Kaspersky Lab today released a findings from the 2016 Kaspersky Lab Corporate IT Security Risks survey, which found that Distributed Denial of Service (DDoS) attacks are sometimes used by cybercriminals to distract businesses while hackers sneak in through the back door.
Category Archives: Antivirus Vendors
Antivirus Vendors
Michigan State University experiences data breach
Michigan State University has experienced a data breach, which it said took place on November 13th.
The post Michigan State University experiences data breach appeared first on WeLiveSecurity.
![]()
3 million Android phones vulnerable due to pre-installed rootkit

Security researchers at BitSight (AnubisNetworks) have found a backdoor that affects 3 million budget Android devices. The backdoor makes the phones vulnerable to a Man-in-the-Middle (MITM) attack and could allow attackers to remotely execute commands to take complete control of a device.
![]()
Be careful not to keep your invoices where your competitors can find them

One of the most common and most sensitive documents that companies handle on a daily basis is invoices. Issuing and receiving them is a fundamental activity for every business, however, people are not always aware of how important they are even after being paid or collected.
Together or individually, they can expose critical information that can be very valuable to your competitors, such as customer lists, product and service descriptions, prices and promotions, or details of key agreements.
However, these files are so common in organizations that they are often treated carelessly or with a complete disregard for security by employees, to the point of being sent via email in unencrypted formats, through instant messaging applications, stored in virtual stores more or less accessible to the public, in physical devices such as pen drives, etc. In fact, it’s quite easy to overlook the importance of the information they can provide to a third party.
Invoices are so common that they are often treated carelessly.
Just do a couple of searches on Google and you’ll realize the extent of the problem. Search for such simple, obvious terms as ‘invoice euros vat inc address tax number date total’ with a filter to show only PDF files, and you’ll find an endless number of sensitive documents that are accessible to the public without companies knowing.
Companies in the textile sector, integrated service companies, travel agencies, etc. The list is too long, especially if you consider how easy it is to protect invoices if you take the appropriate precautions.
First, these and other critical files should never be stored on Internet-facing servers. However, as this can be difficult in the day-to-day reality of the majority of companies, at least it should be checked that those servers are not accessible to the public in such evident places as Google.
In reality, the presence of these and other confidential files in the popular search engine is almost always due to the wrong configuration of corporate servers, or to the fact that these include directories that can be easily crawled by Google’s bots.
Being aware of this and taking the necessary steps to prevent it is one of those simple, effective protection measures that companies often forget about. However, it is very important to understand that invoices contain far more valuable information than may seem apparent at first glance.
The post Be careful not to keep your invoices where your competitors can find them appeared first on Panda Security Mediacenter.
The odd, 8-year legacy of the Conficker worm
The Conficker worm was huge news when it emerged towards the end of 2008, exploiting millions of Windows devices. Today, it remains one of the most pervasive malware families around the globe.
The post The odd, 8-year legacy of the Conficker worm appeared first on WeLiveSecurity.
![]()
Black Friday and Cyber Monday: how to shop online safely.
How to safely shop online?
It’s not a secret about 70% of the adult US population shops online regularly. With Black Friday and Cyber Monday right around the corner tens of millions of people are preparing to get a bang for their buck. The deals are usually so good even people sceptical about online shopping, and without much experience, may feel tempted to participate in the online frenzy. Last year consumers spent more than $3 billion on Cyber Monday alone. The previous record was in 2015 when they spent “only” $2.75 billion.
Our economy seems stable right now, with that in mind we are pretty sure the deal-hungry buyers will beat last years’ numbers. There is nothing wrong with taking advantage of the great deals, as long as you do it safely. Panda Security has been combating cybercrime for more than 25 years and we can surely tell you a thing or two about how to safely shop online around the holidays.
Top 10 tips of how to safely shop online
Beware of phishing
With Thanksgiving just around the corner, you will begin receiving tons of email newsletters offering you great deals. We do not advise you click on the ones you are not familiar with. Try to stick to the ones you know, and if you don’t know the company that is approaching you, research them online before opening the emails you’ve received from them.
Do research
We know that the deals around Thanksgiving are amazing but sometimes when something is too good to be true, it’s either fraudulent or a scam. Don’t be fooled by the Cyber Monday label, products still cost what they cost if the deal is too good to be true that’s probably because it’s not true. If you are in doubt, simply google the product and see if anyone else offers it for the same price. You may end up getting an even better deal!
