This Thursday Equifax, one of the three major credit bureaus in the US, announced that cyber security incident involving consumer information of nearly half of the population in the US had been spotted on July 29th, 2017. In the press release published yesterday, they stated that based on their internal investigation the data breach began taking place in mid
Cybercrime is a very profitable and attractive business. This is a new phase of cyber theft that involves stealing money directly from banks, rather than from their customers, using phishing attacks to infect the computers of bank employees. The million-dollar question is: where are the largest sums of money? They are, without a doubt, in the financial insti
Cyber-attacks cost companies millions of euros each year. A high price to pay which, according to a study conducted by Google’s Research Team, is not only due to the growing sophistication of the strategies and tools used by cyber-crooks, but also to the huge number of threats in circulation.
Researchers examined over 1 billion email exchanges via Gmai
Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Panda Security will be attending this year’s Gartner Security and Risk Management Summit. The event, organized by IT research and advisory company Gartner, will be held in National Harbor, Maryland, United States, from June 12 -15.
Panda Security will be at Booth #643, presenting the new corporate cyber-security paradigm based on Adaptive Defense.
The Spanis
Companies are more vulnerable than ever to cyberattacks, as their CIOs will be quick to explain to anyone who cares to ask. A third of them acknowledge that their company has suffered a major cyberattack in the last two years, an increase of 45% compared to 2013. And only one in five IT managers claims to be “very well prepared” to respond to cyb
The US Congress decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news.
Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
The current digital economy revolves around data. Giving up our data is the price we pay for signing up for free internet services, as the companies who provide these services use this personal information in order to fine-tune ads paid for by their true clients: advertisers.
Data is the Internet’s oil. Unlike this limited fossil fuel, however, data is incr
There’s been a lot of talk recently about DDoS (distributed denial-of-service) attacks in the wake of an incident that left thousands of users without internet access as a result of the collapse of the servers at Dyn, a DNS hosting service. Needless to say, we should be aware of this threat, know how it works, and how to defend ourselves against it. Especia
As we enter the Christmas period, many of your company’s employees will be deciding to change their phones in the coming months. Something as simple and seemingly harmless as a gift (or a purchase from the Black Friday sales) could actually be putting your business security at risk, especially if it encourages workers to use their own smartphones for
At first glance it is just another printer; one of those big machines that sits against the wall of thousands of offices around the country, turning blank sheets of paper into corporate documentation. And as inoffensive as it may seem, just another piece of office furniture, it can become a threat to your company’s confidentiality. While your printers and n
One of the most common and most sensitive documents that companies handle on a daily basis is invoices. Issuing and receiving them is a fundamental activity for every business, however, people are not always aware of how important they are even after being paid or collected.
Together or individually, they can expose critical information that can be very val
Drones have conquered the world: they are used to hunt down tax evaders and illegal hunters, help suppress wildfires, find victims after natural disasters… They even serve as flying cameras to assist in filming movies and for aerial photography.
Online retail giant Amazon, for example, is planning on using drones for commercial delivery in order to fl
That hard disks, pen drives and other physical storage devices are an attractive target for cyber-criminals wanting to steal confidential information from enterprises is something that company managers are well aware of. And, in fact, they try to educate their employees about the need to use those tools properly.
However, the now-popular digital cloud, used
On November the 2nd we witnessed a new spam campaign delivering emails each with a Word document attachment targeting UK companies. Each email message had the subject “Companies House – new company complaint” and the Word document attachment was titled “Complaint.doc”. When users open the document, this is what they see:
How TickBot works?
If the user foll
Announce
Share high-quality web security related articles with you:)
Tools