7 Ways to Secure Your Web Browser Against Attacks

Monday, September 21st, 2015

Your web browser is under attack. Aside from simply tricking you into downloading and running malicious software, attackers mainly target flaws in your browser and its plug-ins to compromise your PC. Use these tips to secure your web browser from attackers, whether they’re using malvertising attacks, compromising websites, or just directing you to malicious ...

Very useful system management and/or forensics platform for Windows

Friday, September 18th, 2015

WSCC is a free, portable program that allows you to install, update, execute and organize the utilities from various system utility suites. WSCC can install and update the supported utilities automatically. Alternatively, WSCC can use the http protocol to download and run the programs. WSCC is portable, installation is not ...

230,000 new malware samples detected each day

Wednesday, September 16th, 2015

PandaLabs has confirmed a record increase in the creation of new malware samples. In the second quarter of 2015 alone there were an average of 230,000 new malware samples detected each day, which means a total of 21 million new types in these three months. Compared to the same period last ...

First Let’s Encrypt certificate installed and tested.

Tuesday, September 15th, 2015

How Command and Control Servers Remain Resilient

Monday, September 14th, 2015

One of the ways that malware activity on a network is spotted is via the activity of their network activity. However, in many cases this can be difficult to detect: there have been incidents where command-and-control (C&C) servers were able to stay online and pose a problem for many years. ...