Search Results for
pandalabs
Collective intelligence and “Cloud Computing”
Despite all the recent noise in the market about the benefits and advantages of protection from the cloud, only by developing a system that…
Deep Dive Analysis on a Twitter Attack
As many of our readers know, the Internet is constantly under attack with new threats appearing each and every day. Blackhat SEO attacks, which intertwine…
SEO & hackers, an odd couple
Edited by Iñaki Gorostiza, March 2010 We tend to think of experts in SEO techniques as mystic loners, able to predict trends on Google and…
IRS Malspam Campaign
As we have documented in the past, a new (actually, it’s the same as the old one) Fake IRS notification malspam campaign has started up…
Brazil, India and Korea top the first 2010 ranking of spam sources
– Panda Security has analyzed nearly five million spam messages generated in January and February 2010, sent from one million different IP addresses – The ranking…
Cybercriminals: computer genius or professional criminals?
Much to my surprise, one of the aspects about the Mariposa case that has attracted most attention in the media is that the criminals involved…
Teaching Some Security (II)
A couple of weeks ago I published my first Security Lessons. Since then I’ve received feedback (thank you all!) to create new lessons. Again I…