- Can hackers eavesdrop and track people via Bluetooth audio devices?par Panda Security le 19 janvier 2026 à 7 h 00 min
Yes, they can. A flaw discovered by cyber researchers last year allowed hackers to eavesdrop. And it also allowed them to track people using regular… The post Can hackers eavesdrop and track people via Bluetooth audio devices? appeared first on Panda Security Mediacenter.
- Your digital safety checklist for the start of the yearpar Panda Security le 16 janvier 2026 à 7 h 00 min
The start of a new year brings new opportunities – and heightened cyber risks as scammers exploit the holiday aftermath. In 2024 the FBI’s Internet… The post Your digital safety checklist for the start of the year appeared first on Panda Security Mediacenter.
- AI Is Changing Cyber Threats — Here’s How to Stay Protectedpar Panda Security le 12 janvier 2026 à 9 h 38 min
Artificial intelligence (AI) is changing the way cybercriminals plan, launch, and scale attacks. But the same technology can also help people and businesses stay safer… The post AI Is Changing Cyber Threats — Here’s How to Stay Protected appeared first on Panda Security Mediacenter.
- How to Wipe a Hard Drive: Windows + Macpar Panda Security le 11 janvier 2026 à 2 h 05 min
If you want to completely wipe a hard drive, whether you’re getting rid of an old computer or starting fresh, here’s how to do it. The post How to Wipe a Hard Drive: Windows + Mac appeared first on Panda Security Mediacenter.
- Are criminal hacking organizations recruiting teenagers to do the dirty work?par Panda Security le 9 janvier 2026 à 7 h 00 min
Yes, they are. It has been confirmed that many of the popular hacking organizations that have been terrorizing the world over the last few years… The post Are criminal hacking organizations recruiting teenagers to do the dirty work? appeared first on Panda Security Mediacenter.
- Why attackers are phishing on LinkedIn (and how to stop it)par Panda Security le 7 janvier 2026 à 8 h 44 min
Phishing isn’t just an email problem anymore. Attackers now use social media, search results, and messaging apps to reach victims, and research suggests that about… The post Why attackers are phishing on LinkedIn (and how to stop it) appeared first on Panda Security Mediacenter.
- Will hackers release all of Spotify’s most listened music files?par Panda Security le 30 décembre 2025 à 7 h 15 min
Hackers from a hacktivist group called Anna’s Archive have managed to steal approximately 86 million music files from Spotify. The activists claim to be in… The post Will hackers release all of Spotify’s most listened music files? appeared first on Panda Security Mediacenter.