" antivirus "

panda-number-1

Panda Security Achieving Top Results

Panda Security achieved the highest protection ratios in the Real World-Protection Tests conducted by AV- Comparatives in March, April, May and June 2015. This test evaluates the real-life protection capabilities of antivirus software.

Panda Security’s antivirus solution,  detected and blocked 99.9% of all threats. In simple terms, the test framework replicates the scenario of an everyday user in an everyday online environment, testing antivirus software products against malicious Internet downloads or exploits designed to infect computers automatically by taking advantage of system vulnerabilities. The study, which analysed more than 20 antivirus solutions, reinforce the great protection capabilities of Panda Security’s product.

(more…)

Panda 25

Panda Celebrating 25 Years!

Panda Security has reason to celebrate. The multinational developer of security solutions designed to protect the digital lives of individuals and organizations alike is celebrating 25 years in the vanguard of IT security.

2015 saw the company  adopt a new corporate identity that reflects Panda’s commitment to simplify the complex, through the concept of ‘Simplexity’. This concept underpins the company’s effort to provide new and improved solutions to safeguard users’ digital lives.

 

(more…)

Q1-2015-Results

PandaLab’s Results for the First Quarter of 2015

PandaLabs published its Quarterly Report for Q1, analysing the IT security events and incidents from January through March 2015. The anti-malware laboratory detected over 225 000 new malware strains per day in the first quarter of the year, with peaks reaching 500 000This record-breaking figure represents a 40% increase over Q1 2014 and is well above the average for the entire year, which stood at approximately 205 000 new malware samples per day. Most of these specimens were variants of known malware, conveniently modified by virus writers to evade detection by antivirus laboratories. Trojans continued to be the most common threat type, representing 72.75% of all new malware and the main source of infections  at 76.05% of the total.

The first months of the year were dominated by ransomware attacks – especially CryptoLocker. Ransomware has become cyber-criminals’ preferred method to make money from companies’ stolen information. Ten companies in the oil and gas maritime transportation sector,  fell victim to this type of attack, as revealed by Panda Security in a report on a hacking campaign dubbed Operation Oil Tanker: The Phantom Menace which targeted oil tankers.

(more…)

oil-tanker

Panda Security Uncovers Ongoing Attack Against Oil Tankers

Panda Security has released “Operation Oil Tanker: The Phantom Menace”, a groundbreaking report that details a malicious and largely unknown targeted attack on oil tankers.

First discovered by Panda Security in January 2014, the ongoing attack on oil cargos began in August 2013, and is designed to steal information and credentials for defrauding oil brokers.Despite having been comprised by this cyber-attack, which Panda has dubbed “The Phantom Menace”, none of the dozens of affected companies have been willing to report the invasion and risk global attention for vulnerabilities in their IT security networks.

“The Phantom Menace” is one of the most unique attacks that PandaLabs has ever discovered. No antivirus engine was able to detect it when first triggered, primarily because the attackers used legitimate tools in conjunction with a number of self-made scripts to bypass any warnings that traditional AV software would detect. It was only discovered when a secretary opened a nonspecific attachment to an email – a type of file that Panda Security would later identify among ten different companies in the oil and gas maritime transportation sector.

(more…)

Police-Virus

Cyber Police Virus Strikes Again

The Cyber Police Virus is malware that attacks Android devices. Designed by cyber criminals who focus primarily on phone markets to collect money from unwary users, using counterfeit fines and violations.  The virus locks users’ phones and displays a fake fine on the screen, demanding a fee be paid. Although this virus does not encrypt data, as with ransomware for PC’s, the message remains on the screen and the virus is somewhat difficult to remove.  This Trojan is targeting users from 31 different countries around the world; 23 of which are European countries and is one of many new malware samples attacking Android devices. This is just more evidence that mobile devices are no longer considered “safe” and that users can start looking at protection for all their devices.

 

(more…)

girl-with-computer

10 Tips for Protecting Your Privacy

          1. Go on a diet and forget about cookies

These tools which have installed themselves in our virtual lives, gather data about our habits (searches and pages visited) which is often used to design custom advertising. You can avoid them by using browsers in ‘incognito’ or ‘private’ mode. Other options include regularly clearing your browsing history and cookies or accepting an opt-out cookie which blocks future cookies from being installed on your browser by a particular website or advertiser. It essentially lets you declare that you do not wish to participate in targeted ad delivery, profiling or otherwise have your web browsing tracked. An opt-out cookie will only block cookies from a particular server and is not a generic tool to block cookies from any site you visit. However, you can manage cookies via your browser settings.

         2. Use a virtual private network

A Virtual Private Network more commonly known as a VPN, allows you to browse the internet securely, even when you are connected to a public network. Although they are often associated with illegal activities, there is nothing bad about them. On the contrary, it is highly advisable to use them when you do not have a secure connection.

         3. It does not matter where you took that picture

Sharing the “selfie” you have just taken on social networks could reveal a lot of data about the device you used and where you are. Perhaps the phone model or camera specifications are not very important, but it is a good idea to change the settings so that the exact coordinates of your location do not appear. Here you have to disable the GPS settings on the mobile phone camera.

(more…)