WLAN: Emotet’s new distribution method
Cybersecurity investigators have discovered a new variant of the notorious botnet Emotet that uses WLAN connections to spread to new victims.
TikTok Explained to a Millennial
Downloaded more than one and a half billion times, TikTok aims to become more than a Generation Z trend- a powerful marketing and advertising tool.
Cybertheft in Malta: How a bank lost €13 million
In February 2019, cybercriminals managed to steal around €13 million from Bank of Valletta, one of the most important banks in Malta
A BEC scam leads to a healthcare data breach
A medical center in New York City suffered a BEC attack that led to the exfiltration of personal information on over 600 patients.
Mac Malware Becomes More Common – Are You A Victim?
Research suggests malware targeting Apple computer users is becoming more common – and dangerous.
How to claim Yahoo data breach settlement?
Yahoo was hacked between 2012 and 2016. If you had an account with them, you might be eligible for a compensation. Find here how to claim it.
“Panda has perfected it”: IT Pro reviews Adaptive Defense 360
IT Pro, one of the UK’s leading enterprise IT websites has published a review of Panda Adaptive Defense 360, in which it awards the solution five stars.