Posts by author
Panda Security
Porn filter: is it enough to protect our children?
UK to create new porn filter – but is it enough to protect your kids? The UK government has recently announced a range of new…
Did you know your eReader can be hacked?
Could be your eReader a potential target for attack? Most people think that hackers only target PCs and laptops. Some may also be aware that…
How a Smart Toy Could Get Hacked
This holiday season, the Internet of Things makes its way to toy stores. This new brand of entertainment brings along with it considerable security risks that must be addressed.
Is WeChat set to shake up the tech industry?
It’s very easy to write off any instant messaging app that isn’t Whatsapp as a clone of the famous messaging giant. How could anyone possibly…
What is a VPN and How Does It Work?
Watch your favorite shows anywhere, and other useful VPN functions In simple terms, a VPN, or Virtual Private Network, is a connection between a group…
How to avoid hacking to Critical Infrastructure
Panda Security launches a Whitepaper about how to avoid IT attacks on Critical Infrastructures. Known here the latest data!
How is Internet privacy upheld in the ‘digital afterlife’?
How do you account for someone’s digital presence after they’re no longer with us in the physical world? The ‘digital afterlife’ is a concept that…