[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Short battery life is a known issue for all smartphones There is hardly anything more frustrating than wanting to use your cell phone and not having enough juice in it. Sometimes you can just plug it in the wall and charge it a little bit, but there are also times when you don’t have the […]

Cybercrime is a very profitable and attractive business. This is a new phase of cyber theft that involves stealing money directly from banks, rather than from their customers, using phishing attacks to infect the computers of bank employees. The million-dollar question is: where are the largest sums of money? They are, without a doubt, in the financial […]

How to build a safe smart home?
June 13, 2017

Building a smart home is not hard at all… Coming home to a pre-heated house, being able always to monitor what is going on at home, knowing that if the emergency alarm sets you will not only get a notification on your cell so you can inform the authorities, but you will have a device […]

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions […]

Panda Security will be attending this year’s Gartner Security and Risk Management Summit. The event, organized by IT research and advisory company Gartner, will be held in National Harbor, Maryland, United States, from June 12 -15. Panda Security will be at Booth #643, presenting the new corporate cyber-security paradigm based on Adaptive Defense. The Spanish […]

Companies are more vulnerable than ever to cyberattacks, as their CIOs will be quick to explain to anyone who cares to ask. A third of them acknowledge that their company has suffered a major cyberattack in the last two years, an increase of 45% compared to 2013. And only one in five IT managers claims […]

Is the Media Able to See the Difference Between Fake, Real and Tampered Leaks? Since President Donald Trump became POTUS, he has been accusing reputable sources of information such as BBC, NY Times, NBC News and CNN for being ‘fake news’. However, every single person, who has ever had to deal with these outlets, especially […]

Look at the apps installed on your smartphone and you’ll see that many of them offer location sharing functions. Location sharing is incredibly useful – when used correctly. Here are a few things you should be aware of “Check-ins” and strangers Apps like Foursquare and Swarm encourage users to “check-in” when visiting restaurants, bars and […]

Since last month’s appearance of WannaCry, the network worm that wriggled its way around the world using the EternalBlue exploit and infected hundreds of thousands of computers with ransomware, we’ve been getting a lot of questions. As a cybersecurity company, we at Panda Security have made ourselves available as a source of information for other […]

1 25 26 27 28 29 157