[email protected] +603-2181 3666
Extol Threat Intelligent Notification
IT News

Earlier this month, KrebsOnSecurity featured the exclusive story of a Russian organized cybercrime gang that stole more than $100 million from small to mid-sized businesses with the help of phantom corporations on the border with China. Today, we’ll look at the stranger-than-fiction true tale of an American firm that lost $197,000 in a remarkably similar […]

The new 2016 Consumer Solutions range by Panda Security is finally available! In an increasingly global and multi-device environment, the 2016 Consumer Solutions range is designed to make the digital world easier and more secure. The solutions portfolio for protection on all devices includes: Panda Gold Protection 2016 Panda Global Protection 2016 Panda Internet Security […]

What is a secure OS?
August 13, 2015

After the publication of our article on car hacking we received a number of questions regarding KasperskyOS. People who wrote to us made the valid point that there are several good and reliable operating systems on the market, designed, among other purposes, for the automotive industry. The main argument used to demonstrate the technological superiority […]

Spam and phishing in Q2 2015
August 13, 2015

 Download PDF version Spam: features of the quarter “Noising” domains We have already analyzed the situation with regard to the considerable increase in the number of new domain zones as well as mass generation of spammer domains in these zones, specifically those designed to send out illegitimate mass mailings. The further analysis of spam mailings […]

You have read and reread numerous lists with tips on how to browse online safely, make online purchases, avoid your most intimate photos ending up online, stopping cybercriminals from ruining your vacation, or how to enjoy your favorite games without risking your privacy… You’ve heard the same basic precautions time and again, but you keep […]

Microsoft releases a new batch of fourteen security updates patching over fifty vulnerabilities today, with one of them known to be abused in targeted attacks. A large number of the vulnerabilities were reported by researchers from Google and their Project Zero, and HP’s Zero Day initiative. Meanwhile, a reflective discussion about the value of these offensive teams is […]