HackDig : Dig high-quality web security articles for hacker

Panda Security and Deloitte Have Exciting Announcement for the Gartner Summit

Following the success of the Gartner Security & Risk Management Summit in the US, Panda Security will also be participating in the London conference held on 18-19 September 2017. The summit will address the major challenges facing IT security leaders today. Analysts, panellists, and presenters will offer proven practices, technologies and methods to help
Publish At:2017-09-11 11:50 | Read:1835 | Comments:0 | Tags:Adaptive Defense business cybersecurity deloitte gartner

Enterprise Security in the Age of Advanced Threats

The malware and IT security panorama has undergone a major change, and enterprise security will never be the same. Hackers have improved drastically, both in terms of volume and sophistication, new techniques are allowing threats to remain on corporate networks for much longer periods than ever before. Webinar  on the topic presented by Panda’s own Luis Cor
Publish At:2017-09-08 02:05 | Read:2001 | Comments:0 | Tags:PandaLabs advanced cybersecurity business webinar

A dating site and corporate cyber-security lessons to be learned

It’s been two years since one of the most notorious cyber-attacks in history; however, the controversy surrounding Ashley Madison, the online dating service for extramarital affairs, is far from forgotten. Just to refresh your memory, Ashley Madison suffered a massive security breach in 2015 that exposed over 300 GB of user data, including users’
Publish At:2017-09-06 13:05 | Read:2385 | Comments:0 | Tags:Security b2b business data breach

Panda Security, leader in Gartner’s Peer Insights program

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational d
Publish At:2017-09-04 22:45 | Read:1993 | Comments:0 | Tags:Panda Security business cybersecurity gartner Products

Ransomware Cyber-Insurance: a Rising Trend in Businesses

Ransomware is increasingly common, is evolving, and, to complicate matters, no longer only affects computers. This form of malware that thrives on encrypting data for a ransom paid in cryptocurrency also affects smartphones, TVs and any other connected device. As the price of ransoms soar (in some cases, it has already reached into the millions), it’s beginn
Publish At:2017-05-08 14:25 | Read:2871 | Comments:0 | Tags:Business businesses cyber-insurance Ransomware

What Size Companies Do Hackers Target?

Cybercriminals are after any size company that has access to people’s information. Over the last few years, we have seen so many news about stolen data information from large enterprises and agencies such as Yahoo, LinkedIn, CIA, and Google. However, these are not the real victims of the cyber-attacks. According to the recently released 2016 State of SMB Cyb
Publish At:2017-05-04 18:20 | Read:2582 | Comments:0 | Tags:Business businesses Hackers

Panda Security’s GDPR Preparation Guide Helps Ease the Transition to the New Regulation

There’s a new challenge that lies ahead for businesses that have operations within the European Union. The new General Data Protection Regulation came into effect on 25 May, 2016, and will begin to be enforced 25 May, 2018. With the focus on protecting the fundamental rights and freedoms of natural persons and their right to the protection of personal
Publish At:2017-03-31 20:10 | Read:3080 | Comments:0 | Tags:Business Panda Security gdpr whitepaper

Sticky Attacks: When the operating system turns against you

Cyber-attackers are always finding new ways of bypassing the protection systems installed on computers in order to avoid detection and steal user data. In that respect, Black Hat hackers have always turned to malware-based attacks (phishing, network worms, or the dreaded Trojans with ransomware as the most dangerous example) to reach their goals: break into
Publish At:2017-03-10 04:35 | Read:4982 | Comments:0 | Tags:News PandaLabs advanced cyber-security business sticky attac

Searching for celebrity news on Google can be dangerous for your computer

Something as apparently inoffensive as employees keeping up with the lives of ‘celebs’ on the Internet could be far more dangerous than you think for your company’s IT systems. Whether you like it or not, some employees take advantage of dead time (and not-so-dead time) to look for all the latest gossip and news on the Web. There may not be anything too ris
Publish At:2016-11-11 10:35 | Read:4235 | Comments:0 | Tags:Mobile News News business celebrities cyber-security Malware

Here's how businesses can prevent point-of-sale attacks

Retailers, hotels and restaurants have all been victimized through the same Achilles' heel that cybercriminals continue to attack: the point-of-sale system, where customers' payment data is routinely processed.  These digital cash registers are often the target of malware designed to steal credit card numbers in the thousands or even millions. This year,
Publish At:2016-11-01 14:10 | Read:3017 | Comments:0 | Tags:Security Hacking Business Payment Processing Retail

Links that endanger your cyber-security

On any given day, employees at your company click a multitude of links and many of them come from unknown sources. But clicking these mysterious URLs endangers more than your security, it can also threaten your business. Curiosity can cost you. The sole purpose of these links is to transfer malware onto your system. What’s worse is that, as demonstrat
Publish At:2016-09-27 20:35 | Read:3729 | Comments:0 | Tags:News business cybersecurity

Webcams, Routers and Other Risks to your IT Security

The fleet of computers in your business may be protected but that does not mean that your corporate information is safe. Beyond tablets, there are a number of devices such as mobile phones and smart watches that have joined the list of gadgets that every enterprise must control and protect to prevent IT risks. Every office contains a number of vulnerable de
Publish At:2016-09-26 08:00 | Read:3530 | Comments:0 | Tags:Mobile Security business Malware

Volkswagen is founding a new cybersecurity firm to prevent car hacking

As cars become more computerized, they're also facing a greater risk of being hacked. That’s why Volkswagen is founding a new cyber security company devoted to protecting next-generation vehicles.On Wednesday, the automaker said it would partner with a former Israeli intelligence agency director to jointly establish a new company, called Cymotive Technol
Publish At:2016-09-14 23:45 | Read:3272 | Comments:0 | Tags:Security Car Tech Business Hacking Cybersecurity

Finding the Balance Between Security and Productivity

The majority of employees within an organisation are hired to execute specific jobs, such as marketing, managing projects, manufacturing goods and overseeing financial investments. Their main – sometimes only – priority is to efficiently complete their core business activity, so information security is usually only a secondary consideration.Consequently, emp
Publish At:2016-07-26 03:55 | Read:3710 | Comments:0 | Tags:Connecting Security to the Business Featured Articles busine

Ten Steps That Will Guarantee Cybersecurity in Your Business

In a recent study by Panda Security in collaboration with Nielsen, 91% of Spanish SMEs confirmed that they were victims of daily IT attacks. The viruses that wreaked havoc on their systems included Trojans (33%) and spyware (25%). The viruses entered the company systems from unsecure websites (39%), downloaded programs (23%), and email malware (19%). It is f
Publish At:2016-07-07 14:10 | Read:2982 | Comments:0 | Tags:Tips Antivirus business Panda Security


Share high-quality web security related articles with you:)


Tag Cloud