Kids-Safety

Who’s Afraid of the Big Bad Web?

“My Google, what big lies you have. All the better to trick you with.” This might very well become the line from a bedtime story that you tell your kids. Children tend to be more tech savvy than most adults, but they are also more vulnerable. They might know how a game is played or how a particular app works, but they are ignorant to the risks involved.

There are many different ways to protect your child online. It is important to communicate with your children and to enforce rules and restrictions.

Here are 10 tips from Panda on how to protect your children.  

  • Install strong security software on your computer – Panda’s 2015 consumer range, boasts the new XMT Smart Engineering engine providing complete protection with minimal performance impact. These products harness protection capabilities against viruses, malware, hackers and Wi-Fi intrusions. 
  • Monitor your children’s activity on the web – the 2015 range includes an advanced parental control feature that allows parents to monitor their children’s activities online. The dashboard provides a summary of the most visited Web pages and categories, and a detailed report of all pages accessed (page, category, date/time). The Parental Control technology is fully browser-independent, so deleting the browser history or using other browsers won’t affect the monitoring feature.
  • Teach your children about social media and the risk involved – Social media and online communication is a huge factor in the lives of youngsters today. Talk to your children about the content they post to social media sites; such as photos, statuses or personal information. Make sure that the privacy settings are set up correctly, so that their content and information is not visible to the public. Make them aware of the dangers involved in talking to and sharing information with people online.

(more…)

SA-Cyber-Safety

South Africa: Third-highest number of cybercrime victims in the world

Intel’s recent “Global Cost of Cyber-Crime Report” shows that the economic impact of cyber-crime in South Africa is equivalent to 0.14% of the country’s GDP. This is roughly R5.8 billion a year and growing.

According to security experts, neither government nor business are combatting cyber-crime correctly. This is mainly due to a shortage of skills and a lack of urgency in taking action against cybercriminals. Prevention is better than cure and South Africans must be made aware of these crimes and how to prevent them.

Industry reports indicate that South Africa has the third-highest number of cybercrime victims, after Russia and China. The most common cyber-attacks locally are related to phishing. “South Africa is the second most targeted country globally when it comes to Phishing attacks,” says Drew van Vuuren, CEO of information security and privacy practice, 4Di Privaca.

(more…)

Mobile-Protection

Panda’s 8 Easy Ways to Protect Your Mobile

What is the one thing you never leave home without? If your mobile is the first thing that came to mind, you wouldn’t be the only one. Whether you use it for social media, emails, research, storage or as a GPS – there is basically nothing that the latest smartphones can’t do. People use cell phone banking and store valuable data on their phones, making smartphones just as valuable as PC’s or laptops. These clever gadgets are however more prone to theft and loss. So why safeguard your computer, but not your smartphone?

(more…)

free

Panda Free Antivirus 2015 Named Editor’s Choice

Panda Free Antivirus 2015 was named PC Mag’s Editor’s choice as well as receiving an outstanding review from PC World. Panda Cloud Antivirus was launched in 2009 as the first free cloud-based antivirus. This was an innovative approach at the time that broke away from the traditional signature-based model and allowed us to offer a solution with high detection capabilities and minimal impact on computer performance. Over these last five years, the product has continuously evolved, increasing its capacity to counter new malware and protecting millions of computers around the world.

“Panda Free Antivirus 2015 scores on par with the best commercial antivirus tools, both in our hands-on tests and independent labs tests. It’s a new Editors’ Choice for free antivirus,’ says PC Mag’s Neil Rubenking.

(more…)

Cybercrime

The Era of Cyber-crime – Don’t Fall Victim

There has been an increase in cyber-attacks on high profile companies recently – JP Morgan Chase, Target and Home Depot as well as breaches in online services such as iCloud, Dropbox and Snapchat.

A cyber-attack is defined as – any type of offensive action employed by individuals or whole organizations, that targets computer information systems.

With each new attack it’s increasingly clear, no company is immune to cyber-attacks and preparation is key to mitigating risk.  This preparation must start with a commitment at the very top of the company. With a top-down approach and directors who are actively engaged, companies stand a greater chance of protecting their shareholders’ interests in cyberspace.

The companies that are most often targeted are financial institutions, healthcare organisations, major retailers and online/cloud storage services.

The most recent attacks, used methods that are:

  • Sophisticated – exploiting weak points, using backdoor controls and advanced malware.
  • Social – targeting specific people with social engineering and stealing and using valid credentials.
  • Stealthy – implemented in a series of low profile moves that are undetectable to standard security or hidden among thousands of logs collected daily.

(more…)

PUPs Cover

PUPs: What are they and how to avoid them?

What is a PUP?

PUP stands for Potentially Unwanted Program. This term was adopted as a more consumer friendly version of what was commonly called Grayware. Both terms accurately describe the software, because although it may not be illegal software in most cases – it is often unwanted software. It is common for security products to include PUP detection to some degree as this type of software does have an effect on the end user experience.

(more…)