" cybercrime "

Untitled-1

Keeping tabs on your employees in a multi-device environment

The traditional desktop computer is no longer the only device we use to get work done. For the past few years workers have increasingly begun to use their own smartphones and tablets for work. According to a study carried out by Tech Pro Research, 74% of businesses allow, or are planning to allow, their employees to bring their own devices to the office.

Despite the benefits, such as being able to communicate easily with employees when they aren’t at their workstations, security remains a priority and with the BYOD (Bring Your Own Device) culture – it is important to stay on top of it.

The variety of devices used in the workplace and the resulting loss of control held by the business, means that cybercriminals are able to take advantage of the many vulnerabilities in mobile devices to access the company’s network.

 

(more…)

adaptive

Panda Security Launches Adaptive Defense 360

With more than 230,000 new malware samples daily and more sophisticated infection techniques, businesses are facing increased threats that put their confidential information at risk and leave them in compromising situations. Adaptive Defense 360 is Panda’s latest solution that covers all that a traditional anti-virus can’t.

It combines two of Panda’s star solutions in one console:

  • Panda Endpoint Protection Plus is our EPP (Endpoint Protection Platform) solution and comes with all of the features of a traditional protection: anti-virus, anti-malware, personal firewall, web and mail filtering, and device management.
  • Panda Adaptive Defense, our EDR (Endpoint Protection & Response) solution, adds detection and automated response, continuous monitoring and real-time forensic analysis – which results in the complete strengthening and securing of the endpoint.

(more…)

new-malware

Ransomware on the Rise – PandaLabs Quarterly Report

The second quarter of 2015 shows that there was an average of 230 000 new malware samples created daily, totaling 21 million from April to June. This is a 43% increase in comparison to the second quarter of 2014.

Trojans continue to be the most common type of malware and are the main source of infection, with 76.25% of users infected. This quarter also showed the proliferation of PUPs (Potentially Unwanted Programs) which accounted for 14.39% of infections.

There has been a dramatic increase in ransomware over the last few months. What users don’t realise is that these kinds of attacks will continue to grow, as long as companies and consumers succumb to paying the ransom – this should be a last resort.

(more…)

pattern_unlock

New Android Ransomware Changes Lock Screen PIN

Dubbed Android/Lockerpin.A, the new trojan app tricks users into granting it device administrator privileges. To achieve this it mimics a patch installation window on top of an activation notice. When victims click on the continue button, they actually grant the malicious app rights that allow it to make changes to the Android settings. Lockerpin the sets or resets the PIN that unlocks the screen lock, effectively requiring users to perform a factory reset to regain control over the device. By contrast, earlier forms of Android ransomware generally were thwarted, usually by deactivating administrator privileges and then uninstalling the app after the infected device is booted into safe mode.

(more…)

passwords-inherence-retina

Is biometrics the answer to secure and easy online payment?

Demanding and tech-savvy users continue to exert extreme pressure on companies to solve the convenience versus security conundrum. This is where a seamless customer experience and data security intersects. Growing cyber risk has ushered in the need for watertight methods of protecting personal data. According to the South African Fraud Prevention Service, identity theft is costing the country at least R1 billion per year and has increased by more than 200% in the last six years.

While the payments industry is currently working full steam on various forms of biometric technology aimed at thwarting ever-increasing security breaches in payments technologies, biometrics have been around for quite a while and the technologies take different forms.

(more…)

Mac-Viruses

The Reality of Mac Viruses

For years, Mac users have been safe in the knowledge that their platform was relatively protected against malware. A combination of the lower number of users on the platform, less attention from security researchers and fewer exploited security holes in the operating system than Windows, has led to a generally virus and malware free experience. Windows also represents a far larger target than Mac for profit-seeking virus and malware authors, due to their greater market share.

But in quick succession, two new serious vulnerabilities have been discovered in Mac OS X.

(more…)