Category Archives: Panda Security

Panda Security

Panda and Logtrust Stem Cyber-threats with Real-time Analytics

‘ART’ Automatically Pinpoints Attacks and Anomalies at Endpoints

Panda Security, the world’s leader in advanced cybersecurity solutions, and Logtrust, the real-time Big Data-in-Motion firm, announced the availability of the Advanced Reporting Tool (ART), as an optional module of Panda Security’s Adaptive Defense, which automatically generates Security and IT intelligence that allows organizations to pinpoint attacks, unusual behaviors, and detect internal misuse of systems and networks.

ART’s unique capabilities enable calculations, graphical visualization and alerts on data monitored, collected and correlated by Panda Adaptive Defense on companies’ endpoints. ART allows those companies to control the risks in the workplace and take security and resources management actions on end-points, including those associated with IoT networks and devices.

“Malware volume has grown exponentially, and the number of potentially vulnerable endpoints within an organization has proliferated, including data streams coming from IoT networks which may compose one of the most serious threats companies face,” said Pedro Castillo, CEO, Logtrust. “The combined capabilities of Panda and Logtrust allowed Panda to create a tool that applies real-time big data analytics to pinpoint attacks, unusual behaviors as well as detecting internal misuse of the corporate systems and network.”

Security Analytics that Border on Prescience

Panda Adaptive Defense represents a new security model that correlates data from multiple sources, bringing the capabilities of Big Data and machine learning to detect, analyze and prevent advanced threats. By partnering with Logtrust, Panda was able to leverage a cloud-based platform capable of both collecting a wide range of data and rapidly analyzing large volumes of data in machine real-time.

“Adaptive Defense, in combination with Advanced Reporting Tool (ART), is a leap forward in how companies approach cyber-security incidents, unusual behavior and resources misuse by both external factors and insiders, so it naturally requires tremendous speed and power to achieve its objectives,” said Iratxe Vazquez, Product Manager, Panda Security. “Logtrust’s Flat-Ultra-Low-Latency time-series data analytics platform, which processes over 150,000 events per second/per core, meets perfectly the performance and functionalities of our ART’s requirements.”

Additionally, Logtrust’s highly visual, customizable and intuitive interface affords the ability to:

  • Easily create and configure dashboards with key indicators and adaptive search options
  • Set default and custom alerts related to security incidents, risk situations, user access to critical information and application/network resource usage

A Penetrating, Holistic View of the Vulnerability Landscape

Panda Adaptive Defense relies on an innovative security model based on three principles: continuous monitoring of applications running on computers and servers, automatic classification using machine learning on Big Data platform in the cloud and security incidents experts analyze those applications that haven’t been classified automatically to be certain of the behavior of everything that is run on the company’s systems.

The massive amount of data, collected at endpoints and correlated in Panda Security’s Big Data platform is also cumulated at LogTrust Platform to provide security and IT managements insights, such as external and internal threats, diagnose critical vulnerabilities, and alert in real-time, so that businesses can immediately prevent or minimize Security and IT issues. Additional benefits of Advanced Reporting Tool (ART) Module working with Logtrust include the ability to:

  • Perform Forensic Analysis. Go back up to 12 months to correlate data from endpoints, identify the malware and pinpoint every place it has touched, and analyze the application’s vulnerabilities.
  • Completely Map All Vulnerabilities. Gain visibility into all machines, applications and elements running on any endpoint to assess vulnerability.
  • Monitoring and Policies. Monitor and control use of corporate resources to determine if it is normal and expected, or a matter that needs to be addressed.

About Panda Security

Founded in 1990, Panda Security is the world’s leading cloud-based security solutions company. Based in Spain, the company has a direct presence in over 80 countries, products translated into over 23 languages and more than 30 millions of users worldwide.

