[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions […]

Panda Security will be attending this year’s Gartner Security and Risk Management Summit. The event, organized by IT research and advisory company Gartner, will be held in National Harbor, Maryland, United States, from June 12 -15. Panda Security will be at Booth #643, presenting the new corporate cyber-security paradigm based on Adaptive Defense. The Spanish […]

Companies are more vulnerable than ever to cyberattacks, as their CIOs will be quick to explain to anyone who cares to ask. A third of them acknowledge that their company has suffered a major cyberattack in the last two years, an increase of 45% compared to 2013. And only one in five IT managers claims […]

Is the Media Able to See the Difference Between Fake, Real and Tampered Leaks? Since President Donald Trump became POTUS, he has been accusing reputable sources of information such as BBC, NY Times, NBC News and CNN for being ‘fake news’. However, every single person, who has ever had to deal with these outlets, especially […]

Look at the apps installed on your smartphone and you’ll see that many of them offer location sharing functions. Location sharing is incredibly useful – when used correctly. Here are a few things you should be aware of “Check-ins” and strangers Apps like Foursquare and Swarm encourage users to “check-in” when visiting restaurants, bars and […]

Since last month’s appearance of WannaCry, the network worm that wriggled its way around the world using the EternalBlue exploit and infected hundreds of thousands of computers with ransomware, we’ve been getting a lot of questions. As a cybersecurity company, we at Panda Security have made ourselves available as a source of information for other […]

A security research firm discovered that there’s an anonymous database containing more than 560 million passwords. The database is accessible on the Dark Web, and it is a compilation of information exposed by all major leaks over the last five years. It includes stolen account information from security breaches of LinkedIn, DropBox, LastFM, MySpace, Adobe, […]

Can someone hack my drone?
May 31, 2017

Drones are gaining more and more popularity here in the US. They are no longer only a military tool able to operate thousands of miles away from us, but an easily accessible product available in almost every consumer electronics store in the US. Well, most of the ones sold in the stores may not be […]

For those of us who grew up in the Internet age, staying safe online is relatively straightforward. Our experience with computers means that we have a good basic understanding of malware, hackers and other threats that could be used to steal personal information. Our elderly relatives are not so lucky – they did not use […]

1 25 26 27 28 29 157