" protection "

pack-shot-blog

Next-Level Protection for Home-Users

Most of us have some understanding of the threats and risks we face living our lives constantly connected to the internet. We know that we should avoid emails and attachments from unknown senders, and not to click on internet ads. We know that we should update our passwords often and back up our personal devices.

In reality, however, we don’t always get it right. So how can you ensure your family is safe from cyber threats?
(more…)

PPS  -Blog

The future of antivirus is pay-as-you-use.

Everyday cyber criminals are creating an increasing number of new malware samples with the aim of gaining access to our private business and personal data. Digitisation has meant that more and more people are using multiple devices to access the internet at home and at work. Gone are the days of having one family PC, we now see adults and children alike accessing the web from a number of devices in one household. (more…)

Untitled-1

Keeping tabs on your employees in a multi-device environment

The traditional desktop computer is no longer the only device we use to get work done. For the past few years workers have increasingly begun to use their own smartphones and tablets for work. According to a study carried out by Tech Pro Research, 74% of businesses allow, or are planning to allow, their employees to bring their own devices to the office.

Despite the benefits, such as being able to communicate easily with employees when they aren’t at their workstations, security remains a priority and with the BYOD (Bring Your Own Device) culture – it is important to stay on top of it.

The variety of devices used in the workplace and the resulting loss of control held by the business, means that cybercriminals are able to take advantage of the many vulnerabilities in mobile devices to access the company’s network.

 

(more…)

adaptive

Panda Security Launches Adaptive Defense 360

With more than 230,000 new malware samples daily and more sophisticated infection techniques, businesses are facing increased threats that put their confidential information at risk and leave them in compromising situations. Adaptive Defense 360 is Panda’s latest solution that covers all that a traditional anti-virus can’t.

It combines two of Panda’s star solutions in one console:

  • Panda Endpoint Protection Plus is our EPP (Endpoint Protection Platform) solution and comes with all of the features of a traditional protection: anti-virus, anti-malware, personal firewall, web and mail filtering, and device management.
  • Panda Adaptive Defense, our EDR (Endpoint Protection & Response) solution, adds detection and automated response, continuous monitoring and real-time forensic analysis – which results in the complete strengthening and securing of the endpoint.

(more…)

new-malware

Ransomware on the Rise – PandaLabs Quarterly Report

The second quarter of 2015 shows that there was an average of 230 000 new malware samples created daily, totaling 21 million from April to June. This is a 43% increase in comparison to the second quarter of 2014.

Trojans continue to be the most common type of malware and are the main source of infection, with 76.25% of users infected. This quarter also showed the proliferation of PUPs (Potentially Unwanted Programs) which accounted for 14.39% of infections.

There has been a dramatic increase in ransomware over the last few months. What users don’t realise is that these kinds of attacks will continue to grow, as long as companies and consumers succumb to paying the ransom – this should be a last resort.

(more…)

pattern_unlock

New Android Ransomware Changes Lock Screen PIN

Dubbed Android/Lockerpin.A, the new trojan app tricks users into granting it device administrator privileges. To achieve this it mimics a patch installation window on top of an activation notice. When victims click on the continue button, they actually grant the malicious app rights that allow it to make changes to the Android settings. Lockerpin the sets or resets the PIN that unlocks the screen lock, effectively requiring users to perform a factory reset to regain control over the device. By contrast, earlier forms of Android ransomware generally were thwarted, usually by deactivating administrator privileges and then uninstalling the app after the infected device is booted into safe mode.

(more…)