Throughout its history, Panda Security has established a series of innovative milestones that have been later adopted by the rest of the industry. In fact, Panda has been the first vendor to propose a new technological approach based on three strategic elements: Cloud Computing, Big Data and Behavioral Analysis. This brings a new security model that assures the complete classification of all active processes on the systems. By analyzing, categorizing and correlating all this data about cyber-threats, its platform can leverage contextual intelligence to reveal patterns of malicious behavior and initiate prevention, detection and remediation routines, to counter known and unknown threats. Assuring the maximum level of protection ever seen in the cybersecurity industry. Visit www.pandasecurity.com and www.pandasecurity.com/intelligence-platform/  for more information.

About Logtrust

Logtrust is a Real-Time Big Data-in-Motion platform offering Fast Data, Big Data analytics through a solution that enables real-time analytics for operations, fraud, security, marketing, IoT and other aspects of business. Recognized as a Gartner Cool Vendor 2016, Logtrust is intuitive, interactive, and collaborative, with no coding required, guided widgets, and out-of-the-box advanced interactive contextual dashboards. The platform provides a completely real-time experience, with new events always available for query and visualization, and pre-built queries always updated with the most recent events. The highly customizable solution works non-intrusively with your system, with agentless collectors and forwarders, platform remote APIs to check health, and all capabilities callable via REST APIs. Service is always on with cross-cloud region disaster recovery, and data is always hot and unmodified (to meet data reliability and integrity compliance requirements). Logtrust is located at the epicenter of Silicon Valley in Sunnyvale, CA, and further serves its global clients through offices in New York and Madrid. Visit www.logtrust.com for more information.

The post Panda and Logtrust Stem Cyber-threats with Real-time Analytics appeared first on Panda Security Mediacenter.

Hijacking and Theft: The Dangers of Virtual Reality for Businesses

virtual reality panda

Tech giants such as Google, Facebook, or Samsung are betting heavily on virtual reality. As such, this technology has all the hallmarks of something that may soon revolutionize our lives. It may also revolutionize a multitude of business sectors. Tourism (traveling without getting up from the couch), education (seeing history instead of learning the bare facts or visiting the inside of the human body for your anatomy lesson), entertainment (movies starring you), and much more.

However, it is still very much in the early stages of its development. We’re not hearing much about the cybersecurity risks that come along with it. We should be aware that virtual reality, as with any innovation, carries with it some new threats, as well as some old ones that can reinvent themselves in light of new technology.

Virtual Theft

Imagine you’re participating in a virtual reality contest that promises to give you the house of your dreams if you succeed in building it in 100 hours using Lego blocks. You toil away on your house to meet the requirements and in the end you succeed, at which point the organizers grant you the property of the living space that fascinates you so. However, there’s a cybercriminal on the prowl. He sneaks into the application’s servers and modifies the ownership of the property. Of course you’ve lost nothing physical, but you have lost valuable time. And the company behind the app has lost even more than that. At the very least, they’ve lost your trust, as well as that of the rest of their users.

Identity Theft

As worried as we are about the massive credential data breaches that companies increasingly suffer during cyberattacks, in the virtual world things may get worse. Intruders will be able to get their hands not only on usernames and passwords, but also on the user’s physical identity (the hyperrealist avatar generated after scanning their own body).

With all of their biometrics data in your possession, it may end up being easy to steal an actual person. Companies that safeguard such information may therefore face greater risks than those found in the age of credential theft.

Reality Modification

Attackers can figure out how to modify a given application’s code to manipulate (virtual) reality as they please. The number of scenarios is infinite. Accessing the virtual offices of a company that works remotely, modifying information to harm a business’s reputation, altering user experience… There’s a whole world of potential risks waiting to be discovered that will bring about new challenges for cybersecurity experts.

Headset Security

In much the same way that malware can affect computers and mobile devices, it can affect virtual reality headsets. Cybercriminals can attack these headsets with a diversity (and perversity) of intentions. Everything from a keylogger able to track user activity to a ransomware that blocks access to a specific virtual world until the user shells out a ransom may be implanted.

The post Hijacking and Theft: The Dangers of Virtual Reality for Businesses appeared first on Panda Security Mediacenter.

