Group of young creative people having a meeting in the office. Women are working on laptop while two men are talking to each other. The view is through the glass.

1/5 Businesses Infected by Malware through Social Media

We have all started to move to digital, and it’s making our lives simpler and easier. Or is it?

(more…)

Q1 Report

A look at PandaLabs’ Q1 Report

  • Panda Labs detected and neutralised more than 20 million new malware samples in the first three months of 2016.
  • Trojans and Ransomware continue to lead the pack, being the cause of 65% of all attacks.
  • China, Turkey and Taiwan top most affected countries.

(more…)

PPS  -Blog

The future of antivirus is pay-as-you-use.

Everyday cyber criminals are creating an increasing number of new malware samples with the aim of gaining access to our private business and personal data. Digitisation has meant that more and more people are using multiple devices to access the internet at home and at work. Gone are the days of having one family PC, we now see adults and children alike accessing the web from a number of devices in one household. (more…)

benefitsimg7

Panda’s Do’s & Don’t’s of Cyber Security

Here are Panda Security’s Do’s and Don’t’s of Cyber Security for your business, in 10 short points that are easy to remember and implement. (more…)

The Apple logo hangs inside the glass entrance to the Apple Store on 5th Avenue in New York City,

KeRanger Ransomware Hits Mac OS X Users

This week Mac users were targeted by what is being called the first fully functional ransomware for Mac OS X.

Over the weekend when Mac users downloaded the long awaited version 2.90 of popular Bit Torrent client Transmission they got a little something extra, a new piece of malware called KeRanger. (more…)

Panda Blog R

Block-y Locky Ransomware with Panda Security

Last week a new strain of ransomware came to the fore, dubbed Locky because of the way it renames the file extension. Locky targets users via email attachments, which is often an invoice in a Microsoft Word document. Once the recipient downloads the file, if Office macros are enabled the malicious macro gets to work encrypting the user’s files. If macros are not enabled, the Word document will display a message prompting the user to enable macros in order to read the invoice.
(more…)