Date | Title | Description |
31.01.2025 | The Cybersecurity Landscape in 2024: A Year of Distinction and Challenges | In the digital age, cybersecurity is a fortress. It stands between us and a myriad of threats lurking in the shadows. The recent AV-Comparatives Summary Report for 2024 sheds light on this ever-evolving battleground. It evaluates 16 leading... |
30.01.2025 | AV-Comparatives Releases 2024 Summary Report: Celebrating Excellence in Cybersecurity | INNSBRUCK, Austria, Jan. 30, 2025 /PRNewswire/ -- AV-Comparatives, the independent antivirus testing lab, is pleased to announce the publication of its annual Summary Report for 2024. This comprehensive report evaluates 16 leading consumer ... |
22.08.2022 | Why getting endpoint security right is crucial | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Most organizations are behind on hardening their endpoints with zero trust, enabling cyberattackers to use malicious sc... |
24.06.2022 | Malware and best practices for malware removal | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Table of contents
What is malware?
Types of malwa... |
23.12.2021 | [App Battle] Google Chrome vs Microsoft Edge vs Safari: Which is the Best Browser so Far? | Joseph Henry, Tech Times 23 December 2021, 10:12 pm
With the departure of Internet Explorer in the browsing world, users now have a different option for a web browser. The popular browser is expected to end its service on June 15, 2022, but... |
16.11.2021 | Cybersecurity: The Ultimate Guide to Defending Against Cyber Attacks | Think about how much of the world relies on the internet. The government, military, academia, health care industry, and private industry not only collect, process, and store unprecedented amounts of data in cyberspace - they also rely on cr... |
23.10.2020 | Don’t let ransomware shut down your business | Cyber criminals are constantly changing their attack methods to gain access to organisations’ data. Ransomware variants like Sodinokibi are a product of hacker’s efforts to evade detection and turn a profit off stolen data.
Sodinokibi is an... |
28.08.2020 | From Barrotes to WannaCry – a 30-year retrospective of cyber attacks | The World Economic Forum recently reported it expects a 76.1% increase in hacking activity in 2020, with 75% of attacks believed to be motivated by a financial or reputational pay-off. Tracking attacks and learning from historical attacks i... |
30.04.2020 | Cyber attack campaigns exploiting COVID-19 with global impact | Over the past few months, researchers at Panda Security have noted an increase in malicious social engineering campaigns using the global COVID-19 pandemic as a hook. As the crisis deepens, the number of related malicious domains, spam, mal... |
29.04.2020 | Tax season is on, so are the scammers | The Better Business Bureau (BBB) recently issued a statement confirming that it is the busiest time of the year not only for the IRS, but also for bad actors trying to scam their way into people’s tax refunds. According to the BBB, the earl... |
09.03.2020 | Seattle-based WatchGuard to acquire endpoint protection provider Panda Security | Seattle-based Watchguard Technologies announced Monday that it will acquire Panda Security, a 30-year-old Madrid-based company that sells endpoint protection software.
“In the short term, the acquisition of Panda Security makes best-in-clas... |
28.01.2020 | How Do I Love Thee, Data Privacy? Let Me Count The Ways | Cyber security concept. Encryption.Getty |
03.10.2019 | nCipher Study: Enterprises Are Leaving IoT Devices Vulnerable to Cybersecurity Threats | Cybersecurity Ventures estimates that ransomware will attack businesses every 14 seconds by the end of 2019, up from every 40 seconds in 2016. That figure doesn’t even begin to touch attacks on individuals, which occur more frequently than ... |
08.03.2019 | Crypto-jacking: A hidden cost for your company | After gaining momentum in mid-2017, we have seen a worldwide boom of digital crypto-currencies like Bitcoin. Crypto-currencies have become synonymous with Ransomware attacks, but now cyber criminals have discovered another way to make money... |
28.01.2019 | Panda Security recognised as a 2019 Gartner Peer Insights Customers' Choice for Endpoint Detection and Response Solutions | Panda Security, a leading European multinational in advanced cyber security solutions and services, is pleased to announce it has been named a January 2019 Gartner Peer Insights Customers' Choice for Endpoint Detection and Response Solution... |
21.12.2018 | Automated Cyber Attacks Are the Next Big Threat. Ever Hear of 'Review Bombing'? | December 21, 2018 8 min read
Opinions expressed by Entrepreneur contributors are their own.
If you think hacks are bad now, just wait a few more years-- because "the machines" are coming.
Related: 3 Ways To Protect Your Company's ... |
17.12.2018 | The beginning of the end for the password, more regulation and more IoT risks -- cybersecurity predictions for 2019 | When we looked at security predictions at this time last year some experts were predicting that we'd see attacks on cryptocurrencies and that we'd continue to see a rise in the scale and profile of attacks.
They've been proved right on both... |
26.11.2018 | What Really Matters in ‘Defending Forward’? | Lawfare recently published two responses—one by Bobby Chesney, the other by Robert Williams and Ben Buchanan—to my Lawfare essay providing a Chinese perspective on the concept of “Defending Forward” adopted in the latest Department of Defen... |
14.09.2018 | Unpatched systems at big companies continue to fall to WannaMine worm | Enlarge / This old mine is still yielding somebody Monero.
Max Pixel (CC) reader comments 50 with 37 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
In May of 2017, the WannaCry attack—a file-encryp... |
21.02.2018 | Tesla left its cloud servers open to cryptomining hackers | Electric vehicle maker Tesla has had its cloud server instances compromised by attackers mining virtual currency.
Cloud security vendor RedLock discovered that Tesla had left its Kubernetes administration console accessible to anyone online... |
08.01.2018 | Panda Cybersecurity Report 2017: Africa in top 10 targeted regions | This year, Panda Security saw more malware samples created each day than in the entire 20th century. The targets have changed, the techniques have become more sophisticated, the attack vectors have multiplied, and the tools are more precise... |
02.11.2017 | Devastating ransomware Petya returns as 'Bad Rabbit' | Devastating ransomware Petya returns as "Bad Rabbit".
Earlier this week, a ransomware variant known as Bad Rabbit appeared in Europe, affecting over 200 organisations in Russia, Ukraine, Turkey and Germany. The ransomware, bearing... |
02.08.2017 | As Game of Thrones spoilers leak online, Panda Security issues a stark warning | This week's hack of HBO led to the release of stolen episodes of Ballers and Room 104, and the threat of Game of Thrones leaks. Now the hackers have made good on their threat and uploaded scripts and episode summaries for yet-to-be-aired ep... |
01.08.2017 | Attacks from unknown threats increase by 40 percent | The second quarter of this year has seen two of the largest recorded cyber attacks in WannaCry and NotPetya, and the latest quarterly report from Panda Security reveals there's been an increase in unknown threats too.
PandaLabs analyzed att... |
22.06.2017 | After three days, Skype’s outage is resolved | After three days of connectivity issues that prevented some Skype users from being able to log in, make calls or send and receive messages, the company says it has now fully resolved the problem. What it isn’t saying — at least not yet — is... |
20.06.2017 | Skype outage causing connectivity issues, company says it’s a “global incident” | Microsoft’s recently updated communications app Skype has been suffering connectivity issues which began on Monday, June 19th, and are continuing today. After hours of downtime on Monday, the company confirmed the issue via a blog post and ... |
18.05.2017 | Are your devices listening to you? | Increasingly we're surrounded by devices that have microphones. Not just our computers and smartphones, but smart home devices like Alexa and Echo and even our TVs.
Advertisement
The problem is these mics are not just accepting commands, th... |
10.05.2017 | Ransomware continues to dominate the cyber threat landscape | A new report from Panda Security's PandaLabs research arm reveals that real time attacks that involve direct interaction with the victim are on the rise.
It also shows the increasing professionalism of cyber criminals. Highly specialized gr... |
28.03.2017 | Panda Security discovers revival of Sticky Keys attacks | Hackers are constantly trying to find new ways to bypass cyber security efforts, sometimes turning to older, almost forgotten, methods to gain access to valuable data. Researchers at PandaLabs, Panda Security's anti-malware research facilit... |
16.12.2016 | When Things attack and other security predictions for 2017 | The past year has been a pretty turbulent one for IT security with high profile data breaches, Apple and the FBI wrangling over encryption, persistent threats from ransomware and more.
So as industry experts begin to roll out their predicti... |
14.07.2016 | Windows 10 Anniversary Update's new Blue Screen QR codes could put your smartphone at serious risk | PCs can go wrong in all sorts of ways, and the problems can manifest themselves in the form of slowdowns, freezes, or worse. Occasionally, you might encounter a blue screen of death (BSOD), accompanied by a usually pretty cryptic message ou... |
06.07.2016 | Your Favorite Browser Plugin May Be a Major Security Threat | Browser plugins, extensions and other customizations can make your web browsing experience much more enjoyable, but they also run the risk of leaving your computer ripe for a malicious attack. Due to this, it is vital to be more aware of th... |
02.06.2016 | SWIFT attacks date back more than a year | We reported a few days ago on banks using the SWIFT inter-bank transfer system being hacked, resulting in $81 million being stolen from the Bangladesh Central Bank.
Now Luis Corrons, technical director of PandaLabs, has released more inform... |
10.05.2016 | Checking in with spear phishing, criminals check out with hotel credit card data | You can check out any time you want, and so can card-data stealing criminals.
Novotel Century Hong Kong Hotel reader comments 18 with 15 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Hotel chains ... |
09.05.2016 | Cyber criminals love to attack hotel chains | Hotels represent rich pickings for cyber criminals. There's the potential to steal information from large numbers of customers with consequent financial gains.
Researchers at Panda Security have issued a report showing the major attacks tar... |
19.11.2015 | Government organizations are major target of Q3 cyber attacks | PandaLabs, the malware research arm of Panda Security has released its latest quarterly security report revealing a wave of cyberattacks where the security and information of various governments has been compromised.
The company has detecte... |
16.10.2015 | How to uninstall antivirus | You don’t need an antivirus package any more? It should be easy: just run the uninstaller and try something else.
Sounds great, until the uninstaller hangs, crashes, or won’t run at all. And you can’t install a new version because it demand... |
15.09.2015 | More than 21 million new threats detected in second quarter of 2015 | PandaLabs, the malware research arm of Panda Security, has published its latest quarterly report showing that malware creation levels have broken new records.
It reveals that in the second quarter of 2015 there were an average of 230,000 ne... |
14.08.2015 | Panda Security releases 2016 range | Panda Security has unveiled its 2016 consumer range, including Panda Free Antivirus 2016, Panda Antivirus Pro 2016 ($43.99),Panda Internet Security 2016 ($54.99), Panda Global Protection 2016 ($76.99) and Panda Gold Security 2016 ($98.99)
A... |
19.03.2015 | Giving pirates free Windows 10 is a goddamn good idea | Meet the new Microsoft. Maybe the company really charts a new course under CEO Satya Nadella's leadership. Colleague Mark Wilson reports that even software pirates can upgrade free to Windows 10. Seriously? Reward the thieves who rob revenu... |
12.03.2015 | Panda Security identified itself as malware, quarantined its own files | Security software can be inherently dangerous. That appears to be a statement that doesn't seem to make sense, but it does none-the-less. We've seen it time and again, as well-meaning tools cause chaos with computers. The problems over the ... |
02.03.2015 | Malware detection in 2014 doubles from 2013 -- 2015 could be even worse | A report from PandaLabs suggests that there were twice as many malware infections in 2014 compared to 2013 -- and China was the hardest hit. Globally, Europe was found to be the area with the lowest rate of infection, and Sweden topped the ... |
24.02.2015 | It's Not Just Superfish—Your Computer Blindly Trusts Hundreds of Sources | Lenovo laptop owners were rightly upset last week when it was discovered their computers were designed to trust software from a less-than-reputable company called Superfish. But it's not just Lenovo owners who should have cause for concern:... |
03.11.2014 | Malware on the rise, with Trojans by far the biggest threat | Not worried about malware? Provided you take sensible precautions when on the web, and have decent anti-malware installed, your chances of getting infected are relatively low, but the threat still persists and isn’t to be underestimated.
Ac... |
06.12.2011 | Here’s why we’re not too worked up over CNET’s download “malware” | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
CNET Download.com‘s proprietary software installe... |
25.06.2010 | Antivirus Product Testing is Changing, Whether Vendors Like it or Not | This week NSS Labs released their Q2 2010 Corporate Endpoint Protection Products report. NSS has only publicly announced the two products it specifically recommends against: Panda‘s Internet Security 2010 (Enterprise) and AVG‘s Internet Sec... |
- | Рост антивирусных фальшивок | Рост антивирусных фальшивок
03 Августа, 2009, 10:42
Архив
1355
Как сообщает Network World, в отчете The Business of Rogueware исследовательского подразделения PandaLabs испанской антивирусной компании Panda Security рекомендуется обращать о... |
- | What is Anonymous? How the infamous ‘hacktivist’ group went from 4chan trolling to launching cyberattacks on Russia | For nearly two decades, one of the world’s most infamous hacker groups has operated under the name “Anonymous.” And the mysterious online community is making headlines once again.
After Russia invaded Ukraine at the end of February, a Twitt... |
- | Киев лидирует в числе самых спамерских городов | Киев лидирует в числе самых спамерских городов
26 Марта, 2010, 11:15
Надежда Баловсяк
1379
1
Компания Panda Security представила отчет о распространении спама. Согласно этому исследованию, в январе-феврале этого года Киев вошел в десятку го... |