Don’t Let Yahoo Happen To You: How to Protect Your Business from Large-Scale Data Theft

yahoo-data-theft

In 2016, the theft of passwords from internet titans is no longer an exception. Just when it seemed like the year was winding down, having left us with the surprising news of what until yesterday was considered the highest magnitude cyberattack in history suffered by Yahoo and reported three months ago, this same company returns to headlines after announcing the theft of data from 1 billion accounts.

This comes on the tail of some revealing figures. For example, massive data breaches have, amazingly, affected 97% of the 1000 largest companies in the world.

After admitting last September that in 2014 they had suffered a large-scale theft that affected 500 million users, Yahoo revealed today that in 2013 it suffered what is now considered the worst incident of information piracy in history with the theft of 1 billion accounts.

There’s a strong resemblance between this attack and the ones we’ve been analyzing over the past months. These recent attacks showcase the way cybercriminals gain access to names, email addresses, phone numbers, dates of birth, passwords, and in some cases clients’ encrypted and unencrypted security questions. The dimensions of the incident are truly staggering.

Yahoo disclosed that “an unauthorized third party” accessed the data and that at this time the culprit remains unnamed.

Economic repercussions aside, these incidents also call into question the issue of deteriorating user confidence. For example, Verizon’s initiative to integrate Yahoo into the AOL platform will certainly come under scrutiny.

How Should You Keep Your Business Safe?

There’s a legitimate reason to fear for your business’s confidential information. An outsider capable of getting the key to your company’s data, as happened at Yahoo, is a latent risk. Prevention has become the greatest asset in combating Black Hats and avoiding some of the dire consequences of these attacks.

To that end, we encourage you to turn to the advanced cybersecurity solution best suited to your company’s needs. Our Adaptive Defense 360 can offer you:

visbilidad- adVisibility: Traceability and visibility of every action taken by running applications.

 

deteccion- adDetection: Constant monitoring of all running processes and real-time blocking of targeted and zero-day attacks, and other advanced threats designed to slip past traditional antivirus solutions.

 

respuesta- adResponse: Providing forensic information for in-depth analysis of every attempted attack as well as remediation tools.

 

prevencion- adPrevention: Preventing future attacks by blocking programs that do not behave as goodware and using advanced anti-exploit technologies.

 

This is the only advanced cybersecurity system that combines latest generation protection and the latest detection and remediation technology with the ability to classify 100% of running processes.

The post Don’t Let Yahoo Happen To You: How to Protect Your Business from Large-Scale Data Theft appeared first on Panda Security Mediacenter.

One billion and one reasons to change your password

After another Yahoo’s data breach find out why you need to strengthen your security

Dear 2016, we want you to please be over already! PLEASE!

In a statement released by Yahoo yesterday they confirmed that there’s been another data breach. According to the press release the leaked information is associated with more than one billion Yahoo user accounts. The incident is different than the one reported few months ago. However, initial examinations suggest both attacks have been performed by the same hackers. There are a few things we recommend you to do right away to avoid becoming a victim of cybercrime. Don’t delay it!

When did this happen?

Yahoo confirmed the incident happened August 2013. Not to be mistaken with the data breach reported on September 22nd earlier this year.

What information was stolen?

No one really knows for sure, however the stolen information may have included personal information such as names, email addresses, telephone numbers, dates of birth, passwords and, in some cases, encrypted or unencrypted security questions and answers.

How is this affecting Yahoo?

In terms of branding and resonance, it’s the latest security blow against the former number one Internet giant. This kind of news won’t help user confidence in the company that has been heavily criticized by leading senators for taking two years to disclose the September 2014 breach. To make matters worse, this new one is from 2013. Yahoo was down more than 2.5 percent in after-hours trading on the Nasdaq in New York.

The company once valued at $125bn will not be sold for more than $5bn to Verizon. The price may go even lower. What make things really bad for Yahoo is that according to BBC, Yahoo knew about the hack but decided to keep quiet… not a smart move.

The good news

Even though your personal information has been circling the dark web for more than 2 years, you may not be affected at all. We are talking about 1 billion accounts – this is a lot of data to process. However, if you don’t change your passwords regularly or if you tend to keep using the same answers on security questions, you may be in danger.

