" cybercrime "


Panda’s 2016 Consumer Solutions Designed for Multiple Devices

Our 2016 solutions are now available in South Africa. Panda Global Protection 2016, Panda Internet Security 2016, Panda Antivirus Pro 2016, Panda Mobile Security 2016, Panda Antivirus for Mac 2016 and Panda Free Antivirus 2016.  

The 2016 range is designed to make the digital world easier and more secure for consumers. It enables users to browse online safely, protects families against inappropriate content and keeps identities and confidential information safe.  The new products offer multi-platform protection Рproviding security on Windows (including Windows 10 compatibility), Android, Mac and even anti-theft for iPhone and iPad.

Every user may have a different need or use for connectivity and we try to cater for each of these by offering various solutions at different levels. We want users to be able to perform any activity on the internet without worrying about cyber-criminals, malware or inappropriate content.



Human Resource Departments a Target for Ransomware

Physically presenting your CV for a prospective job offer is fast becoming obsolete. The digital world has simplified¬†correspondence between people by electronic or digital means. Applicants are able to send their CV’s to companies via email attachments.

In recent attacks¬†cyber-criminals¬†send¬†malicious data¬†disguised as CV’s,¬†upon¬†opening¬†the attachment, the malware¬†installs itself on the victim‚Äôs computer. It¬†then encrypts the data on the PC/Network and requests a ransom in-turn for the decryption code.¬†This type of attack is known as ransomware.



5 Tips for More Secure Online Shopping

Over 100 000 stores worldwide use online credit card facilities as a¬†method of payment. Cyber-criminals do not steal each individual’s details, ¬†instead they¬†¬†infect the most sensitive part of the system with malware, that is designed to collect payment data of the entire customer base.¬†

Far from wanting to make you fear shopping online, cases like this are used to point out the risks we face.

Below are some tips on how to avoid becoming the victim of a cyber-attack when using an e-commerce platform:



45% of Ex-Employees Continue to Have Access to Confidential Corporate Data

It is essential for companies to take steps in order to maintain their¬†security, especially when changes occur within the¬†company’s¬†staff.

Employees looking for a change of scene, suppliers who do not pay on time or companies that go out of business Рthere are numerous reasons as to why business relationships may come to an end and companies should control what information is retained by those who are leaving and obtained by those who are entering.

It seems that many companies don’t pay much attention to this matter. There are few organisations that take the necessary precautions to prevent ex-employees from keeping information that belongs to the company. According to a study carried out by Osterman Research, 89% of the ex-employees keep the login and the password which gave them access to at least one of their former company’s services.


Panda 25

Panda Celebrating 25 Years!

Panda Security has reason to celebrate. The multinational developer of security solutions designed to protect the digital lives of individuals and organizations alike is celebrating 25 years in the vanguard of IT security.

2015 saw¬†the company ¬†adopt a new corporate identity that reflects Panda‚Äôs commitment to simplify the complex, through the concept of ‚ÄėSimplexity‚Äô. This concept underpins the company‚Äôs effort to provide new and improved solutions to safeguard users‚Äô digital lives.




PandaLab’s Results for the First Quarter of 2015

PandaLabs published its Quarterly Report for Q1, analysing the IT security events and incidents from January through March 2015. The anti-malware laboratory detected over 225 000 new malware strains per day in the first quarter of the year, with peaks reaching 500 000. This record-breaking figure represents a 40% increase over Q1 2014 and is well above the average for the entire year, which stood at approximately 205 000 new malware samples per day. Most of these specimens were variants of known malware, conveniently modified by virus writers to evade detection by antivirus laboratories. Trojans continued to be the most common threat type, representing 72.75% of all new malware and the main source of infections  at 76.05% of the total.

The first months of the year were dominated by¬†ransomware attacks – especially CryptoLocker.¬†Ransomware has become cyber-criminals‚Äô preferred method to make money from companies‚Äô stolen information.¬†Ten companies in the oil and gas maritime transportation sector, ¬†fell victim to this type of attack, as revealed by Panda Security in a report on a hacking campaign dubbed¬†‚ÄúOperation Oil Tanker: The Phantom Menace‚ÄĚ which targeted oil tankers.