2011 The growth rate of new malware is set to slow down, though we can still expect…
Security trends for 2011
Our great leader and CEO Juan Santana (you know, this is the time of the year when I have to butter him up and try…