Category: Panda Security Mediacenter

Your Tax Money and Data at Risk: UK Government Loses 2,000+ Devices

Taxpayers foot a £1.3 million annual bill for lost government laptops and phones, as government device theft continues to rise, while experts warn your personal… The post Your Tax Money and Data at Risk: UK Government Loses 2,000+ Devices appeared…

Your Tax Money and Data at Risk: UK Government Loses 2,000+ Devices

Taxpayers foot a £1.3 million annual bill for lost government laptops and phones, as government device theft continues to rise, while experts warn your personal… The post Your Tax Money and Data at Risk: UK Government Loses 2,000+ Devices appeared…

Exploring Netstalking: Hidden Internet Gems

Have you ever wondered what lies beyond the familiar websites you visit every day? Just how much “stuff” there is on the internet? (SPOILER: There’s… The post Exploring Netstalking: Hidden Internet Gems appeared first on Panda Security Mediacenter. This article…

How to Download Your Personal Data from Facebook: A Step-by-Step Guide

For long time Facebook users, the social network is an important record of our digital history. So, if you’ve spent years sharing photos, posts, and… The post How to Download Your Personal Data from Facebook: A Step-by-Step Guide appeared first…

Was the data of 64 million McDonald’s applicants left protected only by a flimsy password?

Yes, it was. The personal information of approximately 64 million McDonald’s applicants was left unprotected due to login details consisting of a username and password… The post Was the data of 64 million McDonald’s applicants left protected only by a…

FTC v. Meta and US v. Google: The Landmark Antitrust Lawsuits Shaping Big Tech

Two of the most consequential antitrust lawsuits in recent history, FTC v. Meta and US v. Google, are currently unfolding in U.S. federal courts, targeting… The post FTC v. Meta and US v. Google: The Landmark Antitrust Lawsuits Shaping Big…

Is my phone infected with spyware? How to tell

Introduction Holding personal data, conversations, and sensitive information, our smartphones are indispensable. But this also makes them prime targets for spyware and unauthorized monitoring. One… The post Is my phone infected with spyware? How to tell appeared first on Panda…

11 Simple Ways to Remove Your Information From the Internet

Don’t allow website and app tracking. Clean your email inbox. Deactivate your social media accounts. Regularly monitor your online presence. Make sure your accounts are… The post 11 Simple Ways to Remove Your Information From the Internet appeared first on…

Do iPhones Need Antivirus Software? iPhone Security Considerations + Safety Tips

iPhones typically don’t need antivirus software due to Apple’s built-in security protections. However, jailbroken devices, those missing updates or those with disabled security features may… The post Do iPhones Need Antivirus Software? iPhone Security Considerations + Safety Tips appeared first…

Does working from home come with cybersecurity challenges?

The short answer is, yes, it does. Getting employees to work from home undoubtedly increases the risk of company-related cybersecurity incidents. Read more to find… The post Does working from home come with cybersecurity challenges? appeared first on Panda Security…

12 Simple Ways to Remove Your Information From the Internet

Don’t allow website and app tracking. Clean your email inbox. Deactivate your social media accounts. Regularly monitor your online presence. Make sure your accounts are… The post 12 Simple Ways to Remove Your Information From the Internet appeared first on…

Scam Phone Numbers to Block in 2025 (and How to Actually Stop Them)

Scam calls are getting smarter, more convincing and harder to spot. In February 2025 alone, U.S. consumers received around 4.5 billion robocalls. Many of them… The post Scam Phone Numbers to Block in 2025 (and How to Actually Stop Them)…

How to secure your portable devices against cyberthreats

Portable devices such as smartphones, tablets, and laptops have become integral to our daily routines, storing a wealth of sensitive personal and professional information. As… The post How to secure your portable devices against cyberthreats appeared first on Panda Security…

Which are easier to hack – eSIM or physical SIM?

SIM-swapping scams are often the starting point for many identity theft-related crimes. Taking over a SIM card allows fraudsters to bypass two-factor authentication (2FA) frequently… The post Which are easier to hack – eSIM or physical SIM? appeared first on…

Here’s how to remove personal info from people search sites

It is not a secret that often personal information ends up on people search sites. Such websites collect personal data from publicly available sources and… The post Here’s how to remove personal info from people search sites appeared first on…

Google Gemini: Everything You Need to Know About Google’s Powerful AI

Google Gemini is transforming the way we interact with technology, offering a smarter, more capable AI assistant that goes far beyond what Google Assistant ever… The post Google Gemini: Everything You Need to Know About Google’s Powerful AI appeared first…

Which websites have the most forgetful users?

