950 posts
How to prevent zero day exploits
With all the talk about the latest wave of PDF exploits in the wild, proactive protections against vulnerabilities in common applications (MS Office, Acrobat Reader,…
Security in VoIP Systems
One of the tasks of security companies is to "forecast" what will happen in the future based in the data and trends we observe. This…
A profitable use for stolen credit cards
We have often talked about the freedom with which certain cyber-crooks circulate around the Internet, but I must admit that even I am surprised sometimes……
Smartphone Security
Our QA department has just released a public beta of Panda MobileSecure for Smartphones (here). Even though we don't consider this as a high threat…
Is our data safe?
It has been published that over 100 million cases of identity theft have taken place since 2005. This can happen in several ways, but it…