Posts by tag
operating systems
The bounty programs of Google, Facebook, Microsoft… Which tech giant offers the juiciest rewards to hackers?
Bounty programs became widely used among large technology companies once major firms such as Mozilla or Google had started the trend. Facebook and PayPal…
Reasons why Mac users are superior
Reasons why Mac users are Superior Some people think Apple users are smug and arrogant. But that´s OK because thy need something to…
5 tips to protect your Mac
Any discussion of the concept of security in Apple systems is not straightforward. This is not something that arises from the manufacturer’s clear concern to protect its…
160,000 new samples of malware every day in the first quarter of 2014
Our colleagues at PandaLabs have released the quarterly report for Q1 2014. One of the report’s main conclusions is that malware is still being created…
Apple devices hacked in Australia
The Australian daily, The Age, has reported that Apple devices in the country have been hacked. So far, it’s not known exactly how many users…
New security flaw in WhatsApp for Android
We have become aware of a new security issue in WhatsApp for Android. In this case, the vulnerability occurs when you share your…
Should I protect my Android TV?
Have you ever considered protecting your Android TV? No doubt you’re aware that your computer and smartphone need a security solution, but it’s quite…