" spyware "

Ransomware

Human Resource Departments a Target for Ransomware

Physically presenting your CV for a prospective job offer is fast becoming obsolete. The digital world has simplified correspondence between people by electronic or digital means. Applicants are able to send their CV’s to companies via email attachments.

In recent attacks cyber-criminals send malicious data disguised as CV’s, upon opening the attachment, the malware installs itself on the victim’s computer. It then encrypts the data on the PC/Network and requests a ransom in-turn for the decryption code. This type of attack is known as ransomware.

(more…)

holiday-bg

10 Tips to Stop Cyber-Criminals from Ruining Your Holiday

Often when we go on holiday we jeopardise our own personal information, either by using credit cards in foreign countries, announcing our travels on social media or using open networks while travelling. Below are 10 tips on how to be more cautious when on holiday.

1  Don’t shout it from the rooftops

Don’t broadcast your upcoming holiday on social media. And if you do, then don’t reveal too many details about your plans. This information could be useful for someone with a sinister motive and could leave your home and valuables exposed.

Make sure you deactivate your GPS. This way you don’t have to worry about it giving away clues of your whereabouts which might avert criminals to the fact that you’re out of town.

2  Back-up all your devices

If you have decided  to take your laptop, tablet or smartphone with you on holiday – don’t forget to make back-ups of the data and store it in a secure place.
(more…)

Types-of-Credit-Card-Fraud

5 Tips for More Secure Online Shopping

Over 100 000 stores worldwide use online credit card facilities as a method of payment. Cyber-criminals do not steal each individual’s details,  instead they  infect the most sensitive part of the system with malware, that is designed to collect payment data of the entire customer base. 

Far from wanting to make you fear shopping online, cases like this are used to point out the risks we face.

Below are some tips on how to avoid becoming the victim of a cyber-attack when using an e-commerce platform:

(more…)

Panda 25

Panda Celebrating 25 Years!

Panda Security has reason to celebrate. The multinational developer of security solutions designed to protect the digital lives of individuals and organizations alike is celebrating 25 years in the vanguard of IT security.

2015 saw the company  adopt a new corporate identity that reflects Panda’s commitment to simplify the complex, through the concept of ‘Simplexity’. This concept underpins the company’s effort to provide new and improved solutions to safeguard users’ digital lives.

 

(more…)

Q1-2015-Results

PandaLab’s Results for the First Quarter of 2015

PandaLabs published its Quarterly Report for Q1, analysing the IT security events and incidents from January through March 2015. The anti-malware laboratory detected over 225 000 new malware strains per day in the first quarter of the year, with peaks reaching 500 000This record-breaking figure represents a 40% increase over Q1 2014 and is well above the average for the entire year, which stood at approximately 205 000 new malware samples per day. Most of these specimens were variants of known malware, conveniently modified by virus writers to evade detection by antivirus laboratories. Trojans continued to be the most common threat type, representing 72.75% of all new malware and the main source of infections  at 76.05% of the total.

The first months of the year were dominated by ransomware attacks – especially CryptoLocker. Ransomware has become cyber-criminals’ preferred method to make money from companies’ stolen information. Ten companies in the oil and gas maritime transportation sector,  fell victim to this type of attack, as revealed by Panda Security in a report on a hacking campaign dubbed Operation Oil Tanker: The Phantom Menace which targeted oil tankers.

(more…)

Fusion-Cover-of-infographic

Panda Cloud Fusion Infographic

Panda Fusion is a cloud-based solution that meets all your needs. It is easy to deploy and scale, as it requires no maintenance or infrastructure investment. Available anytime, anywhere through a simple web browser.

Benefits of Panda Cloud Fusion

  • It offers maximum protection against malware and unknown threats.
  • It reduces costs through optimisation of your IT infrastructure.
  • It provides an optimal support experience, through proactive problem resolution and remote access to users’ devices that is non-disruptive, wherever they are.

See the infographic below for more:

(more…)