Troublemakers might be able to use the information to get your bank details or commit identity fraud. It’s vital to be self-conscious and protect yourself. And if you do, you don’t have anything to worry about.
Even though Yahoo are working closely with law enforcement and they are doing their best to protect your data, changing your password regularly and installing an antivirus software is a must.

The post One billion and one reasons to change your password appeared first on Panda Security Mediacenter.

Google to punish repeat offenders by marking their websites insecure

security warning google

 

Mountain View appears to be fully committed to web user security. In 2016, Google has already launched various initiatives to penalize poor website security practices (or, on the other hand, to reward users who follow their recommendations). Now they’ve proposed to clearly mark websites that not only pose a threat to web users, but are also repeat offenders.

In fact, both in Chrome (the company’s own browser) and in other browsers such as Firefox and Safari, the search engine will show a warning in front of websites that intentionally spread malware, as well as those that are, in reality, used as instruments of phishing.

This is actually something that Google does already. What’s new is that the company will begin to take decisive action against those who repeatedly attempt to skip over safety rules. Once a website is marked as dangerous, the admin can update the page to eliminate the infractions in question, at which point Google takes down the warning. If the search engine finds itself routinely notifying the admin to inspect the warning, in some cases their chance to have the warning removed will be rescinded for 30 days.

Specifically, the option to resolve these issues will be eliminated for websites that, after requesting a reappraisal, make a few changes to get up to code and then subsequently go back to carrying out practices that put users in danger. To combat these repeat offenders that modify their websites just for show, Google will crack down on them by keeping the warning message up for an entire month, with no possibility of turning over the ruling during this time.

This news is actually somewhat of a double-edged sword for companies. On the one hand, it’s undoubtedly beneficial that employees can know at a glance whether they are about to enter a website that could jeopardize the company’s security. But as the saying goes, all that glitters is not gold.

Google’s new measure cranks up the pressure on companies to make sure their corporate website does not pose a risk to users. Otherwise, the penalization issued by the good people at Mountain View could prove a real disaster for the business — beyond putting users at risk, it may end up scaring away future clients.

The post Google to punish repeat offenders by marking their websites insecure appeared first on Panda Security Mediacenter.

Top 10 Best Cyber Gifts for Christmas

pandasecurity-mc-gift

The Christmas countdown has officially begun! Surely you managed to grab a few bargains during the Black Friday sales last month but now it is time for another shopping spree. No matter how far in advance you get the gifts for your friends and family, there is always someone on that list who is difficult to shop for. The good news is that these days we have digital gifts too, so you don’t really need to go out in the cold. Should we mention that you save on Christmas wrapping too. You can send your gift via email.

Check out the top 10 cyber Christmas stocking fillers

1. Gift cards

It may not be the most personal stocking filler but this is a present that will never be returned to the store. The freedom you get with receiving a gift card is spectacular.

2. Donation for a good cause

It’s not a secret that sometimes your loved ones already own everything they really want. It is really hard to buy something classy without spending a huge amount of money. A donation towards a good cause may not be a bad idea – what you are gifting is hope for someone in need.

3. Skype credit

If you have friends and relatives living abroad it may be a good idea for you to buy them the opportunity to always be in touch with the rest of the family. Adding Skype credit to someone’s account is fast and easy. If you are on a tight budget $10 can go a long way with skype credit. It can buy your loved ones hours of conversations with your relatives and/or friends abroad.

4. Social media followers

This is probably number one present for all the attention seeking millennials. No matter how social media involved your loved ones are, they would always be happy to get an additional 10k followers on Instagram. Always make sure you have your protection on when buying social media followers. People operating this sort of service are sometimes in it for more than just your business.

5. GroupOn voucher

Wine tasting and horseback riding are not cyber gifts in particular, but the vouchers that you buy most certainly are as they get generated by e-commerce marketplaces such as GroupOn. Give your loved ones the gift of adventure.

