" anti-malware "

Drones

How a drone can hack into your home network just by flying over it

Drones can be used to record incredible scenes for movies, follow thieves from above, save lives or carry out home deliveries at lightning speed. Unfortunately, this also opens doors for people to misuse them for malicious gain.

Researchers in Singapore have demonstrated how attackers using a drone with a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organisations determine if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by  spies for corporate espionage.

To demonstrate that this threat is real and exists, the investigators paired a drone with a smartphone and developed two apps that were designed to intercept the communications of a printer from the outside.

(more…)

cybersecurity3

The Advantages of Having a Managed Security Service

In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex and budgets tighter and tighter.

The world of technology in the workplace is no longer just restricted to servers, workstations or email accounts – instead we need to consider mobile devices and the culture of BYOD (Bring Your Own Device). Companies also need to be aware of problems that may arise from new trends such as social media and the impact that all of this can have on the security of our corporate networks.

This places great stress on businesses when it comes to the monitoring and management of information security.

(more…)

Android-Marshmallow

Android Marshmallow Protects against Ransomware

It’s becoming more and more common for malicious applications on Android to use ransomware as a means of attack. It is one of the most worrying threats to mobile users as it renders the device unusable until the fee is paid and is sometimes difficult to eliminate completely. Google is aware of this issue and has finally decided to face it head on.

Android 6.0 Marshmallow, which is already available on selected terminals, makes it more difficult for cyber-criminals to hijack users’ phones. This is thanks to the company’s experts designing a more advanced operating system to manage the permissions asked by different applications.

Until now, users accepted all of the permission requests at once when they installed the apps. Due to this, seemingly inoffensive apps such as a simple flashlight were able to access features that were not related to its sole purpose. Not all of these apps were dangerous and for the most part companies were only trying to fine tune their advertising. However, by allowing access to other functions and domains on the mobile devices – users opened the door for malware to infect the device as well.

(more…)

Untitled-1

Keeping tabs on your employees in a multi-device environment

The traditional desktop computer is no longer the only device we use to get work done. For the past few years workers have increasingly begun to use their own smartphones and tablets for work. According to a study carried out by Tech Pro Research, 74% of businesses allow, or are planning to allow, their employees to bring their own devices to the office.

Despite the benefits, such as being able to communicate easily with employees when they aren’t at their workstations, security remains a priority and with the BYOD (Bring Your Own Device) culture – it is important to stay on top of it.

The variety of devices used in the workplace and the resulting loss of control held by the business, means that cybercriminals are able to take advantage of the many vulnerabilities in mobile devices to access the company’s network.

 

(more…)

Mac-Viruses

The Reality of Mac Viruses

For years, Mac users have been safe in the knowledge that their platform was relatively protected against malware. A combination of the lower number of users on the platform, less attention from security researchers and fewer exploited security holes in the operating system than Windows, has led to a generally virus and malware free experience. Windows also represents a far larger target than Mac for profit-seeking virus and malware authors, due to their greater market share.

But in quick succession, two new serious vulnerabilities have been discovered in Mac OS X.

(more…)

new-panda-mobile-security

Control your antivirus from your Smartwatch

The new version of Panda Mobile Security (available on the Google Play Store) allows users to access their antivirus features directly from their Android Smartwatch.

 

Below is a list of features included in Mobile security:

  • Analyse your telephone/tablet from the smartwatch.
  • Activate anti-theft and locking of device.
  • Connect your smartwatch and device to one another; an alarm will activate when they are too far apart
  • Remotely activate an alarm on your device
  • Activate the camera on your Android device from your smartwatch and remotely take a photo.

 

(more…)