Search Results for
POS
How to protect your phone during the summer holidays
Your phone goes everywhere with you. Here’s how to keep it safe from whatever you might encounter as you’re out and about this summer.
LinkedIn: a lucrative social network for cybercriminals
A campaign has been discovered in which the cyber espionage group APT34 infected companies using messages sent over the social network LinkedIn.
Equifax Settlement: Who is eligible for compensation
The data breach of Equifax affected 147 million people. Now the company has been ordered to pay the victims. Here’s how U.S. residents can file a claim.
A new Ransomware that deletes data
A Ransomware named German Wiper deletes data and, of course, demands ransom money. According to the CERT-Bund, the computer emergency team of the BSI, and…
The Trust Hospital Company protects against cyberthreats
Panda Adaptive Defense 360 and Panda Systems Management protect The Trust Hospital Company against the most advanced cyberthreats.
How do hackers pick their targets?
In this post we take a look how easily hackers find information about there victims and how to avoid becoming an easy target.
Is Instagram Listening To Your Conversations? Apparently Not.
People have long suspected that social media apps are listening in to their conversations – but the Instagram CEO denies these rumours.