" internet security "

Open Windows Spanish Trailer (2013) - Elijah Wood Movie HD from La Panda Productions on Vimeo.

Panda Security Ventures into the Movie Business with “Open Windows”

In a world where interconnectivity is increasingly important, Panda Security has chosen to sponsor a French-Spanish co-production, Open Windows, as a means of increasing public awareness of the dangers of the Internet, regardless of the device used to connect to it. Scheduled for release in a few months, the movie, directed by Spanish director-screenwriter Nacho Vigalondo, plays out in real time, utilizing different types of formats and electronic devices and the action is seen through the first-person view of the main character’s laptop. With cyber-crime as a backdrop, Open Windows stars Elijah Wood as an everyman whose girlfriend (Sasha Grey) has been abducted by a vicious killer. Wood’s character spends the rest of the film trying to find her, in a hunt that revolves around various forms of technology. The action is followed on the screen of a laptop connected to the Internet, an approach that reflects the importance of mobility and immediate Internet connectivity in today’s world. (more…)

Anti-Virus vs Internet Security

Many people incorrectly assume that Antivirus and Internet Security protection are one in the same, however that is not the case, they are two different solutions. There is a misconception that one or the other fully covers all PC users but there are a few distinct differences that can make all the difference.

Antivirus protection is a reactive solution that provides a ‘fix’ once a virus has already infected your PC, whereas Internet Security on the other hand is a pro-active solution, providing a host of protection in addition to neutralising a virus that has infected the PC.

Viruses can access your PC through a variety of methods including e-mail, Internet connections or through other media devices such as flash drives.

Antivirus Protection

Anti-Virus solutions can be explained as the antibiotics taken to cure a cold. If selecting an Anti-Virus solution, choose one that features a link directly from the PC to the vendor’s antivirus server therefore scanning for new viruses in real time.

Internet Security Protection

Internet Security can be regarded as the preventative measure such as a vitamin B12 complex injection to boost your immune system to help prevent the cold. This can be considered a far better solution to Anti-Virus protection as it actively scans websites for specific threats and identifies characteristics of new viruses in the event that a signature file has not yet been developed to combat the new threat.

An effective Internet Security solution should contain features such as:

  • Identity protection to protect you from unsafe and scam websites operated by cybercriminals who may attempt to steal confidential information, this is known as “phishing”. Internet Security protection will warn you whilst you are surfing the internet and automatically block unsafe sites.
  • Remembering and automatically entering names and passwords. This will ultimately help speed up log-ins and prevent cybercriminals eavesdropping or attempting to spy or steal information when using wireless networks.
  • A popular feature – Parental Control Management, assists parents to track what websites their children visit, block access to any inappropriate ones, help keep an eye on social networking activities and who they are chatting with online. These measures will keep your child safe from online dangers.
  • Anti-Spam functionality is another key component within Internet Security. Spam is unsolicited email and usually takes form in a bulk email. Anti-Spam software blocks these unsolicited emails before they enter your inbox. By searching for keywords, checking the source and how many recipients received the email.
  • All Internet Security solutions should include a Firewall. A Firewall is a ‘filter’ between the PC and the internet. It usually blocks the incoming traffic and analyses both incoming and outgoing traffic for any hidden viruses.

The Solution

It is common for PC users to question whether they can install both an Anti-Virus and Internet Security solutions from different brands onto their PC however with the exception of a few South African brands it is generally not advised, as both solutions will consider the other to be a virus and result in ‘conflict’ and slow downs.

It is advised to purchase a product that covers all important features stated above. Below are 3 options to explore.

All in one protection: Panda Security’s Panda Global Protection 2012 is a solution which combines both Anti-Virus and Internet Security features, giving all PC users the ultimate protection against viruses, spyware, rootkits, hackers, online fraud, identity theft and all other internet-borne threats.

Essential protection: Panda Antivirus Pro 2012 newly improved antivirus solution offering ease of use and intuitive protections for all computers. Panda Security has further differentiated itself from traditional antivirus solutions by offering a personal firewall for maximum protection.

