" security "

Retail-blog-image

Panda’s 2016 Consumer Solutions Designed for Multiple Devices

Our 2016 solutions are now available in South Africa. Panda Global Protection 2016, Panda Internet Security 2016, Panda Antivirus Pro 2016, Panda Mobile Security 2016, Panda Antivirus for Mac 2016 and Panda Free Antivirus 2016.  

The 2016 range is designed to make the digital world easier and more secure for consumers. It enables users to browse online safely, protects families against inappropriate content and keeps identities and confidential information safe.  The new products offer multi-platform protection – providing security on Windows (including Windows 10 compatibility), Android, Mac and even anti-theft for iPhone and iPad.

Every user may have a different need or use for connectivity and we try to cater for each of these by offering various solutions at different levels. We want users to be able to perform any activity on the internet without worrying about cyber-criminals, malware or inappropriate content.

(more…)

Ransomware

Human Resource Departments a Target for Ransomware

Physically presenting your CV for a prospective job offer is fast becoming obsolete. The digital world has simplified correspondence between people by electronic or digital means. Applicants are able to send their CV’s to companies via email attachments.

In recent attacks cyber-criminals send malicious data disguised as CV’s, upon opening the attachment, the malware installs itself on the victim’s computer. It then encrypts the data on the PC/Network and requests a ransom in-turn for the decryption code. This type of attack is known as ransomware.

(more…)

panda-number-1

Panda Security Achieving Top Results

Panda Security achieved the highest protection ratios in the Real World-Protection Tests conducted by AV- Comparatives in March, April, May and June 2015. This test evaluates the real-life protection capabilities of antivirus software.

Panda Security’s antivirus solution,  detected and blocked 99.9% of all threats. In simple terms, the test framework replicates the scenario of an everyday user in an everyday online environment, testing antivirus software products against malicious Internet downloads or exploits designed to infect computers automatically by taking advantage of system vulnerabilities. The study, which analysed more than 20 antivirus solutions, reinforce the great protection capabilities of Panda Security’s product.

(more…)

holiday-bg

10 Tips to Stop Cyber-Criminals from Ruining Your Holiday

Often when we go on holiday we jeopardise our own personal information, either by using credit cards in foreign countries, announcing our travels on social media or using open networks while travelling. Below are 10 tips on how to be more cautious when on holiday.

1  Don’t shout it from the rooftops

Don’t broadcast your upcoming holiday on social media. And if you do, then don’t reveal too many details about your plans. This information could be useful for someone with a sinister motive and could leave your home and valuables exposed.

Make sure you deactivate your GPS. This way you don’t have to worry about it giving away clues of your whereabouts which might avert criminals to the fact that you’re out of town.

2  Back-up all your devices

If you have decided  to take your laptop, tablet or smartphone with you on holiday – don’t forget to make back-ups of the data and store it in a secure place.
(more…)

Employees-Only-sign.

45% of Ex-Employees Continue to Have Access to Confidential Corporate Data

It is essential for companies to take steps in order to maintain their security, especially when changes occur within the company’s staff.

Employees looking for a change of scene, suppliers who do not pay on time or companies that go out of business – there are numerous reasons as to why business relationships may come to an end and companies should control what information is retained by those who are leaving and obtained by those who are entering.

It seems that many companies don’t pay much attention to this matter. There are few organisations that take the necessary precautions to prevent ex-employees from keeping information that belongs to the company. According to a study carried out by Osterman Research, 89% of the ex-employees keep the login and the password which gave them access to at least one of their former company’s services.

(more…)

Q1-2015-Results

PandaLab’s Results for the First Quarter of 2015

PandaLabs published its Quarterly Report for Q1, analysing the IT security events and incidents from January through March 2015. The anti-malware laboratory detected over 225 000 new malware strains per day in the first quarter of the year, with peaks reaching 500 000This record-breaking figure represents a 40% increase over Q1 2014 and is well above the average for the entire year, which stood at approximately 205 000 new malware samples per day. Most of these specimens were variants of known malware, conveniently modified by virus writers to evade detection by antivirus laboratories. Trojans continued to be the most common threat type, representing 72.75% of all new malware and the main source of infections  at 76.05% of the total.

The first months of the year were dominated by ransomware attacks – especially CryptoLocker. Ransomware has become cyber-criminals’ preferred method to make money from companies’ stolen information. Ten companies in the oil and gas maritime transportation sector,  fell victim to this type of attack, as revealed by Panda Security in a report on a hacking campaign dubbed Operation Oil Tanker: The Phantom Menace which targeted oil tankers.

(more…)