[email protected] +603-2181 3666
Extol Threat Intelligent Notification

Panda Security has recently appointed Miguel Bullón as its new Global Retail Director. In his new role, Miguel will be responsible for international business development with an emphasis on the area of consumer products. From now on he will lead the Panda Security retail teams and will report directly to Rado Svicin, Panda Security’s Global […]

Imagine that you’re cruising along at 112 kilometers per hour, confident in the stability and security of your brand new Jeep Cherokee. Suddenly, you begin to notice that the air conditioning has come on by itself. Next of all the music is increasing in volume and the windscreen wipers have taken on a life of […]

Due to the high demand for Windows 10, Microsoft is releasing it gradually. This especially applies to certain countries. The official Microsoft Brazil website confirms it (left image). Cybercriminals from Brazil have taken advantage of this and are running a spam campaign identical to the official design offering a fake option for users to “get […]

IT News

New research into a notorious Eastern European organized cybercrime gang accused of stealing more than $100 million from banks and businesses worldwide provides an unprecedented, behind-the-scenes look at an exclusive “business club” that dabbled in cyber espionage and worked closely with phantom Chinese firms on Russia’s far eastern border. In the summer of 2014, the U.S. […]

IT News

It seemed like this moment would never come and many times we were assured that there was no threat of a virus for Mac users… but Thunderstrike 2 has arrived and swiftly refuted those claims. This worm was designed by two IT security experts, Xeno Kovah and Trammell Hudson, after noticing a security breach a […]

March, April, May and June. During the last four months, Panda Security has obtained the best rate protection in the Real World Protection Test by Av-Comparatives. It’s possible that you don’t know exactly what this means, so that’s where we come in! The test reflects real conditions in which the security solutions of different companies […]