" Botnets "

cybersecurity3

The Advantages of Having a Managed Security Service

In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex and budgets tighter and tighter.

The world of technology in the workplace is no longer just restricted to servers, workstations or email accounts – instead we need to consider mobile devices and the culture of BYOD (Bring Your Own Device). Companies also need to be aware of problems that may arise from new trends such as social media and the impact that all of this can have on the security of our corporate networks.

This places great stress on businesses when it comes to the monitoring and management of information security.

(more…)

new-malware

Ransomware on the Rise – PandaLabs Quarterly Report

The second quarter of 2015 shows that there was an average of 230 000 new malware samples created daily, totaling 21 million from April to June. This is a 43% increase in comparison to the second quarter of 2014.

Trojans continue to be the most common type of malware and are the main source of infection, with 76.25% of users infected. This quarter also showed the proliferation of PUPs (Potentially Unwanted Programs) which accounted for 14.39% of infections.

There has been a dramatic increase in ransomware over the last few months. What users don’t realise is that these kinds of attacks will continue to grow, as long as companies and consumers succumb to paying the ransom – this should be a last resort.

(more…)

Mac-Viruses

The Reality of Mac Viruses

For years, Mac users have been safe in the knowledge that their platform was relatively protected against malware. A combination of the lower number of users on the platform, less attention from security researchers and fewer exploited security holes in the operating system than Windows, has led to a generally virus and malware free experience. Windows also represents a far larger target than Mac for profit-seeking virus and malware authors, due to their greater market share.

But in quick succession, two new serious vulnerabilities have been discovered in Mac OS X.

(more…)

Panda 25

Panda Celebrating 25 Years!

Panda Security has reason to celebrate. The multinational developer of security solutions designed to protect the digital lives of individuals and organizations alike is celebrating 25 years in the vanguard of IT security.

2015 saw the company  adopt a new corporate identity that reflects Panda’s commitment to simplify the complex, through the concept of ‘Simplexity’. This concept underpins the company’s effort to provide new and improved solutions to safeguard users’ digital lives.

 

(more…)

Q1-2015-Results

PandaLab’s Results for the First Quarter of 2015

PandaLabs published its Quarterly Report for Q1, analysing the IT security events and incidents from January through March 2015. The anti-malware laboratory detected over 225 000 new malware strains per day in the first quarter of the year, with peaks reaching 500 000This record-breaking figure represents a 40% increase over Q1 2014 and is well above the average for the entire year, which stood at approximately 205 000 new malware samples per day. Most of these specimens were variants of known malware, conveniently modified by virus writers to evade detection by antivirus laboratories. Trojans continued to be the most common threat type, representing 72.75% of all new malware and the main source of infections  at 76.05% of the total.

The first months of the year were dominated by ransomware attacks – especially CryptoLocker. Ransomware has become cyber-criminals’ preferred method to make money from companies’ stolen information. Ten companies in the oil and gas maritime transportation sector,  fell victim to this type of attack, as revealed by Panda Security in a report on a hacking campaign dubbed Operation Oil Tanker: The Phantom Menace which targeted oil tankers.

(more…)

Smart-TVs

Smart TVs; the New Big Brother

Smart TVs offer countless benefits such as Internet access, social media access, live streaming and communication with other similar devices; mobile phones and tablets.

It’s the age of ubiquitous surveillance, driven by both Internet firms and governments. The Internet of Things is full of eavesdroppers who want to “listen”. Newer cars contain computers that record speed, steering wheel position, pedal pressure, even tyre pressure and third party companies such as insurance companies want to listen. And, of course, your cell phone records your precise location at all times. Add security cameras and recorders, drones and other surveillance airplanes and we’re being watched, tracked, measured and listened to almost all the time.

(more…)