Posts by author
Panda Security
12 Women in Cybersecurity Who Are Reshaping the Industry
Women make up roughly 24% of cybersecurity professionals. While this is an improvement from a mere 11% since 2017, historical obstacles remain for women looking…
What Is a Smurf Attack?
A Smurf attack is a distributed denial-of-service (DDoS) attack in which an attacker floods a victim’s server with spoofed Internet Protocol (IP) and Internet Control…
How can you tell if a shortened link is secure?
At some time in our (digital) lives, we’re bound to come across shortened links or URLs, on social networks, for example, you can’t avoid…
73 Ransomware Statistics Vital for Security in 2022
Ransomware is a type of malware that threatens to destroy or withhold a victim’s critical data unless a ransom is paid to the attacker. Unfortunately,…
What Is a Man-in-the-Middle (MITM) Attack? Definition and Prevention
A man-in-the-middle (MITM) attack is a type of cyberattack where attackers intercept an existing conversation or data transfer, either by eavesdropping or by pretending to…
Text Message Scams: How to Recognize, Report and Restrict Them
Have you ever received an unsolicited text message promising million-dollar cash prizes or a free cruise? Messages like these are scam texts, sent by scammers…
Your Digital Footprint Explained — and Why It Matters
Your digital footprint is the trail of data left behind from all your online activity. Anything you share or do online, from visiting a website…