panda-number-1

Panda Security Achieving Top Results

Panda Security achieved the highest protection ratios in the Real World-Protection Tests conducted by AV- Comparatives in March, April, May and June 2015. This test evaluates the real-life protection capabilities of antivirus software.

Panda Security’s antivirus solution,  detected and blocked 99.9% of all threats. In simple terms, the test framework replicates the scenario of an everyday user in an everyday online environment, testing antivirus software products against malicious Internet downloads or exploits designed to infect computers automatically by taking advantage of system vulnerabilities. The study, which analysed more than 20 antivirus solutions, reinforce the great protection capabilities of Panda Security’s product.

(more…)

holiday-bg

10 Tips to Stop Cyber-Criminals from Ruining Your Holiday

Often when we go on holiday we jeopardise our own personal information, either by using credit cards in foreign countries, announcing our travels on social media or using open networks while travelling. Below are 10 tips on how to be more cautious when on holiday.

1  Don’t shout it from the rooftops

Don’t broadcast your upcoming holiday on social media. And if you do, then don’t reveal too many details about your plans. This information could be useful for someone with a sinister motive and could leave your home and valuables exposed.

Make sure you deactivate your GPS. This way you don’t have to worry about it giving away clues of your whereabouts which might avert criminals to the fact that you’re out of town.

2  Back-up all your devices

If you have decided  to take your laptop, tablet or smartphone with you on holiday – don’t forget to make back-ups of the data and store it in a secure place.
(more…)

Types-of-Credit-Card-Fraud

5 Tips for More Secure Online Shopping

Over 100 000 stores worldwide use online credit card facilities as a method of payment. Cyber-criminals do not steal each individual’s details,  instead they  infect the most sensitive part of the system with malware, that is designed to collect payment data of the entire customer base. 

Far from wanting to make you fear shopping online, cases like this are used to point out the risks we face.

Below are some tips on how to avoid becoming the victim of a cyber-attack when using an e-commerce platform:

(more…)

Employees-Only-sign.

45% of Ex-Employees Continue to Have Access to Confidential Corporate Data

It is essential for companies to take steps in order to maintain their security, especially when changes occur within the company’s staff.

Employees looking for a change of scene, suppliers who do not pay on time or companies that go out of business – there are numerous reasons as to why business relationships may come to an end and companies should control what information is retained by those who are leaving and obtained by those who are entering.

It seems that many companies don’t pay much attention to this matter. There are few organisations that take the necessary precautions to prevent ex-employees from keeping information that belongs to the company. According to a study carried out by Osterman Research, 89% of the ex-employees keep the login and the password which gave them access to at least one of their former company’s services.

(more…)

Panda 25

Panda Celebrating 25 Years!

Panda Security has reason to celebrate. The multinational developer of security solutions designed to protect the digital lives of individuals and organizations alike is celebrating 25 years in the vanguard of IT security.

2015 saw the company  adopt a new corporate identity that reflects Panda’s commitment to simplify the complex, through the concept of ‘Simplexity’. This concept underpins the company’s effort to provide new and improved solutions to safeguard users’ digital lives.

 

(more…)

Q1-2015-Results

PandaLab’s Results for the First Quarter of 2015

PandaLabs published its Quarterly Report for Q1, analysing the IT security events and incidents from January through March 2015. The anti-malware laboratory detected over 225 000 new malware strains per day in the first quarter of the year, with peaks reaching 500 000This record-breaking figure represents a 40% increase over Q1 2014 and is well above the average for the entire year, which stood at approximately 205 000 new malware samples per day. Most of these specimens were variants of known malware, conveniently modified by virus writers to evade detection by antivirus laboratories. Trojans continued to be the most common threat type, representing 72.75% of all new malware and the main source of infections  at 76.05% of the total.

The first months of the year were dominated by ransomware attacks – especially CryptoLocker. Ransomware has become cyber-criminals’ preferred method to make money from companies’ stolen information. Ten companies in the oil and gas maritime transportation sector,  fell victim to this type of attack, as revealed by Panda Security in a report on a hacking campaign dubbed Operation Oil Tanker: The Phantom Menace which targeted oil tankers.

(more…)