" cyber safety "

Smart-TVs

Smart TVs; the New Big Brother

Smart TVs offer countless benefits such as Internet access, social media access, live streaming and communication with other similar devices; mobile phones and tablets.

It’s the age of ubiquitous surveillance, driven by both Internet firms and governments. The Internet of Things is full of eavesdroppers who want to ‚Äúlisten‚ÄĚ. Newer cars contain computers that record speed, steering wheel position, pedal pressure, even tyre pressure and third party companies such as insurance companies want to listen. And, of course, your cell phone records your precise location at all times. Add security cameras and recorders, drones and other surveillance airplanes and we’re being watched, tracked, measured and listened to almost all the time.

(more…)

Fusion-Cover-of-infographic

Panda Cloud Fusion Infographic

Panda Fusion is a cloud-based solution that meets all your needs. It is easy to deploy and scale, as it requires no maintenance or infrastructure investment. Available anytime, anywhere through a simple web browser.

Benefits of Panda Cloud Fusion

  • It offers¬†maximum protection¬†against malware and unknown threats.
  • It reduces costs through optimisation of your¬†IT infrastructure.
  • It provides an¬†optimal support experience, through proactive problem resolution and remote access to users’ devices that is non-disruptive, wherever they are.

See the infographic below for more:

(more…)

girl-with-computer

10 Tips for Protecting Your Privacy

          1. Go on a diet and forget about cookies

These tools which have installed themselves in our virtual lives, gather data about our habits (searches and pages visited) which is often used to design custom advertising. You can avoid them by using browsers in ‚Äėincognito‚Äô or ‚Äėprivate‚Äô mode. Other options include regularly clearing your browsing history and cookies or accepting an opt-out cookie which blocks future cookies from being installed on your browser by a particular website or advertiser. It essentially lets you declare that you do not wish to participate in targeted ad delivery, profiling or otherwise have your web browsing tracked. An opt-out cookie will only block cookies from a particular server and is not a generic tool to block cookies from any site you visit. However, you can manage cookies via your browser settings.

         2. Use a virtual private network

A Virtual Private Network more commonly known as a VPN, allows you to browse the internet securely, even when you are connected to a public network. Although they are often associated with illegal activities, there is nothing bad about them. On the contrary, it is highly advisable to use them when you do not have a secure connection.

         3. It does not matter where you took that picture

Sharing the “selfie” you have just taken on social networks could reveal a lot of data about the device you used and where you are. Perhaps the phone model or camera specifications are not very important, but it is a good idea to change the settings so that the exact coordinates of your location do not appear. Here you have to disable the GPS settings on the mobile phone camera.

(more…)

CTB-Locker

The Latest on Ransomware: CTB – Locker

Ransomware is malware that limits access to data on devices and demands a ransom be paid to the developer. Some forms of ransomware encrypt files on the systems hard drive, while some simply lock the system and display messages intended to persuade the user into paying.

In the past week there have been several cases of ransomware called CTB-Locker also known as Critroni Ransom. Generally spread via e-mail as an attachment; CTB-locker is released from time to time with the most recent cases occurring 18/19/20 January 2015.

CTB locker is run by a user. The application encrypts common file-types such as Excel and Word documents and images files such as Jpegs. The user then receives a display message stating that the data has been encrypted and that they need to pay a ransom.

It is not likely that the encrypted files are recoverable, in some cases users may be able to use Volume Shadow Copy, but essentially the most effective means of ‚Äúrecovery‚ÄĚ is to back-up data/files on a regular basis and restore the most recent back-up.

CTB Locker doesn¬īt always remove the volume shadow copy (VSS), so depending on the affected operating system, if it is Windows Vista or higher, it is possible to retrieve a copy of the files affected by malware.

In this case, it is necessary to follow the steps below:

  1. Download and install the following software: http://www.shadowexplorer.com/downloads.html
  1. Once installed, browse to the location where the affected files are located
  1. Select a date prior to the infection.
  1. Select the affected file or folder, and choose the option “Export”.

(more…)

2015-PandaLabs-Forecast

2015 Malware Predictions from PandaLabs

PandaLabs have released their predictions for IT security in 2015, based on reports and attacks in 2014.

CryptoLocker

This type of malware was in the spotlight in 2014, and these types of attacks are set to increase in 2015.

CryptoLocker operates in straightforward fashion: Once it gets into a computer, it encrypts all types of documents that could be valuable to the user (spreadsheets, documents, databases) and blackmails the victim into paying a ransom to recover the files. This type of malware is also known as ransomware.

Payment is most often demanded in¬†bitcoins, so that it cannot be traced by the police, making this type of attack ideal for cyber-criminals – as many users choose to pay in order to recover the¬†‚Äúhijacked‚ÄĚ information.

Targeted attacks

A small percentage of the millions of new malware strains that appear every month are specifically created to attack previously defined targets. These attacks, known as targeted attacks, are becoming more common and will be highly significant during 2015.

Many companies are unaware that they could be the targets of such attacks and therefore do not have appropriate measures for detecting or stopping them.

(more…)

Kids-Safety

Who’s Afraid of the Big Bad Web?

‚ÄúMy Google, what big lies you have. All the better to trick you with.‚ÄĚ This might very well become the line from a bedtime story that you tell your kids. Children tend to be more tech savvy than most adults, but they are also more vulnerable. They might know how a game is played or how a particular app works, but they are ignorant to the risks involved.

There are many different ways to protect your child online. It is important to communicate with your children and to enforce rules and restrictions.

Here are 10 tips from Panda on how to protect your children.  

  • Install strong security software on your computer – Panda‚Äôs 2015 consumer range, boasts the new¬†XMT Smart Engineering engine providing complete protection with minimal performance impact. These products harness protection capabilities against viruses, malware, hackers and Wi-Fi intrusions.¬†
  • Monitor your children‚Äôs activity on the web – the 2015 range includes an advanced parental control feature that allows parents to monitor their children‚Äôs activities online. The dashboard provides a summary of the most visited Web pages and categories, and a detailed report of all pages accessed (page, category, date/time). The Parental Control technology is fully browser-independent, so deleting the browser history or using other browsers won‚Äôt affect the monitoring feature.
  • Teach your children about social media and the risk involved ‚Äď Social media and online communication is a huge factor in the lives of youngsters today. Talk to your children about the content they post to social media sites; such as photos, statuses or personal information. Make sure that the privacy settings are set up correctly, so that their content and information is not visible to the public. Make them aware of the dangers involved in talking to and sharing information with people online.

(more…)