Forgotten passwords is a major frustration, especially as our digital lives expand across dozens of online platforms and services. A recent study by Heepsy reveals… The post Which websites have the most forgetful users? appeared first on Panda Security Mediacenter.…

PowerSchool shows why ransom payments don’t work

Earlier this year, PowerSchool reported a major cyber incident. Hackers managed to steal vast amounts of data from the popular student information system. The company… The post PowerSchool shows why ransom payments don’t work appeared first on Panda Security Mediacenter.…

Blue Shield health data of nearly 5 million Californians leaked to Google

Last month, Blue Shield of California began notifying its customers that the health data of approximately 4.7 million patients had been leaked to Google. The… The post Blue Shield health data of nearly 5 million Californians leaked to Google appeared…

What Is QR Code Phishing? How to Protect Yourself from This QR Code Scam

QR codes have become an everyday tool for quickly accessing websites or digital restaurant menus, making online payments, and benefiting from all types of digital… The post What Is QR Code Phishing? How to Protect Yourself from This QR Code…

Almost half of US teenagers think social media negatively impacts their peers

In a recent Pew Research report “Teens, Social Media and Mental Health”, teen participants confirmed that almost half of them think that social media negatively impacts… The post Almost half of US teenagers think social media negatively impacts their peers appeared…

Digital Minimalism: Unlocking the benefits and how to get started

If you have ever felt like technology is taking over your life, there’s a new wellness trend you might be interested in called digital minimalism.… The post Digital Minimalism: Unlocking the benefits and how to get started appeared first on…

Rental company Hertz reports a cyber incident

Popular car rental company Hertz began distributing a “notice of data incident” to customers worldwide, including customers in the USA. The letter mentions a cyber… The post Rental company Hertz reports a cyber incident appeared first on Panda Security Mediacenter.…

How to Blur Your House on Google Maps and Why You Should Do It [6 Easy Steps]

Imagine your home, laid bare for anyone with an internet connection — that’s the reality of unblurred Street View. If you’re concerned about privacy or… The post How to Blur Your House on Google Maps and Why You Should Do…

Smart TVs and security risks: What you need to know

Smart TVs sit at the heart of many home entertainment systems. Offering internet connectivity, streaming services, and advanced features like voice commands, these TVs allow… The post Smart TVs and security risks: What you need to know appeared first on…

40+ Password Statistics That Will Change Your Online Habits in 2025

Poor password hygiene is a common cause of cybersecurity attacks among consumers and businesses—and these password statistics may shock you. The post 40+ Password Statistics That Will Change Your Online Habits in 2025 appeared first on Panda Security Mediacenter. This…

Digital Deception: How Hackers Are Weaponizing Your Google Calendar

Another day, another cyber threat, this time targeting your Google Calendar. Aimed at one of the most widely used scheduling tools worldwide, this new wave… The post Digital Deception: How Hackers Are Weaponizing Your Google Calendar appeared first on Panda…

23andMe users delete data as company files for bankruptcy and seeks buyer

DNA testing company 23andMe has filed for bankruptcy. Tens of thousands of people are now racing to delete their genome profiles from the company’s website.… The post 23andMe users delete data as company files for bankruptcy and seeks buyer appeared…

AI Datasets Reveal Human Values Blind Spots

Artificial intelligence is being applied across every industry. Often, this takes place behind the scenes. However, consumers encounter AI daily, such as in the automated… The post AI Datasets Reveal Human Values Blind Spots appeared first on Panda Security Mediacenter.…

Tesla owners’ details doxxed online on a website called ‘dogequest’

There has been a data leak of Tesla owners. The details have been published on a website called ‘dogequest.’ The cybercriminals behind the website claim… The post Tesla owners’ details doxxed online on a website called ‘dogequest’ appeared first on…

FBI Wants You Not to Fall for The Toll Road Smishing Scams

FBI has issued a public service announcement regarding the constantly increasing cases of toll road smishing scams. The Internet Crime Complaint Center (IC3) has received… The post FBI Wants You Not to Fall for The Toll Road Smishing Scams appeared…

FBI Wants You Not to Fall for The Toll Road Smishing Scams

FBI has issued a public service announcement regarding the constantly increasing cases of toll road smishing scams. The Internet Crime Complaint Center (IC3) has received… The post FBI Wants You Not to Fall for The Toll Road Smishing Scams appeared…

Thousands of British musicians fall silent over government AI plans

More than 1,000 British musicians have released a groundbreaking protest album titled “Is This What We Want?” Featuring notable artists such as Kate Bush, Annie… The post Thousands of British musicians fall silent over government AI plans appeared first on…

USA introduces a self-deportation app called CBP Home

The US Customs and Border Protection (CBP) has officially launched the new CBP Home app, which includes a self-deportation feature. The new app replaces the… The post USA introduces a self-deportation app called CBP Home appeared first on Panda Security…

Most of the funds in the biggest crypto heist ever have been laundered

Last month, the finance world was shaken by the biggest crypto heist ever. On February 21st, hackers managed to steal approximately $1.5 billion worth of… The post Most of the funds in the biggest crypto heist ever have been laundered…

Most of the funds in the biggest crypto heist ever have been laundered

Last month, the finance world was shaken by the biggest crypto heist ever. On February 21st, hackers managed to steal approximately $1.5 billion worth of… The post Most of the funds in the biggest crypto heist ever have been laundered…

Gen Z facing increased cybersecurity threats

In an era where digital threats evolve at breakneck speed, a surprising trend has emerged: Gen Z, the first true digital natives, are increasingly becoming… The post Gen Z facing increased cybersecurity threats appeared first on Panda Security Mediacenter. This…

