Tag: Panda Security Mediacenter

How to work from home safely

Read the original article: How to work from home safely Working from home looks set to become the new normal for a lot of people. Here’s how to do it safely. The post How to work from home safely appeared…

Does Remote Learning Work for Your Children?

Read the original article: Does Remote Learning Work for Your Children? Adults can manage changes in their schedules and habits, but children may find it more difficult. These are some tips for them to take advantage of elearning. The post…

4 Types of Malware You Need to Know

Read the original article: 4 Types of Malware You Need to Know There are 4 main types of malware – if you know what they are, you can better protect yourself from infection. The post 4 Types of Malware You…

Zero-day attacks: the cyber equivalent of COVID-19

Read the original article: Zero-day attacks: the cyber equivalent of COVID-19 To minimize and mitigate the threat from zero-day encrypted malware, there are a number of strategies to be considered when planning an organization’s cybersecurity defenses. The post Zero-day attacks:…

43 COVID-19 Cybersecurity Statistics

Read the original article: 43 COVID-19 Cybersecurity Statistics In January 2020, the Coronavirus outbreak started to garner international headlines. On March 11, 2020, the World Health Organization declared COVID-19 a worldwide pandemic. That… The post 43 COVID-19 Cybersecurity Statistics appeared…

MS Office Macro Malware Makes A Comeback

Read the original article: MS Office Macro Malware Makes A Comeback Hackers are returning to MS Office macros as a way to distribute viruses and malware The post MS Office Macro Malware Makes A Comeback appeared first on Panda Security…

MS Office Macro Malware Makes A Comeback

Read the original article: MS Office Macro Malware Makes A Comeback Hackers are returning to MS Office macros as a way to distribute viruses and malware The post MS Office Macro Malware Makes A Comeback appeared first on Panda Security…

Dangerous vulnerabilities discovered in Alexa

Read the original article: Dangerous vulnerabilities discovered in Alexa Hackers might have stolen your Alexa’s voice library and account information. Why would hackers want to steal your voice history? The post Dangerous vulnerabilities discovered in Alexa appeared first on Panda…

Are Cookies Bad + How to Clear Them

Read the original article: Are Cookies Bad + How to Clear Them Have you ever browsed an eCommerce website, adding potential purchases to your cart, only to exit your browser and not submit an order during the… The post Are…

Android user? Update your Twitter app now

Read the original article: Android user? Update your Twitter app now Twitter has discovered a serious security flaw – update your app now to protect yourself. The post Android user? Update your Twitter app now appeared first on Panda Security…

Is TikTok going to be banned?

Read the original article: Is TikTok going to be banned? President Trump has announced his intention to ban TikTok. Microsoft has stepped in, interested in purchasing the app. A deal must be reached by september. The post Is TikTok going…

Don’t let ransomware shut your business down!

Read the original article: Don’t let ransomware shut your business down! Ransomware is constantly reinventing itself to persist over time and in effectiveness. Discover 5 tips to protect your business from this threat. The post Don’t let ransomware shut your…

EMOTET reemerges after months in hiding

Read the original article: EMOTET reemerges after months in hiding In this latest reappearance, Emotet has returned to one of its favorite attack vectors: a massive spam campaign with malicious links or attachments. The post EMOTET reemerges after months in…

Is your smart home hosting malware attacks?

Read the original article: Is your smart home hosting malware attacks? Home security has entered the digital realm. Smart devices in your home could be used by criminals to launch cyberattacks. The post Is your smart home hosting malware attacks?…

Multiple Twitter Profiles of Celebrities Hacked

Read the original article: Multiple Twitter Profiles of Celebrities Hacked Twitter was the victim of a cyber attack last week. More than a hundred celebrities’ accounts were hacked and posted fraudulent messages. The post Multiple Twitter Profiles of Celebrities Hacked…

How to recognize a charity scam?

Read the original article: How to recognize a charity scam? People have become more vocal about the causes they support, giving money to the charities behind them. But hackers are taking advantage of this situation. The post How to recognize…

PonyFinal: The new data-stealing ransomware

Read the original article: PonyFinal: The new data-stealing ransomware Towards the end of May this year, Microsoft warned of a new strain of Java-based ransomware called PonyFinal, which also steals its victims data. The post PonyFinal: The new data-stealing ransomware…

Should you jailbreak your iPhone?