Protect your family: Panda Internet Security 2012 is a security suite that allows you to use the Internet for anything, like shopping and banking online, with total peace of mind and without any interruption. In addition, keeps your inbox spam-free, and allows your children to browse the web safely with the Parental Control.

Top 10 Internet Security Threats and Trends for 2011

–      “Hacktivism” and cyber war: making the headlines in 2011

–      The growth rate of new malware is set to slow down

–      Social engineering and the use of social media to spread encrypted malware

–      More malware for Mac and for 64-bit systems, as well as zero-day exploits

Global IT vendor Panda Security has forecast that there will be few radical innovations in cyber-crime during 2011. “Hacktivism” and cyber-war; more profit-oriented malware, social media, social engineering and malicious codes with the ability to adapt to avoid detection will be the main protagonists in 2011. There will also be an increase in the threats to Mac users, new efforts to attack 64-bit systems and new zero-day exploits.

Luis Corrons, Technical Director of PandaLabs explains: “Once again we have dusted off the crystal ball and this is a summary of what we reckon will be the ten major security trends during 2011”:

  1. Malware creation. Panda has seen a significant growth in the amount of malware in 2010, a constant theme over the last few years. This year, more than 20 million new strains have been created, more than in 2009. At present, Panda’s Collective Intelligence database stores a total of over 60 million classified threats. The actual rate of growth year-on-year however, appears to have peaked: some years ago it was over 100%. In 2010 it was 50%. We will have to wait and see what happens in 2011.
  2. Cyber war. Stuxnet and the Wikileaks cables suggesting the involvement of the Chinese government in the cyber-attacks on Google and other targets have marked a turning point in the history of these conflicts. In cyber-wars, as with other real-world conflicts today, there are no ranks of uniformed troops making it easy to distinguish between one side and another. This is like guerrilla warfare, where it is impossible to discern who is launching the attack or from where. The only thing it is possible to ascertain is the objective. Attacks such as these, albeit more or less sophisticated, are still ongoing, and will no doubt increase during 2011, although many of them will go unnoticed by the general public.
  3. Cyber-protests. Undoubtedly the major new issue in 2010. Cyber-protests, or hacktivism, are all the rage. This new movement was initiated by the Anonymous group and Operation Payback, targeting firstly organizations trying to close the net on Internet piracy, and later in support of Julian Assange, editor-in-chief of Wikileaks. Even users with limited technical know-how can join in the distributed denial of service attacks (DDoS) or spam campaigns. Despite hasty attempts in many countries to pass legislation to counter this type of activity, effectively by criminalizing it, we believe that in 2011 there will be yet more cyber-protests, organized by this group or others that will begin to emerge.
  4. Social engineering. Panda has seen the continued use of social engineering to infect unwary users. In particular, cyber-criminals have found social media sites to be their perfect working environment, as users are even more trusting than with other types of tools, such as email. Throughout 2010 Panda has witnessed various attacks that have used the two most popular social networks – Facebook and Twitter- as a launch pad. In 2011 we fully expect that not only will hackers continue to use these media, but that they will also be used more for distributed attacks. Moreover, BlackHat SEO attacks (indexing and positioning of fake websites in search engines) will also be widely employed throughout 2011, as always, taking advantage of hot topics to reach as many users as possible.
  5. Windows 7 influencing malware development. As we mentioned last year, it will take at least two years before we start to see the proliferation of threats designed specifically for Windows 7. In 2010 we have begun to see a shift in this direction, and we imagine that in 2011 we will continue to see new cases of malware targeting users of this new operating system.
  6. Cell phones. The eternal question: When will malware for cell phones really take off? It would seem that in 2011 there will be new attacks, but still not on a massive scale. Most of the existing threats target devices with Symbian, an operating system which is now on the wane. Of the emerging systems, Panda predicts that the number of threats for Android will increase considerably throughout the year, becoming the number one target for cyber-crooks.
  7. Tablets? The overwhelming dominance of iPad in this terrain will start to be challenged by new competitors entering the market. Nevertheless, save the odd proof-of-concept or experimental attack, we don’t believe that tablet PCs will become a major consideration for the criminal fraternity in 2007.
  8. Mac. Malware for Mac exists, and will continue to exist. And as the market share continues to grow, so the number of threats will grow accordingly. The biggest concern is the number of security holes affecting the Apple operating system. Let’s hope they get ‘patching’ as soon as possible, as hackers are well aware of the possibilities that such vulnerabilities offer for propagating malware.
  9. HTML5. What could come to replace Flash, HTML5, is the perfect target for many types of criminals. The fact it can be run by browsers without any plug-ins makes it even more attractive to find a security hole that can be exploited to attack users regardless of which browser they use. We will see the first attacks in the coming months.
  10. Highly dynamic and encrypted threats. This is something we have already seen over the last two years, and we fully expect this to increase in 2011. There is nothing new about profit-motivated malware, the use of social engineering or silent threats designed to operate without victims realizing. Yet in our anti-malware laboratory we are receiving more and more encrypted, stealth threats designed to connect to a server and update themselves before security companies can detect them. There are also more threats that target specific users, particularly companies, as information stolen from businesses will fetch a higher price on the black market.

