" virus "

Panda-for-Mac

Panda Antivirus for Mac – Compatible with El Capitan

September 30th saw the launch of El Capitan, Apple’s new operating system for their Mac range. The good news is, Panda Antivirus for Mac is compatible with El Capitan!

os_x_el_capitan-t2

Advantages of Panda Antivirus for Mac

  • Blocks both malware for Mac OS X and malware for Windows.
  • It scans both files and emails.
  • It quarantines infected files.
  • It offers two kinds of scans: a real-time scan that continuously analyses Mac files, and another that performs monthly, on-demand scans.
  • You can even scan iPhones, iPads and iPod touch for malware.

Remember that Apple and its devices aren’t invincible. To avoid any unpleasant surprises such as XcodeGhost, you should consistantly update the operating system, download apps from the official store and use security software.

Learn more about about Panda Antivirus for Mac.

Ransomware

Human Resource Departments a Target for Ransomware

Physically presenting your CV for a prospective job offer is fast becoming obsolete. The digital world has simplified correspondence between people by electronic or digital means. Applicants are able to send their CV’s to companies via email attachments.

In recent attacks cyber-criminals send malicious data disguised as CV’s, upon opening the attachment, the malware installs itself on the victim’s computer. It then encrypts the data on the PC/Network and requests a ransom in-turn for the decryption code. This type of attack is known as ransomware.

(more…)

Police-Virus

Cyber Police Virus Strikes Again

The Cyber Police Virus is malware that attacks Android devices. Designed by cyber criminals who focus primarily on phone markets to collect money from unwary users, using counterfeit fines and violations.  The virus locks users’ phones and displays a fake fine on the screen, demanding a fee be paid. Although this virus does not encrypt data, as with ransomware for PC’s, the message remains on the screen and the virus is somewhat difficult to remove.  This Trojan is targeting users from 31 different countries around the world; 23 of which are European countries and is one of many new malware samples attacking Android devices. This is just more evidence that mobile devices are no longer considered “safe” and that users can start looking at protection for all their devices.

 

(more…)

Fusion-Cover-of-infographic

Panda Cloud Fusion Infographic

Panda Fusion is a cloud-based solution that meets all your needs. It is easy to deploy and scale, as it requires no maintenance or infrastructure investment. Available anytime, anywhere through a simple web browser.

Benefits of Panda Cloud Fusion

  • It offers maximum protection against malware and unknown threats.
  • It reduces costs through optimisation of your IT infrastructure.
  • It provides an optimal support experience, through proactive problem resolution and remote access to users’ devices that is non-disruptive, wherever they are.

See the infographic below for more:

(more…)

girl-with-computer

10 Tips for Protecting Your Privacy

          1. Go on a diet and forget about cookies

These tools which have installed themselves in our virtual lives, gather data about our habits (searches and pages visited) which is often used to design custom advertising. You can avoid them by using browsers in ‘incognito’ or ‘private’ mode. Other options include regularly clearing your browsing history and cookies or accepting an opt-out cookie which blocks future cookies from being installed on your browser by a particular website or advertiser. It essentially lets you declare that you do not wish to participate in targeted ad delivery, profiling or otherwise have your web browsing tracked. An opt-out cookie will only block cookies from a particular server and is not a generic tool to block cookies from any site you visit. However, you can manage cookies via your browser settings.

         2. Use a virtual private network

A Virtual Private Network more commonly known as a VPN, allows you to browse the internet securely, even when you are connected to a public network. Although they are often associated with illegal activities, there is nothing bad about them. On the contrary, it is highly advisable to use them when you do not have a secure connection.

         3. It does not matter where you took that picture

Sharing the “selfie” you have just taken on social networks could reveal a lot of data about the device you used and where you are. Perhaps the phone model or camera specifications are not very important, but it is a good idea to change the settings so that the exact coordinates of your location do not appear. Here you have to disable the GPS settings on the mobile phone camera.

(more…)

CTB-Locker

The Latest on Ransomware: CTB – Locker

Ransomware is malware that limits access to data on devices and demands a ransom be paid to the developer. Some forms of ransomware encrypt files on the systems hard drive, while some simply lock the system and display messages intended to persuade the user into paying.

In the past week there have been several cases of ransomware called CTB-Locker also known as Critroni Ransom. Generally spread via e-mail as an attachment; CTB-locker is released from time to time with the most recent cases occurring 18/19/20 January 2015.

CTB locker is run by a user. The application encrypts common file-types such as Excel and Word documents and images files such as Jpegs. The user then receives a display message stating that the data has been encrypted and that they need to pay a ransom.

It is not likely that the encrypted files are recoverable, in some cases users may be able to use Volume Shadow Copy, but essentially the most effective means of “recovery” is to back-up data/files on a regular basis and restore the most recent back-up.

CTB Locker doesn´t always remove the volume shadow copy (VSS), so depending on the affected operating system, if it is Windows Vista or higher, it is possible to retrieve a copy of the files affected by malware.

In this case, it is necessary to follow the steps below:

  1. Download and install the following software: http://www.shadowexplorer.com/downloads.html
  1. Once installed, browse to the location where the affected files are located
  1. Select a date prior to the infection.
  1. Select the affected file or folder, and choose the option “Export”.

(more…)