Read the original article: Should you jailbreak your iPhone? Jailbreaking your Apple iPhone provides a lot of new opportunities – but not all of them are good. Here is what you neet to know before doing it. The post Should…

Brits are worried about the COVID-19 tracing app

Read the original article: Brits are worried about the COVID-19 tracing app People around the world are concerned about COVID-19 tracing apps and threats to privacy. British people are worried the project may fail in the UK. The post Brits…

Panda Security: Proud to be turning 30

Read the original article: Panda Security: Proud to be turning 30 On June 26, 30 years ago, in Bilbao, Spain, a group of friends founded one of the world’s first antivirus companies: Panda Security The post Panda Security: Proud to…

Brits are worried about the COVID-19 tracing app

Read the original article: Brits are worried about the COVID-19 tracing app People around the world are concerned about COVID-19 tracing apps and threats to privacy. British people are worried the project may fail in the UK. The post Brits…

What is Hacktivism? Campaigns That Shaped the Movement

Read the original article: What is Hacktivism? Campaigns That Shaped the Movement From protests and sit-ins to doxxing and distributed denial-of-service attacks, a new kind of activism rose in the ranks. In 1996, cyber-activism gained a reputation… The post What…

Valea AB: Cybersecurity for intellectual property

Read the original article: Valea AB: Cybersecurity for intellectual property Valea AB protects its customers’ intellectual property against the most advanced cyberthreats with Panda Adaptive Defense. The post Valea AB: Cybersecurity for intellectual property appeared first on Panda Security Mediacenter.…

How to mitigate the most important vulnerabilities in 2020

Read the original article: How to mitigate the most important vulnerabilities in 2020 “Top vulnerabilities 2020” is a list of the most notable vulnerabilities discovered in 2020, affecting the Windows operating system. The post How to mitigate the most important…

Is COVID-19 Making Cyberbullying Worse?

Read the original article: Is COVID-19 Making Cyberbullying Worse? Reports suggest that children are being bullied online even more frequently since lock down began. These are some thing you can do to help. The post Is COVID-19 Making Cyberbullying Worse?…

Is COVID-19 Making Cyberbullying Worse?

Read the original article: Is COVID-19 Making Cyberbullying Worse? Reports suggest that children are being bullied online even more frequently since lock down began. These are some thing you can do to help. The post Is COVID-19 Making Cyberbullying Worse?…

How to mitigate the most important vulnerabilities in 2020

Read the original article: How to mitigate the most important vulnerabilities in 2020 “Top vulnerabilities 2020” is a list of the most notable vulnerabilities discovered in 2020, affecting the Windows operating system. The post How to mitigate the most important…

Patch management: A pressing need

Read the original article: Patch management: A pressing need In mid-March of this year, the attack surface suddenly increased in size. From that moment on, a large proportion of the world’s population have been… The post Patch management: A pressing…

Hacked computers can be physically dangerous too

Read the original article: Hacked computers can be physically dangerous too Hacking is often portrayed as a victimless crime – but there can be serious physical health consequences too. The post Hacked computers can be physically dangerous too appeared first…

Free remote technical support from Panda Security

Read the original article: Free remote technical support from Panda Security Education and work have moved into the digital realm. That’s why Panda’s experts offer you free help with your device. The post Free remote technical support from Panda Security…

Wave of supercomputers hacked in Europe

Read the original article: Wave of supercomputers hacked in Europe In mid-May 2020, multiple supercomputers in institutions across Europe were infected with malware to mine cryptocurrencies. The post Wave of supercomputers hacked in Europe appeared first on Panda Security Mediacenter.…

No, the FBI is not trying to fine you

Read the original article: No, the FBI is not trying to fine you New Android malware pretends to be the FBI, tries to extort money from victims. Here is how to avoid being a victim of this malware. The post…

WatchGuard Technologies Completes Acquisition of Panda Security

Read the original article: WatchGuard Technologies Completes Acquisition of Panda Security WatchGuard partners to realize immediate value from Panda Security’s advanced EDR solution through the Panda Security Early Access Program SEATTLE and MADRID – June 2,… The post WatchGuard Technologies…

Should I Turn My Computer Off at Night? [Flowchart]

Read the original article: Should I Turn My Computer Off at Night? [Flowchart] As a benchmark, turn new computers off once daily and leave older devices turned on. Although it’s widely accepted that all computers and laptops should… The post…

What Is a Heuristic Virus and How to Remove It

Read the original article: What Is a Heuristic Virus and How to Remove It There is often confusion between heuristic analysis and what’s commonly known as a “heuristic virus”. Heuristics are more accurately described as heuristic analysis, the method… The…

BazarBackdoor: A new gateway to corporate systems

Read the original article: BazarBackdoor: A new gateway to corporate systems Cybersecurity researchers have discovered a new phishing campaign that delivers a stealthy backdoor called BazarBackdoor. The post BazarBackdoor: A new gateway to corporate systems appeared first on Panda Security…

Can your social-media past haunt you?

