With virtually every process now taking place online, users juggle dozens of accounts across apps, services, and devices, leading to constant login prompts and password… The post Digital Identity Fatigue: Too Many Logins, Too Little Control appeared first on Panda…
Category: Panda Security Mediacenter
Was GrubHub hacked?
Yes, GrubHub was hacked. Last week, on Jan 16th 2026, the food ordering platform confirmed to BleepingComputer that it had been affected by a recent… The post Was GrubHub hacked? appeared first on Panda Security Mediacenter. This article has been…
Can hackers eavesdrop and track people via Bluetooth audio devices?
Yes, they can. A flaw discovered by cyber researchers last year allowed hackers to eavesdrop. And it also allowed them to track people using regular… The post Can hackers eavesdrop and track people via Bluetooth audio devices? appeared first on…
Your digital safety checklist for the start of the year
The start of a new year brings new opportunities – and heightened cyber risks as scammers exploit the holiday aftermath. In 2024 the FBI’s Internet… The post Your digital safety checklist for the start of the year appeared first on…
AI Is Changing Cyber Threats — Here’s How to Stay Protected
Artificial intelligence (AI) is changing the way cybercriminals plan, launch, and scale attacks. But the same technology can also help people and businesses stay safer… The post AI Is Changing Cyber Threats — Here’s How to Stay Protected appeared first…
Are criminal hacking organizations recruiting teenagers to do the dirty work?
Yes, they are. It has been confirmed that many of the popular hacking organizations that have been terrorizing the world over the last few years… The post Are criminal hacking organizations recruiting teenagers to do the dirty work? appeared first…
Why attackers are phishing on LinkedIn (and how to stop it)
Phishing isn’t just an email problem anymore. Attackers now use social media, search results, and messaging apps to reach victims, and research suggests that about… The post Why attackers are phishing on LinkedIn (and how to stop it) appeared first…
Will hackers release all of Spotify’s most listened music files?
Hackers from a hacktivist group called Anna’s Archive have managed to steal approximately 86 million music files from Spotify. The activists claim to be in… The post Will hackers release all of Spotify’s most listened music files? appeared first on…
Were the records of 200 million Pornhub users stolen by hackers?
Yes, records belonging to approximately 200 million Pornhub premium users have been stolen by hackers. Even though authorities revealed the cyber incident earlier this month,… The post Were the records of 200 million Pornhub users stolen by hackers? appeared first…
20+ Telegram Scams and How to Avoid Them
Telegram scams have exploded in the past few years. The app is now the second-most downloaded messenger worldwide, with more than 1 billion users. More… The post 20+ Telegram Scams and How to Avoid Them appeared first on Panda Security…
Fake Websites: Types and How to Avoid Them in 2026
Discover how these fake sites work, the most common types to watch for and what you can do to stay safe. The post Fake Websites: Types and How to Avoid Them in 2026 appeared first on Panda Security Mediacenter. This…
How Much RAM Do I Have? A Guide for Macs, Windows and Phones
Figuring out how much RAM you have can help you understand why your device feels fast one day and sluggish the next. The post How Much RAM Do I Have? A Guide for Macs, Windows and Phones appeared first on…
Does OpenAI expect upcoming AI models to present a high cybersecurity risk?
Yes, they do. The team at OpenAI has confirmed in a blog post that future OpenAI models will become more capable in cybersecurity. ChatGPT’s owners… The post Does OpenAI expect upcoming AI models to present a high cybersecurity risk? appeared…
Unexpected Job Interviews? Protect Yourself
If you’re a LinkedIn user, chances are that you have received at least one unsolicited message promising exciting job opportunities – even if you’re not… The post Unexpected Job Interviews? Protect Yourself appeared first on Panda Security Mediacenter. This article…
Illegal Streaming and Piracy Are on the Rise
Illegal streaming and digital piracy have surged dramatically. Visits to illegal streaming website climbing from 130 billion in 2020 to 216 billion by 2024. That’s… The post Illegal Streaming and Piracy Are on the Rise appeared first on Panda Security…
How to Install WhatsApp on Your PC
Stay connected from your computer with WhatsApp. Whether through the desktop app, WhatsApp Web, or an emulator, link your phone via QR code and start chatting in seconds. The post How to Install WhatsApp on Your PC appeared first on…
Are there privacy risks of having home cameras?
Yes, there are privacy risks to installing security cameras at home. Especially when the cameras are connected to the internet and cover private spaces. While… The post Are there privacy risks of having home cameras? appeared first on Panda Security…
How to Tell if Someone Blocked Your Number (+ What to Do Next)
While there’s no sure way to know if you’ve been blocked, there are signs that can get you closer to figuring it out. Here are four ways to check. The post How to Tell if Someone Blocked Your Number (+…
To what extent can users hide their location at X?
After X introduced the “About this account” feature, users can no longer completely hide their location on X. However, users on Elon Musk’s social media… The post To what extent can users hide their location at X? appeared first on…
What We Learned from Recent Airport Cyber Attacks
Major airport problems across Europe in 2025 showed the aviation sector’s vulnerability to cyber threats, especially from ransomware targeting critical vendor systems. These cyberattacks are… The post What We Learned from Recent Airport Cyber Attacks appeared first on Panda Security…