Fake antivirus programs hijack and block computers
The rogueware business has evolved to incorporate ransomware techniques, based on the hijacking of users’ information Infected computers are extremely difficult to clean manually, forcing…
Panda Security Days in Sweden 09
Just as we did last year and other years before that, last week we had our Panda Security Days in Sweden. This year we started…
What should I do if I receive spam in Twitter?
Twitter, Facebook and MySpace are highly popular social networks. Unfortunately, there are always hackers who try to exploit the success of these networks for financial…
Blackhat SEO Campaign Targets 2009 Nobel Prize Winner
We’ve identified a new Blackhat SEO campaign today which targets President Obama as the 2009 Nobel Peace Prize winner among a thousand or so other…
What can children learn through computers?
Posted by Nerea Bezares October 08, 2009 Some parents believe that if their children do not have access to new technologies, they may not be…
Panda USB Vaccine – Version 1.0.1.4
We recently released version 1.0.1.4 of Panda USB Vaccine. This version includes a few bug fixes plus multi-lingual support. The MD5 of the executable is 58cc5b530fc552c8e31870f90db425ed.…
Rogueware with new Ransomware Technologyâ„¢
The criminals behind Rogueware attacks are becoming increasingly aggressive in their approach to make money. We recently stumbled across a sample (Adware/TotalSecurity2009) which uses a…