Twitter used for Rogueware Distribution
Cyber criminals are using social media more frequently to distribute their malicious creations. Pft! As if Blackhat SEO, fake advertisements, and hacked websites weren’t enough?!…
New contents in our YouTube support channel!
Published by Blanca Carton, December 2010 Our aim when we created Panda’s support channel on YouTube last year was to post a series of video…
New contents in our YouTube support channel!
Published by Blanca Carton, December 2010 Our aim when we created Panda’s support channel on YouTube last year was to post a series of video…
Panda Security’s Independent Awards and Business Momentum for 2010 Put Company on Top of Cloud Security Market
•   Company honored with 35 awards worldwide for outstanding achievements in technology innovation and sales strategies •   Cloud products achieve extraordinary market adoption, surpassing industry…
10 leading security trends in 2011
Hacktivism and cyber war: making the headlines in 2011 The growth rate of new malware is set to slow down, though we can still expect…
Security trends for 2011
Our great leader and CEO Juan Santana (you know, this is the time of the year when I have to butter him up and try…
BlackHat SEO attack – Target: Wikileaks
Yet another BHSEO attack, and as always the cybercriminals are using the most popular terms, in this case Wikileaks related terms: Wikileaks Wikileaks killing video…