Search Results for
POS
Adolescents and malware
Edited by Javier Guerrero, March 2010 Some months ago I had the opportunity, in my free time and on my own behalf, to give an…
Teaching Some Security (II)
A couple of weeks ago I published my first Security Lessons. Since then I’ve received feedback (thank you all!) to create new lessons. Again I…
Tell the world you are looking for a job
Edited by Blanca Carton, March 2010 There is no question that the Internet is increasingly present in staff selection processes, which is enough reason not…
The Thousand-Faced Rogue
We want to inform you of a new flood of email messages that seem to contain a postcard but are actually distributing malware. Concretely, we’ve…
Panda Security and Defence Intelligence Coordinate Massive Botnet Shutdown with International Law Enforcement
• Collaborative cybercrime investigation results in three arrests, more pending • Personal and financial data compromised from massive cyber attack impacting nearly 13 million unique IP addresses,…
Art and technology: Picasso’s Guernica in 3D
Posted by Nerea Bezares  Art and technology have always been understood to be two completely different branches of knowledge. In fact we could say…
Rogueware competing with Panda
If last week we talked about a rogueware program that had deliberately imitated Microsoft’s free antimalware protection called Security Essentials, today we’re going to show…