The UK’s Competition Watchdog Launches Investigation into Mobile Platforms

The mobile technology industry has come under increased scrutiny by the UK government in recent weeks. Demands that Apple create a ‘backdoor’ that would allow… The post The UK’s Competition Watchdog Launches Investigation into Mobile Platforms appeared first on Panda…

The UK’s Competition Watchdog Launches Investigation into Apple and Google’s Mobile Platforms

The mobile technology industry has come under increased scrutiny by the UK government in recent weeks. Demands that Apple create a ‘backdoor’ that would allow… The post The UK’s Competition Watchdog Launches Investigation into Apple and Google’s Mobile Platforms appeared…

IRS contractor leaked the tax returns of over 400k Americans and businesses

A few years ago, a rouge contractor of the Internal Revenue Service (IRS) leaked the federal tax returns of tens of thousands of American citizens… The post IRS contractor leaked the tax returns of over 400k Americans and businesses appeared…

Hackers behind US ransomware attacks arrested in Thailand

After an international investigation led by US, UK, and Thai law enforcement agencies. Two Russian individuals have been arrested in the party town of Phuket,… The post Hackers behind US ransomware attacks arrested in Thailand appeared first on Panda Security…

UK Government to introduce a digital ID wallet

The UK government has announced plans to launch a digital wallet app that will allow citizens to store their government-issued documents on their smartphones. Government… The post UK Government to introduce a digital ID wallet appeared first on Panda Security…

How to Tell If Someone Hacked Your Router: 10 Signs + Tips

1. Suspicious IP addresses accessing your network 2. Ransomware emails or messages targeting your devices 3. Session hijacking while browsing 4. Unfamiliar apps or programs… The post How to Tell If Someone Hacked Your Router: 10 Signs + Tips appeared…

Panda Free Antivirus: The Free, Complete Solution to Protect Your Devices

What is Panda Free Antivirus?   Panda Free is a free antivirus designed to protect your devices from threats such as malware, spyware, and ransomware. With… The post Panda Free Antivirus: The Free, Complete Solution to Protect Your Devices appeared first…

Hackers stole sensitive information belonging to 62 million kids and almost 10 million teachers

Hackers stole personal information belonging to tens of millions of kids from PowerSchool in a data breach. PowerSchool is a California-based company claiming to be… The post Hackers stole sensitive information belonging to 62 million kids and almost 10 million…

Romance scams: Online Impersonator duped a woman out of $850k

Con artist managed to swindle a French woman out of $850k by impersonating a celebrity. Approximately two years ago, an unknown cybercriminal pretending to be… The post Romance scams: Online Impersonator duped a woman out of $850k appeared first on…

“Vishing,” “Quishing,” and AI Scams: The New Cybercrime Techniques You Need to Know About

As artificial intelligence gets smarter, cybercriminals are discovering all new ways to hack and scam their victims. Can you believe your eyes? According to the… The post “Vishing,” “Quishing,” and AI Scams: The New Cybercrime Techniques You Need to Know…

Hackers stole the details of 58,000 people from a Bitcoin ATM operator

A popular Bitcoin ATM operator, Byte Federal, filed a report with the Office of Maine’s Attorney General stating that the details of approximately 58 thousand… The post Hackers stole the details of 58,000 people from a Bitcoin ATM operator appeared…

Under-16s Social Media Ban: A UK Government Proposal

The battle for schoolchildren’s attention has heated up again in the UK following recent comments by the government’s technology secretary. Peter Kyle recently revealed, a… The post Under-16s Social Media Ban: A UK Government Proposal appeared first on Panda Security…

Salt Typhoon cyber espionage affects at least eight telecom giants in the USA – FBI advises Americans use encrypted messaging apps

The White House has reported that at least eight telecom companies have been affected by the Salt Typhoon espionage campaign. This includes some of the… The post Salt Typhoon cyber espionage affects at least eight telecom giants in the USA…

FTC bans data brokers from selling sensitive information of Americans

The Federal Trade Commission (FTC) took action against a couple of data brokers who allegedly have been collecting and selling sensitive information about American residents.… The post FTC bans data brokers from selling sensitive information of Americans appeared first on…

Top Christmas Gifts: Must-Have Devices and Protection Accessories!

The holiday season is upon us, and with it comes the annual tradition of finding the perfect gifts for our loved ones. Whether you’re looking… The post Top Christmas Gifts: Must-Have Devices and Protection Accessories! appeared first on Panda Security…

International Computer Security Day

International Computer Security Day, observed annually on November 30th, is a global initiative to raise awareness about the importance of computer security. This day encourages… The post International Computer Security Day appeared first on Panda Security Mediacenter. This article has…

Handling Online Harassment: Dos and Don’ts

In today’s digital era, online harassment has unfortunately become a common experience for many internet users. This harmful behavior can have a severe impact on… The post Handling Online Harassment: Dos and Don’ts appeared first on Panda Security Mediacenter. This…