6. Monthly magazine subscription

With so many platforms on the internet pretty much anyone is now able to create content. The fake news, according to some, influenced this year’s elections so we need to make sure that people are getting their information from reliable sources. You won’t break the bank if you get someone a yearly online subscription to a reputable publication.

7. Crypto currency

It may be the perfect way for you to introduce someone to cryptocurrencies such as Bitcoin, Litecoin, Peercoin etc. If you have a geeky friend, he or she would absolutely love the cryptocurrency gift even though it would be hard to put in a physical stocking.

8. Video game

Buying videogames does not necessarily mean buying a physical copy – digital ones are also available and are often cheaper or come with perks. Getting a game as a present for someone is not a bad idea at all.

9. Concert e-tickets

Follow these instructions – go to the person’s profile on FB, check out the bands he/she likes, get them the dreamed experience with their favourite music idol. Sometimes VIP ‘greet and meet’ is also available.

10. Protection

Last but not least, it is Panda Security’s latest software antivirus – Panda Protection’s subscription or discover Panda’s full security portfolio for more advanced solutions. Our product does not protect only your family but your identity and money. Doing online shopping without protection is equal to driving without car insurance. Save the hassle for your loved ones by giving them the gift of safety and security.

The post Top 10 Best Cyber Gifts for Christmas appeared first on Panda Security Mediacenter.

How does automatic renewal work for Panda’s homeusers

How to stay protected without having to renew your subscription

It seems like only yesterday when you installed your Panda Security antivirus protection, and all of a sudden… Oh no! You realize your antivirus protection is about to expire!

Already? How can it be?

It's time to renew your antivirus protection

Deep inside, you know this is something you have to do if you don’t want to find your computer locked by a nasty virus once again just when you are going to watch Narcos, but, really…

Why should you renew your antivirus subscription?

1. Because hackers have the bad habit of never ceasing to come up with new ways to hijack your identity, files or photos to try and steal your money. So it’s better to keep your computer and software always up to date

via GIPHY

2. Because with the Tuneup feature included in Panda Security’s new product lineup, you can say goodbye to seeing your devices slow down over time.

tune up your devices

3. Because the parental controls will help you keep your kids away from inappropriate Internet content.

renew antivirus

Plus, there is a simple way to stay protected without having to remind yourself of the need to renew your antivirus subscription. Isn’t it great? All you have to do is click a button the next time you renew your license.
Make sure you select the auto-renewal option when renewing. This way, whenever your subscription expires, it will be automatically renewed and you will remain protected one more year without having to lift a finger.

pandasecurity-automatic-antivirus-renewal-2-jpg

Plus…. The more you renew with Panda the better conditions you’ll get, as you’ll get bigger and bigger discounts with each renewal to reward your loyalty.

renew antivirus

Renueva mi protección ahora

The post How does automatic renewal work for Panda’s homeusers appeared first on Panda Security Mediacenter.

In 2017, less malware and more advanced attacks

pandalabs-predictions

The decline in new malware and the increased professionalization of attacks will set the tone in cybersecurity for next year, according to PandaLabs’ Cybersecurity  Predictions for 2017. Ransomware will encompass the majority of attacks, and companies will amass a larger number of increasingly advanced intrusions.

As far as cybersecurity goes, we bid farewell to a year replete with high-profile attacks that have jeopardized large corporations and private users. Ransomware attacks from Petya, Trojans such as Gugi for Android, the spyware Pegasus, PunkeyPOS, or large-scale attacks targeting point of sale terminals as well as the recent DDoS (Distributed Denial of Service) attacks have affected large organizations and international communication networks.

We rank the most popular attacks of the year, analyzing their evolution and taking a look at the cybernetic threats that 2017 has in store:

Cybercrime

Cybercriminals focus their efforts on those attacks which can rake in the most profit, using more effective tactics and professionalizing their operations in a way that allows them to make quick and easy money in an efficient manner.