“The overall picture is not improving” says Jeremy Matthews, head of Panda’s sub-Saharan operations. “It is true that in 2010 we have seen several major arrests that have hit hard in the world of cyber-crime. Yet this is sadly insufficient when we consider the scale of what we are fighting against. Profits from this black market amount to thousands of millions of dollars, and many criminals operate with impunity thanks to the anonymity of the Internet and numerous legal loopholes”, he concludes.

For more information about Panda, visit http://www.pandasecurity.com/.

Follow us on Twitter: PandaSecurityZA and Facebook: Panda Security South Africa

European media acclaims Panda Security 2009 consumer products

European magazines PC Today and Byte, have awarded their Recommended Product seals to Panda Internet Security 2009 and Panda Global Protection 2009 respectively

Similarly, TCN magazine has awarded five stars to Panda Global Protection 2009

All three publications underline the enormous malware detection capacity of the products thanks to in-the-cloud detection

European IT publications PC Today and Byte have awarded their Recommended Product seals to Panda Internet Security 2009 and Panda Global Protection 2009 respectively. Panda Global Protection 2009 has also been awarded five stars in an analysis carried out by TCN magazine. All three magazines highlighted the enormous malware detection capacity achieved thanks to collective intelligence – Panda’s unique model of security “from the cloud”.

PC Today, one of Spain’s leading IT magazines, published a comparative review of 12 security suites which included Kaspersky Internet Security 2009, McAfee Internet Security 2009, Norton Internet Security 2009 and AVG Internet Security 8.0. Panda Internet Security 2009 was awarded the magazine’s Recommended Product seal of approval, as it was the most effective in detecting new malware.

“Not only does it include a series of extra functions, such as system optimization utilities, a tool for making backup files and control over unauthorized WIFI connections, but the Panda Internet Security Suite scan engine itself is truly powerful,” enthused the magazine, adding: “Its malware detection levels rated really high against all the malware families tested”.

The protection from the cloud, included in all Panda Security 2009 products, was also praised by Byte which awarded its recommended product seal to Panda Global Protection 2009.

“With more malware in circulation at all levels, protection systems must evolve and become more complex to face up to the new threats. Panda’s proposal to improve protection and reduce resource consumption in PCs is based on an improved TruPrevent system, and the use of Collective Intelligence over the Internet”, explains the magazine, adding:  “This approach [Collective Intelligence] offers the advantage that it consumes less resources on each computer. The use of Collective Intelligence to detect spam allows a significant improvement with respect both to the junk mail detected and false positives.”

Byte also drew attention to the simplicity of installing and handling Panda Security products: “The 2009 product line offers a new interface which is simpler, clearer and more direct for controlling the product and adjusting settings with just a single click. There is no complex navigation through complicated levels to reach the options you want”.

TCN magazine also underlined the tremendous detection capacity of the Panda Security products: “The anti-malware engine detects and eliminates all types of viruses, worms, Trojans, rootkits bots, etc. The product also monitors instant messaging application traffic, and protects wireless networks thanks to its ‘WiFi monitor’. Panda Global Protection 2009 stands out for the efficiency of its antivirus engine, designed to block and control Internet-borne attacks”.

For more information about Panda Security products and free trials click here.