HackDig : Dig high-quality web security articles for hacker

The state of cybersecurity in 2019: What do the experts think?

This Saturday, November 30, is Computer Security Day. The aim of this annual event is to increase knowledge and awareness of the risks that users’ computers, devices and systems are exposed to all over the world. Download the eBook here Since this initiative was launched by the Association for Computing Machinery (ACM) in 1988, the technological landscape h
Publish At:2019-11-26 16:15 | Read:205 | Comments:0 | Tags:Business Panda Security advanced cybersecurity Computer Secu

José Manuel Díaz-Caneja: “At times it is easier to corrupt an employee than to use cyberattacks to bring down a system”

When it comes to protecting organization’s corporate cybersecurity, there are several fronts. Two of them, however, are particularly important: first, monitoring the human factor, which is often the main trigger for cyberattacks or data leaks. The second is applying intelligence to all processes so that advanced cyberdefense isn’t reactive, but instead is ba
Publish At:2019-11-21 10:35 | Read:165 | Comments:0 | Tags:Business Panda Security advanced cybersecurity guest article

Do Americans Think Their Phone Is Listening To Them? (Survey)

Microphones on your devices were created to make life simpler. Not sure what song is playing on the radio? Ask Siri to listen and tell you what the artist is. Need to call your mom but you’re in the middle of cooking dinner? Ask Alexa to make the call for you. The mics in our devices allow us to go hands-free and multitask.  The problem with online microphon
Publish At:2019-11-11 22:35 | Read:138 | Comments:0 | Tags:Mobile Security Panda Security Security Technology cybersecu

Problems with your pc? When to use Panda’s free technical support

Panda Security is well-known for its expertise in detecting, preventing and removing malware infections. But as any PC owner knows, there’s a lot of other things that can go wrong. The sort of problems that take time and expertise to fix. So we’ve made your Panda Dome subscription even better. Now anyone with a valid subscription can get free technical suppo
Publish At:2019-10-28 10:35 | Read:507 | Comments:0 | Tags:Mobile News Panda Security cybersecurity security technology

The Complete Guide to Facial Recognition Technology

Have you ever wondered why your face is scanned at customs when you enter a country? Or how the new iPhone is able to unlock using your face instead of a password? The answer is facial recognition technology (also called FRT). What is Facial Recognition? Techopedia defines facial recognition as, “a biometric software application capable of uniquely identifyi
Publish At:2019-10-11 22:40 | Read:528 | Comments:0 | Tags:Panda Security Technology

Panda Security and Infinigate France sign a distribution agreement.

This partnership is perfectly in line with Panda Security’s strategy of developing its network of partners in order to accelerate its growth on the B2B market in France. Panda Security France officially announces a new distribution agreement with Infinigate France, one of the main European VADs operating in the cybersecurity sector. This decision fol
Publish At:2019-10-10 10:35 | Read:361 | Comments:0 | Tags:News Panda Security business edr france

What is Alexa and how does she work?

Amazon Alexa appears on smart speakers and mobile phones, offering friendly assistance and advice on demand. She can manage your diary, play music, answer questions, order groceries from Amazon and control your smart home devices. But what actually is Alexa? What is Alexa doing? When Amazon describes Alexa as a ‘personal assistant’, they underplay much of he
Publish At:2019-09-30 10:35 | Read:259 | Comments:0 | Tags:Mobile News Panda Security Technology

How Endpoint Detection and Response gave rise to Threat Hunting

In the past, a signature-based cybersecurity solution could be relied on to protect your organization against malware – with updates being posted to you on a floppy disk each month. Signature based solutions are very efficient and accurate at spotting known malware. Signature detection was sufficient until polymorphic techniques (compression and encryption)
Publish At:2019-09-24 10:35 | Read:420 | Comments:0 | Tags:Panda Security Security business edr threat hunting

Panda Security presents EDR and beyond at Gartner IT Symposium/Xpo 2019

This month, Cape Town will play host to the African leg of the Gartner IT Symposium/Xpo 2019. The three-day conference and expo will be held at the Cape Town International Convention Centre (CTICC2), and aims to explore the technology, insights and trends that are shaping the future of IT and business. Panda Security will be represented at the event, with a
Publish At:2019-09-19 17:05 | Read:257 | Comments:0 | Tags:News Panda Security Africa business gartner

Panda Security verified by Citrix as Citrix Ready

Panda Adaptive Defense 360 is now a validated and recommended solution to help Citrix customers to strengthen their security stance. We are pleased to announce that our advanced security solution Panda Adaptive Defense 360 is now among the services offered by the platform Citrix Ready Marketplace to improve security in virtual environments (SVE). https://cit
Publish At:2019-09-19 17:05 | Read:239 | Comments:0 | Tags:News Panda Security business citrix

Zeus is Still the Base of Many Current Trojans

In 2007, no one expected ZeuS to have such a brutal impact on the digital world. But two years later, Zbot, another of the names it is known by, became a milestone in the history of cybersecurity. With more than 3.6 million infected computers in 2009, ZeuS compromised more than 74,000 FTP accounts on such important networks as those of NASA, ABC, Oracle, Cis
Publish At:2017-09-27 15:10 | Read:2742 | Comments:0 | Tags:Panda Security b2b Trojan zbot zeus

Panda Security, leader in Gartner’s Peer Insights program

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational d
Publish At:2017-09-04 22:45 | Read:2355 | Comments:0 | Tags:Panda Security business cybersecurity gartner Products

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block
Publish At:2017-08-22 04:50 | Read:3031 | Comments:0 | Tags:News Panda Security alliance cybersecurity deloitte

Panda Security Achieves Highest Level of Protection in AV-Comparatives’ First Semester Report

The technologic efficiency of Panda Security’s solutions has once again earned top marks from the independent testing laboratory AV-Comparatives, in their first comprehensive evaluation of the year. The Spanish cybersecurity firm finds itself at the top of the heap with other world-class security solutions, having been placed in the highest certification tie
Publish At:2017-07-14 10:00 | Read:2321 | Comments:0 | Tags:Panda Security av-compartives cybersecurity real world test

Petya Webinar: Yet Another Ransomware Outbreak

Last week, yet another large-scale ransomware attack struck more than 60 countries. This attack, dubbed Petya/GoldenEye, not only encrypted data files on thousands of computers around the world, but also the MBR of their hard disks. After being attacked, victims were fully blocked from accessing their system the next time they rebooted it. It’s impossible to
Publish At:2017-07-03 16:15 | Read:2281 | Comments:0 | Tags:Panda Security petya Ransomware webinar

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud