Facebook and Instagram under fire for insufficient child safety protection...
Meta’s top brands, including Facebook and Instagram, have lately been under fire for being unable to provide sufficient child safety measures on its social media platforms. Government reports, as well...
View ArticleChinese ‘Volt Typhoon’ hackers take aim at US critical infrastructure
Background Hackers allegedly connected to the People’s Liberation Army in China are responsible for a series of recent attacks on critical infrastructure in the USA, according to a report first...
View ArticleAI regulation is coming – but not to the UK
Artificial Intelligence systems like ChatGPT and Google Bard continue to cause concern – along with other lesser-known AI tools. The results generated by AI models and the accuracy of the information...
View Article3 tips for securing your smart home network
Home networks are getting smarter – and busier. From lightbulbs to smart speakers to printers, the number of WiFi devices we use continues to grow each year. Although extremely useful, each device...
View ArticleFBI makes a move against ALPHV/Blackcat, the cybergang fights back
Seizure and decryption tool The Department of Justice recently published a press release stating that the FBI, supported by multiple government agencies in Europe, has been able to seize the official...
View ArticleHackers turn to generative AI to commit crime
Experts have spent most of 2023 warning about the potential dangers of artificial intelligence (AI) . From the risk of global nuclear war to fake news influencing elections, there have been plenty of...
View ArticleWhy is the internet so busy? Bots
Every day the world sends billions of emails and instant messages, posts hundreds of millions of social media updates and shares vast numbers of photos with friends and family. Then there’s online...
View Article31 Alarming Identity Theft Statistics for 2024
Identity theft is a prevalent issue that affects millions of people annually. You’ve certainly heard of it, but what does it entail? Identity theft is when someone steals your Social Security number,...
View ArticleSafe shopping this sales season
January has arrived and what marks this month on a global scale are sales. During this time of the year people are taking the chance to buy what they’ve been looking for for a long time: a coat, a pair...
View ArticleMultiple mortgage companies hit by cyber attacks
Cybercriminals appear to have found a new industry to target – mortgage companies. Over the last few weeks, multiple high-profile mortgage providers reported cyber incidents and openly admitted that...
View ArticleWhat is Quishing? And how can I protect against QR code hacking?
Since the Covid pandemic, QR codes have become a common part of everyday life. The strange boxy barcodes were often used on Covid passes (remember them?) to prove vaccine status. And now we are...
View ArticleTop 5 Cybersecurity Predictions for 2024 Unveiled!
Discover what the new cybersecurity predictions are for the upcoming year, ranging from artificial intelligence to AR/VR goggles. 2023 was a pivotal year for technological development, marked by the...
View ArticleTop 11 Tips for Safe Web Browsing
The average person spends about seven hours every day connected to the internet, yet complaints and frustrations about web browsing experiences are on the rise. There are a few common themes that occur...
View ArticleWhat Is Digital Security? Tools and Applications
While the digital sphere offers unparalleled convenience, it simultaneously introduces us to various risks. According to the FBI’s 2022 Internet Crime Report, 422 million individuals were impacted by...
View ArticleIs YouTube Kids Safe? The Ultimate Parent Safety Guide
YouTube has been the go-to website for video content for over a decade, and its popularity has only grown over the years. Every new movie, video game, song or TV show is available in some form on...
View ArticleStolen credentials are big business
Phishing is a regular topic here on the Panda Security blog. Mainly because it presents such a risk to our users. Our articles tend to focus on how hackers reuse stolen credentials to compromise...
View ArticleHow ChatGPT changed the world – a timeline
The IT industry is constantly improving, regularly bringing new technologies to market. After all, we are now quite used to Apple and Samsung releasing brand-new flagship smartphones every year. But...
View ArticleGuest Wi-Fi Explained + How to Set It Up in 5 Simple Steps
Guest Wi-Fi refers to a separate wireless network that provides internet access for guests or visitors while keeping them isolated from the host’s primary network. It’s commonly used in homes,...
View ArticleShould You Shut Down Your Computer Every Night? 8 Considerations
Although PCs benefit from an occasional reboot, it’s not necessary to turn off your computer every night. Regular shutdowns can save energy and maintain performance, but if convenience is key, you can...
View ArticleHow to Clean Your Charging Port in 5 Easy Steps
Is your phone not charging? Worried it might be broken or needs a battery replacement? The solution may be simply cleaning your charging port. Throughout the day, your phone accumulates debris,...
View Article