Read the original article: Can your social-media past haunt you? Your past behaviour on social media may not represent your current or future perspectives. Here is how to delete your past Social Media conduct. The post Can your social-media past…

Cybersecurity at the Budapest University of Veterinary Medicine

Read the original article: Cybersecurity at the Budapest University of Veterinary Medicine The Budapest University of Veterinary Medicine protects its cybersecurity with the advanced solutions offered by Panda Security. The post Cybersecurity at the Budapest University of Veterinary Medicine appeared…

Now anyone can become a cybercriminal

Read the original article: Now anyone can become a cybercriminal Hacking used to take a high degree of expertise, but now it is easier than ever. If you have the money, you can train to become a hacker. The post…

Austrian city falls victim to Ransomware attack

Read the original article: Austrian city falls victim to Ransomware attack The ransomware group NetWalker has published extracts of data stoeln from the network of the Austrian city of Weiz, obtained during an attack. The post Austrian city falls victim…

What to expect from the contact tracing app Care19?

Read the original article: What to expect from the contact tracing app Care19? A contact tracing app has just been released in the USA. Developed by Apple-Google, Care19 informs users of potential expusure to the virus. The post What to…

Cyberstalking – Not all hacking is for profit

Read the original article: Cyberstalking – Not all hacking is for profit Hacking is not always about stealing data for money – sometimes people do it to feed their obsessions. Beware of cyberstalkers. The post Cyberstalking – Not all hacking…

10 Ways to Build a Healthy Relationship with Technology

Read the original article: 10 Ways to Build a Healthy Relationship with Technology Most of us have been introduced to a remote lifestyle by this point. Meetings, classes, and workouts are now being hosted virtually. Fortunately, that means… The post…

EasyJet: 9 million customers’ personal data accessed

Read the original article: EasyJet: 9 million customers’ personal data accessed EasyJet announces that it suffered a “massive cyberattack” in which the attackers accessed the personal data of approximately nine million customers. The post EasyJet: 9 million customers’ personal data…

Hospitals targeted in ransomware attacks

Read the original article: Hospitals targeted in ransomware attacks A security intelligence team has detected multiple “manually operated” targeted attacks against hospitals that were activated in early April. The post Hospitals targeted in ransomware attacks appeared first on Panda Security Mediacenter.…

How to limit work-from-home distractions?

Read the original article: How to limit work-from-home distractions? Millions have started working from home since the coronavirus took over. Here are some tips to avoid distractions and be productive. The post How to limit work-from-home distractions? appeared first on…

Cybersecurity and control with Panda Fusion 360

Read the original article: Cybersecurity and control with Panda Fusion 360 Panda Fusion 360 provides advanced automated security, centralized management and remote support to keep your organization safe. The post Cybersecurity and control with Panda Fusion 360 appeared first on…

Panda Security launches its Threat Insights Report 2020

Read the original article: Panda Security launches its Threat Insights Report 2020 Panda Security has published its Threat Insights Report 2020, where it analyzes the leading cybersecurity trends and cyberthreat activity. The post Panda Security launches its Threat Insights Report…

Protecting companies against BGP hijacking and DDoS attacks

Read the original article: Protecting companies against BGP hijacking and DDoS attacks Network problems caused by BGP hijacking and DDoS attacks are a serious problem for digital infrastructures and can have costly consequences for businesses. The post Protecting companies against…

Trojans instead of holidays in Germany

Read the original article: Trojans instead of holidays in Germany There is a phishing campaign under way in Germany. The emails supposedly come from the Federal Ministry of Health and contain malicious attachments. The post Trojans instead of holidays in…

Millions of Apple devices vulnerable to hackers

Read the original article: Millions of Apple devices vulnerable to hackers A major security flaw has been found in Aplle devices. It is in the Mail App and gives hackers unauthorized access to the user’s personal information. The post Millions…

Hackers Are Stealing Your Cookies

Read the original article: Hackers Are Stealing Your Cookies Websites rely on cookies to work properly and remember important information – which is why hackers are looking to steal them. The post Hackers Are Stealing Your Cookies appeared first on…

Businesses are expanding their IT security budgets

Read the original article: Businesses are expanding their IT security budgets According to the German Federal Statistical Office, IT security spending in Germany will increase to around €4.9 billion in 2020. The post Businesses are expanding their IT security budgets…

49% of People Don’t Disinfect Electronics [Survey]

Read the original article: 49% of People Don’t Disinfect Electronics [Survey] Cell phones, tablets, and keyboards are a daily part of life. However, the same procedures that go with cleaning common household items do not follow-suit… The post 49% of…