" Consumer "

q1 headline image - blog

The Rise and Rise of the Cyber Economy – PandaLabs Q1 2017 Report

Developments in Cyber-crime, Cyberwarfare and AI mark the first quarter of 2017, as indicated by PandaLabs Q1 Report. The Report by Panda Security’s malware resource facility identifies prominent tactics, attack methods and shifts in the industry.

(more…)

IMG-MC-wysiwye

A User-Friendly Interface for Cyber-criminals

Installing malware through Remote Desktop Protocol is a popular attack method used by many cyber-criminals. over the past few months Panda Security’s research facility PandaLabs, has analysed several attacks of this nature.

Once credentials are obtained through brute a force attack on the RDP, the cyber-criminals gain access to the company. Attackers simply execute the corresponding malware automatically to start the encryption.
(more…)

IMG AVComp 03-17 - Blog

Panda Security Rated Top in Antivirus Test

A recent study conducted by AV Comparatives recognised Panda Security for having obtained the highest possible score by detecting 100% of the malware samples tested.
 

AV Comparatives most rigorous test ranks Panda Security number one for malware detection

  (more…)

young man with glasses sitting in front of his computer, programming. the code he is working on (CSS) can be seen through the screen.

Cybercrime Surges in Q3

PandaLabs Q3 Report indicates that incidences of cybercrime continue to increase, with 18 million new malware samples captured this quarter – more than 200,000 samples daily.
(more…)

1

Evolution of Locky – A Cat & Mouse Game

In the on-going game of cat and mouse between cyber attackers and defensive internet security providers, the appearance of a new tactic from the Locky family of Ransomware comes as no surprise.

As we discussed in February this year, Locky targets victims through seemingly legitimate email attachments. Once the victim clicks on the attachment the malicious macro begins encrypting the users’ files.
(more…)

pack-shot-blog

Next-Level Protection for Home-Users

Most of us have some understanding of the threats and risks we face living our lives constantly connected to the internet. We know that we should avoid emails and attachments from unknown senders, and not to click on internet ads. We know that we should update our passwords often and back up our personal devices.

In reality, however, we don’t always get it right. So how can you ensure your family is safe from cyber threats?
(more…)