424 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
Stolen credentials are big business
Phishing is a regular topic here on the Panda Security blog. Mainly because it presents such a risk to our users. Our articles tend to…
What is Quishing? And how can I protect against QR code hacking?
Since the Covid pandemic, QR codes have become a common part of everyday life. The strange boxy barcodes were often used on Covid passes (remember…
What Is a Root Certificate and How Does It Work?
A root certificate is a trusted digital certificate issued by a certificate authority (CA) that serves as the foundation for verifying the authenticity of other…
Evil Twin Attack: Definition + How to Prevent It
Using public Wi-Fi networks can pose significant security risks, including exposure to evil twin attacks. An evil twin attack is dangerous because hackers can obtain…
Vitalik Buretin’s X account: hacked
The founder of Ethereum is one of the most followed people in the crypto world, but even X’s tight security could not stop the hackers who managed to run away with almost $1 million worth of digital funds.
Android automated SOS feature is causing serious problems
UK emergency services report a spike in false alarms caused by an Android feature that calls for help immediately after incorrectly detecting an action.
Incident Response Plan: What It Is and How to Build One
Even if a company has a good prevention plan and a solid security team, breaches do occur. That’s why a good incident response plan needs to be in place.