Posts by author
Panda Security
CryptoLocker: What Is and How to Avoid it
CryptoLocker is a family of ransomware whose business model (yes, malware is a business to some!) is based on extorting money from users. This continues…
8 things your kids shouldn’t do online
It’s not unusual nowadays to hear people say that if you want to know how to operate any technical device, ask a child, and they’re…
Adaptive Defense 1.5, the enterprise solution that seeks security against advanced and targeted attacks
Panda Security announces Adaptive Defense 1.5, the new version of the managed service that ensures security against Advanced Persistent Threats (APTs) and targeted attacks in…
Ugly Mail: How to know if your emails are being tracked
Someone is spying on your company’s emails. Probably in your office names like Yesware, Bananatag or Streak don’t ring a bell, but they know a…
WhatsApp: 6 scams you must pay attention to!
The success of WhatsApp has a downfall: while the instant messaging service reached 600 million active users last summer, the numbers of frauds emerging around…
What is Cloud Computing and how it will boost your business – Infographic
What is Cloud Computing Cloud Computing means storing and accessing data and programs in ‘the cloud’. This concept has been the basis of an entire…
When cyber-attacks cause physical damage
We are used to hearing about cyber-attacks and the massive damage they cause to those affected. You do not need to go too far back…