[email protected] +603-2181 3666
Extol Threat Intelligent Notification
CIA, iPhone and Mac laptop
May 5, 2017

Is CIA the only agency in the world that can penetrate your iPhone and Mac laptop? A few weeks ago, Wikileaks released documents that confirmed CIA had been intentionally infecting Apple Devices with non-removable malware. According to the latest vault7 leak from the non-profit organization run by fugitive Julian Assange, the agency has developed malware […]

The AV-Comparatives independent laboratory has awarded its highest level of certification, Advanced+, to the detection, scanning and protection effort of Panda Security. In a comparative review of more than 20 free and paid security software developers, the high detection capabilities of Panda Security’s solutions stood out. Panda detected 99.98% of the more than 37,000 samples […]

  According to the indictment, he’s “one of the most notorious spammers in the world.”  The Russian Piotr ‘Severa’ Levashov, who has been arrested in a joint action by the Spanish and American authorities while on holiday in Barcelona, ​​made a mistake that could end up being very costly: he used the same credentials for […]

One of the things that you see when hanging around at a busy mall or almost anywhere during the weekend is the picture of a mother that holds a smartphone in one hand, and a kid in the other. And very often even the kid is also holding a smart device. Yes, these are the […]

– Say my name. – 127.0.0.1! – You are goddamn right. Network communication is a key function for any malicious program. Yes, there are exceptions, such as cryptors and ransomware Trojans that can do their job just fine without using the Internet. However, they also require their victims to establish contact with the threat actor […]

What is an online troll?
April 28, 2017

You’ve probably heard about online trolls – but what are they? And what do you need to know about them? Digital bullies Online trolls are most similar to the playground bullies you would have encountered at school. These people deliberately provoke arguments and fights on social media and forums, often by saying the most grossly […]

Every now and then the media comes up with a sensational story about the Deep Web. Often these tales are shocking and frightening – but are they true? What is the Dark Web and Deep Web? Before going further, we need to understand what the Deep Web actually is – fortunately the concept is much […]

For the second month in a row, Panda Security has received a perfect score of 100% in malware detection within the parameters of the Real-World Protection Test from AV-Comparatives. The evolution of cyberattacks, both in number and in complexity, makes it more necessary than ever to anticipate malicious behavior. With data gathered in the first months […]

  The alleged hacking of the last US elections by the Russian government, the anonymous cyberattack that hit the Ukrainian power grid in 2015, the Stuxnet virus that sabotaged the Iranian nuclear program in 2010 — such events serve as a reminder that the next form of international conflict will be heavily dependent on cyberweapons. […]

1 29 30 31 32 33 157