Don’t be scared to buy from the ‘usual suspects’
Try to do your online shopping from websites and online retailers that you recognize and you have shopped from before. You shouldn’t worry much if you place an order with a well-known supplies superstore such as Home Depot for example.
Check the URLs
While you surf online you may get so excited by the good deals you’ve found that you may end up on a spoof website. If you are in doubt, check the URL link. If it feels awkward close the browser, open a search engine, type the name of the retailer you are trying to reach and place the order through the real website. Better safe than sorry!
Read the file product description as well as the terms and conditions
Sometimes it may seem as if you are buying a brand new device but you may end up getting a refurbished or reconditioned one. The fact that the deal is great, does not mean that the product will be great too. Always take your time to review the terms and conditions, warranty, insurance options, the return policy and the location of the product you are trying to purchase.
Do not use the debit card for your checking account
It may be tempting to pay directly from your checking account but checking accounts have less protection and it will be much harder for you to get your money back if you end up scammed by a phony website. Even if you have the money available in your checking account, better not share your debit card details with the world unless absolutely necessary. Put those expenses on your credit card statement instead!
Verify your order
It is not uncommon for consumer to select more than one item by mistake, or they put the wrong house number, or they check a shipping option that does not work for their needs. This is why we advise you to always double check the order before you make a payment. A few extra seconds won’t waste your day. You don’t want to buy a Christmas gift a week before Christmas to later find out that it ships from China in 3 weeks’ time.
Make sure the site is safe
Don’t buy anything online from a site that does not have SSL encryption. You will know if a site has SSL encryption if the URL starts with HTTPS:// (instead of just HTTP://).
Use antivirus software
It may sound trivial when you hear it from us, but staying protected is really important. Don’t wait until Thanksgiving to get protection. We’ve been combating cybercrime for nearly 3 decades, we can help you and your family stay safe around the holidays.
Use common sense
Last but not least, if you see a website that looks suspicious, just don’t order from there. There’s plenty of fish in the sea – you will find the same offer somewhere else. There is nothing wrong with calling the company directly during business hours to check their legitimacy. Remain vigilant, don’t just give away your hard earned cash!
Every year we spend billions of dollars around Thanksgiving and hackers are preying on us trying to get our card details, trying to steal our identity and personal information. Don’t let them ruin your holiday by simply following the suggestions listed above.
Happy shopping!
The post Black Friday and Cyber Monday: how to shop online safely. appeared first on Panda Security Mediacenter.
Employees Are One of the Biggest Cyberthreats to Businesses in North America
Kaspersky Lab today released a report, Business Perception of IT Security: In the Face of an Inevitable Compromise, revealing the current state of security threats among businesses and how their perception of threats compares to the reality of cybersecurity incidents experienced over the past year, both in North America and worldwide.
Three mobile network experiences data breach
UK mobile company Three has fallen victim to a major data breach, with up to six million customers reported to have been affected.
The post Three mobile network experiences data breach appeared first on WeLiveSecurity.
![]()
Camera drones: A flying spy is peeping into your window

Drones have conquered the world: they are used to hunt down tax evaders and illegal hunters, help suppress wildfires, find victims after natural disasters… They even serve as flying cameras to assist in filming movies and for aerial photography.
Online retail giant Amazon, for example, is planning on using drones for commercial delivery in order to fly purchases right to customers’ front doors. Despite being originally developed for military purposes, drones are slowly finding their place into our everyday lives. However, just as with every other technology, these unmanned aerial vehicles can pose a serious threat if they fall into the wrong hands.
Among other things, drones can be used as highly effective spies. Their ability to get close to almost any place where confidential data is stored (for example, an office) without being seen, makes them the perfect spy. Not only because of their ability to carry cameras and capture images through windows, but also because they can make the perfect weapon to carry out sophisticated cyber-attacks.
Drones can be used by cyber-criminals to easily get their malicious tools close to their target without having to overcome the physical barriers that the potential victim may have in place (security guards, access control systems, biometric sensors, surveillance cameras, etc.).
A drone could hide, for example, a jammer, a malicious hotspot, a device to launch attacks via Bluetooth or NFC, etc. The number of ways in which these aerial devices can be used to spy on victims and steal confidential information is almost endless.
