" internet security "

girl-with-computer

10 Tips for Protecting Your Privacy

          1. Go on a diet and forget about cookies

These tools which have installed themselves in our virtual lives, gather data about our habits (searches and pages visited) which is often used to design custom advertising. You can avoid them by using browsers in ‘incognito’ or ‘private’ mode. Other options include regularly clearing your browsing history and cookies or accepting an opt-out cookie which blocks future cookies from being installed on your browser by a particular website or advertiser. It essentially lets you declare that you do not wish to participate in targeted ad delivery, profiling or otherwise have your web browsing tracked. An opt-out cookie will only block cookies from a particular server and is not a generic tool to block cookies from any site you visit. However, you can manage cookies via your browser settings.

         2. Use a virtual private network

A Virtual Private Network more commonly known as a VPN, allows you to browse the internet securely, even when you are connected to a public network. Although they are often associated with illegal activities, there is nothing bad about them. On the contrary, it is highly advisable to use them when you do not have a secure connection.

         3. It does not matter where you took that picture

Sharing the “selfie” you have just taken on social networks could reveal a lot of data about the device you used and where you are. Perhaps the phone model or camera specifications are not very important, but it is a good idea to change the settings so that the exact coordinates of your location do not appear. Here you have to disable the GPS settings on the mobile phone camera.

(more…)

2015-PandaLabs-Forecast

2015 Malware Predictions from PandaLabs

PandaLabs have released their predictions for IT security in 2015, based on reports and attacks in 2014.

CryptoLocker

This type of malware was in the spotlight in 2014, and these types of attacks are set to increase in 2015.

CryptoLocker operates in straightforward fashion: Once it gets into a computer, it encrypts all types of documents that could be valuable to the user (spreadsheets, documents, databases) and blackmails the victim into paying a ransom to recover the files. This type of malware is also known as ransomware.

Payment is most often demanded in bitcoins, so that it cannot be traced by the police, making this type of attack ideal for cyber-criminals – as many users choose to pay in order to recover the “hijacked” information.

Targeted attacks

A small percentage of the millions of new malware strains that appear every month are specifically created to attack previously defined targets. These attacks, known as targeted attacks, are becoming more common and will be highly significant during 2015.

Many companies are unaware that they could be the targets of such attacks and therefore do not have appropriate measures for detecting or stopping them.

(more…)

free

Panda Free Antivirus 2015 Named Editor’s Choice

Panda Free Antivirus 2015 was named PC Mag’s Editor’s choice as well as receiving an outstanding review from PC World. Panda Cloud Antivirus was launched in 2009 as the first free cloud-based antivirus. This was an innovative approach at the time that broke away from the traditional signature-based model and allowed us to offer a solution with high detection capabilities and minimal impact on computer performance. Over these last five years, the product has continuously evolved, increasing its capacity to counter new malware and protecting millions of computers around the world.

“Panda Free Antivirus 2015 scores on par with the best commercial antivirus tools, both in our hands-on tests and independent labs tests. It’s a new Editors’ Choice for free antivirus,’ says PC Mag’s Neil Rubenking.

(more…)

Cybercrime

The Era of Cyber-crime – Don’t Fall Victim

There has been an increase in cyber-attacks on high profile companies recently – JP Morgan Chase, Target and Home Depot as well as breaches in online services such as iCloud, Dropbox and Snapchat.

A cyber-attack is defined as – any type of offensive action employed by individuals or whole organizations, that targets computer information systems.

With each new attack it’s increasingly clear, no company is immune to cyber-attacks and preparation is key to mitigating risk.  This preparation must start with a commitment at the very top of the company. With a top-down approach and directors who are actively engaged, companies stand a greater chance of protecting their shareholders’ interests in cyberspace.

The companies that are most often targeted are financial institutions, healthcare organisations, major retailers and online/cloud storage services.

The most recent attacks, used methods that are:

  • Sophisticated – exploiting weak points, using backdoor controls and advanced malware.
  • Social – targeting specific people with social engineering and stealing and using valid credentials.
  • Stealthy – implemented in a series of low profile moves that are undetectable to standard security or hidden among thousands of logs collected daily.

(more…)

The new XMT Engine

Panda Security Launches 2015 Product Line

Our 2015 range of consumer solutions, boasting Panda’s new XMT Smart Engineering engine, is now available. The range includes: Panda Global Protection 2015, Panda Internet Security 2015, Panda Antivirus Pro 2015 and Panda Mobile Security 2.0.

We designed these products to provide complete protection with minimal performance impact, the 2015 consumer solutions harness the power of cloud computing to combat the myriad security threats that users face today – viruses, hackers, online fraud, identity theft and other known and unknown threats. (more…)