Posts by author
Panda Security
The risk of using phone numbers as authenticators for sensitive information
Find out how using mobile phones to authenticate sensitive information and accounts can pose a risk to your company’s cybersecurity.
Beware this malware: it can even survive operating systems being reinstalled
LoJax is a piece of malware that is able to survive an operating system being reinstalled making it especially dangerous for companies and institutions.
Who is to blame for the majority of data breaches?
A report has shown that in the United Kingdom the number of security incidents that have led to data breaches has grown by 75% in the last two years.
How to Problem Solve Like a Hacker
When you choose to go online, most internet users would say their goal is to find something they are looking for, or accomplish a task.…
Ten useful tips for online security in Cybersecurity Awareness Month
For Cybersecurity Awareness Month, we’re sharing a list of tips to encourage greater safety and protection among all computer users.
Watch out! The risks associated with BGP, FTP, and NTP protocols
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
A dating site and corporate cyber-security lessons to be learned
Analysts were able to draw some important conclusions from Ashley Madison that should be taken into account by any company that stores sensitive information. Protect your company!