" panda security "

art-blog

ART – Panda’s Intelligent Control Platform

In the complex world of IT security, real-time information is fundamental to protect corporate data and resources. Most enterprises are aware that if they do not have complete visibility of their network, it is easy to fall victim to cyber-attacks.

Although a large focus has been placed on external threats such as Ransomware, businesses are also at risk from internal threats. (more…)

Aerial shot of a group of coworkers discussing notes at a meeting

Improved Efficiency and Centralised Management with new Systems Management

In today’s digital world internet connected devices have become a part of every aspect of our lives, and as this digital transformation continues, it is imperative that businesses understand the complexities that come with it.

To address this situation, Panda Security present our latest version of Systems Management – the most powerful, scalable and easy-to-use Remote Monitoring and Management (RMM) tool on the market.
(more…)

Group of young creative people having a meeting in the office. Women are working on laptop while two men are talking to each other. The view is through the glass.

1/5 Businesses Infected by Malware through Social Media

We have all started to move to digital, and it’s making our lives simpler and easier. Or is it?

(more…)

Panda Blog R

Block-y Locky Ransomware with Panda Security

Last week a new strain of ransomware came to the fore, dubbed Locky because of the way it renames the file extension. Locky targets users via email attachments, which is often an invoice in a Microsoft Word document. Once the recipient downloads the file, if Office macros are enabled the malicious macro gets to work encrypting the user’s files. If macros are not enabled, the Word document will display a message prompting the user to enable macros in order to read the invoice.
(more…)

Drones

How a drone can hack into your home network just by flying over it

Drones can be used to record incredible scenes for movies, follow thieves from above, save lives or carry out home deliveries at lightning speed. Unfortunately, this also opens doors for people to misuse them for malicious gain.

Researchers in Singapore have demonstrated how attackers using a drone with a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organisations determine if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by  spies for corporate espionage.

To demonstrate that this threat is real and exists, the investigators paired a drone with a smartphone and developed two apps that were designed to intercept the communications of a printer from the outside.

(more…)

Panda-for-Mac

Panda Antivirus for Mac – Compatible with El Capitan

September 30th saw the launch of El Capitan, Apple’s new operating system for their Mac range. The good news is, Panda Antivirus for Mac is compatible with El Capitan!

os_x_el_capitan-t2

Advantages of Panda Antivirus for Mac

  • Blocks both malware for Mac OS X and malware for Windows.
  • It scans both files and emails.
  • It quarantines infected files.
  • It offers two kinds of scans: a real-time scan that continuously analyses Mac files, and another that performs monthly, on-demand scans.
  • You can even scan iPhones, iPads and iPod touch for malware.

Remember that Apple and its devices aren’t invincible. To avoid any unpleasant surprises such as XcodeGhost, you should consistantly update the operating system, download apps from the official store and use security software.

Learn more about about Panda Antivirus for Mac.