391 posts
Most company training programs leave out important IT security information. Are you at risk?
Workers are the first and the weakest link in the security chain (including your boss), especially if they have not received adequate training to defend…
Advanced Attacks against Hotel Chains: A practical example
Advanced Attacks are persistent and more powerful than the usual ones. Learn all about them in this practical example.
227,000 malware samples per day in Q1 2016
The amount of malware created continues to break records, with more than 20 million new samples, identified in this PandaLabs study.
If you find a USB stick, resist the temptation to open it
Cyber-criminals are infecting our computers with malicious programs by using storage devices.
Be careful with CryptoBit, the latest threat detected
2016 has been loaded with developments in the world of cyber-security. The latest news? CryptoBit, a type of ransomware known for its unique characteristics. Discover how to deal with it!
Linked Out: how job-search platforms are being used for ransomware
Every time you apply for a job, you could be falling prey to one of the newer cyber-attacks.
Uncovering the WhatsApp encryption
Avid WhatsApp-ers were the first ones to notice the new security changes the company put into action last week.  Now, your conversations on WhatsApp are…