Who owns my brand?
Published by Enrique Aguilera, June 30th, 2010 This is an interesting name for a post, which coming from a security company, you’d expect to talk…
HCP Vulnerability Exploited in the Wild
On June 10th, a researcher working for Google publically released details about a flaw in Microsoft’s Help and Support Center. The flaw exists due to…
Viruses designed for iPhones can also infect iPads
–Â PandaLabs demonstrates in this video how malware designed for cell phones can also affect the popular iPad. –Â The iPhone/Eeki worm appeared last year, infecting jailbroken…
Infecting the iPad }:-)
Last year we witnessed the first infection that affected devices based on the iPhone operating system, it was the worm iPhone/Eeki. We wrote a blog…
What is the ‘Cloud’ and what is Collective Intelligence?
What is the ‘cloud’? Cloud computing is a technology that allows services to be offered across the Internet. To this effect, the term ‘the cloud’…
This summer I’m going phishing
Today a new season begins, summer has come and holidays are already in our minds. I’ve been thinking whether to go somewhere or stay here…
Malware and operating systems
Published by Javier Guerrero, June 17th, 2010 When I talk about malware and the need to make end-users aware about its dangers, I usually get…