Such is the risk that there are countries such as Sweden that have ruled that camera drones qualify as surveillance cameras, banning their use unless the drone operator has the necessary permit.
However, a cyber-criminal that wanted to use a drone to carry out an attack would still have another option: to take control of someone else’s device. Unfortunately, many of today’s models have vulnerabilities that could allow a remote attacker to take control of them.
Drone manufacturers have the responsibility to increase the security of their aircrafts to mitigate the security and privacy concerns raised by them. As this technology becomes ever more present in our lives, it is clear that the notion of safety and security in IT systems cannot be limited to computers and smartphones, but should also reach other high-flying devices. In this respect, having the cyber-security protection that best adapts to your needs is absolutely essential.
The post Camera drones: A flying spy is peeping into your window appeared first on Panda Security Mediacenter.
5 Tips to make your Cell phone battery last longer.
5 tips to maintain your cell phone battery without compromising experience
When cell phones appeared on the market they were meant to be used for talk and text. However, things have changed and cellular operators no longer stress about the amount of minutes or texts you are using, but for the amount of data you burn through. That’s because people don’t make that many calls anymore – these days your cell phone is being used as a small pocket computer that allows you to connect with your friends and business partners, be up to speed with what is happening around the world and of course entertain yourself by watching videos and playing games.
The devices are no longer about you being able to call someone; it’s about you being connected to the world on a variety of platforms. What makes cell phones such an important tool? Well, they are mobile. It is as simple as that! You can use them almost anywhere and take them with you everywhere. There’s an app for almost anything that keeps to mind. Now while mobility can be an advantage in many ways it can also be perceived as a disadvantage.
With great power comes great responsibility
cell phones are powered by a battery and this battery can often let us down. The laws of the modern world say: Your cell phone battery will most probably die on you the moment you need it most. It is said that should Apple manufacture a car, it will most likely run out of juice every day at about 4pm, just as you’re trying to go home from work. We are so dependent upon cell phones we can no longer execute simple everyday tasks without them. There are reported cases of people unable to get home as their phones have stopped working. How do you get home without the GPS on your device? Let’s admit it – we have become so used to having that cell phone in our pocket we cannot function without it.
Top 5 things you can do to improve your battery life
Always carry a charging cable with you
Phones tend to die in the most unexpected moments so we recommend that you always have a portable power station with you, or at least a cable that will allow you to charge your phone in case of need. Just look at Starbucks as an example. They know people want their devices charged up so they installed wireless chargers at their coffee stores to attract more customers. While this can be the case in some stores, in 9 out of 10 cases, stores that don’t have wireless chargers will be happy to get your phone charged a bit behind the counter while you shop.
Now might be the time to get a portable power station
There are many options on the market that allow you to have your phone charged while on the go. Have you seen all of these people with phones connected with a cable to something in their backpack or purse? They are Pokémon hunters who want to ‘catch’em all’. You cannot catch all the Pokémon if you don’t have a portable charger – your phone won’t make it without a recharge. While this is a common practice amongst Pokémon hunters, regular people take advantage of it just as much. Having a juice pack is a must in this busy world.
Keep a car charger in your car
Just go out there and get yourself a car charger. You will never run out of battery if your phone is charging while you are commuting. Unless you live in New York, here in the USA most people travel to and from work for at least 30 minutes a day. Some phones such as Motorola Droid 2 or Google Pixel allow you to use your phone for up to 8 hours with only 15 minutes charge. This is incredible, take advantage of the fast charging options available for your mobile device.
Consider getting a phone with interchangeable battery
We know in 2016 these are rarity but you can always find a smartphone that allows you to change its battery. Having a bad battery life should not mean you have to buy a brand new device or spend tons of money on external chargers, this means you may just have to replace your battery. Phones such as the latest LG V20 allow you to do exactly that.
Take a look at your phone’s settings
Sometimes the solution is not to constantly charge up your phone. It is more about finding out what drains it and eliminating it. All smartphones have the capability of monitoring battery usage and determining what causes the short or inconsistent battery life of your device. If you see an app that uses up the majority of your battery but you barely use, just delete it – it clogs up your phone’s memory and drains your battery. You don’t need this kind of negativity in your life. Many times apps have background processes that use not only your battery life but your data – always keep an eye on the ‘Settings > Battery’ section of your mobile device.
The post 5 Tips to make your Cell phone battery last longer. appeared first on Panda Security Mediacenter.