Ransomware

This Trojan Horse will take center stage with regard to cybersecurity and will cannibalize other more traditional attacks that are based on data theft. The pursuit of profit is the primary motivation of cybercriminals, and ransomware is the simplest and most effective way to achieve this. Some things never change: victims of this hijacking malware will have to decide whether to pay, or not, to recover their data. Panda Security encourages victims to keep in mind that paying the ransom does not guarantee the total recovery of stolen data.

Companies

The number of attacks directed at corporations will increase, as these attacks become more and more advanced. Companies are already the prime target of cybercriminals, as their information is more valuable than that of private users.

Internet of Things (IoT)

The next cybersecurity nightmare. The technological revolution has ushered in the complete integration of smaller devices into the grid, which can be converted into entryways into corporate networks.

DDoS Attacks

The final months of 2016 witnessed the most powerful DDoS (Distributed Denial of Service) attacks in history. These attacks were carried out by bot networks that relied on thousands of affected IoT devices (IP cameras, routers, etc.). 2017 will see an increase in this kind of attack, which is typically used to blackmail companies or to harm their business (by blocking web access, online shopping, etc.).

Mobile Phones

Focusing on one single OS makes it easier for cybercriminals to fix a target with maximal dissemination and profitability. Android users will get the worst of it in the next 12 months.

Cyberwar

The precarious situation with regard to international relations can have huge — and serious — consequences in the field of cybersecurity. Governments will want access to still more information (at a time when encryption is becoming more popular), and intelligence agencies will become still more interested in obtaining information that could benefit industry in their countries. A global situation of this kind could hamper data sharing initiatives in the next year.

Download the Pandalab’s Predictions here:

Download

 

 

The post In 2017, less malware and more advanced attacks appeared first on Panda Security Mediacenter.

Panda Security and Altitude Partner to Secure Information in the Contact Center

partnership-panda

Panda Security, a leading advanced cybersecurity company, and Altitude, a global provider of omnichannel solutions that deliver great customer experiences, today announced a new strategic partnership. This partnership will combine Panda and Altitude expertise, solutions and services to maximize and optimize the prevention of data leakage in the contact center.

Recent research  shows a 29% increase in data breaches since 2013, with an average cost of $4 million per incident and an average cost of $158 per lost or stolen record. Other reports  point out that, for the first time, in 2015 security events traced to insiders have outranked security incidents by outsiders.

Innovative integrated monitoring and security platform for the contact center

The Panda Security and Altitude partnership will provide an integrated monitoring and security platform that relies on big data and analytics to detect and block outsider and insider threats in the contact center. Both companies will work together to deliver endpoint protection, detection and response, data leak prevention and user/entity behavior analytics.

“Contact Centers need to be more effective in preventing breaches and they need to be able to react if the prevention fails” said Raúl Pérez García, Global Presales Manager at Panda Security. “Our solution, integrated with Altitude, analyzes and correlates all the information generated about cyber-threats in order to initiate prevention, detection, response and remediation routines, configuring a whole security intelligence system able to uncover malicious behavior patterns and generate advanced cyber-security action to pre-empt malware”.

“The deliberate or accidental release of sensitive data in contact centers is a problem with far reaching consequences as companies are required to comply with more regulation to take reasonable technical, physical and organizational measures to protect the security of sensitive information”, states Jesus Cuadrado, Business Solutions Manager at Altitude Software. “Together with Panda, we are bringing to the market a solution specifically designed to stop the loss of sensitive information in a contact center environment, focused on automating the protection and detection of mishandled data”.

Panda Adaptive Defense 360 is the first cyber-security service that combines next-generation protection and detection and response technologies, with the ability to classify 100% of running processes. The platform delivers a complete cyber-security infrastructure, comprising a suite of services that connect contextual intelligence with the solutions that implement remedial actions on endpoints. Adaptive protection against malware, integrating prevention, detection, forensic analysis, categorization of all running processes and automated remediation.

The Altitude uCI (Unified Customer Interaction) suite is a complete, modular contact center software solution that provides all the functionality required to provide customers with the best experience. The modularity of the contact center software solution allows contact centers to grow according to business needs, avoiding significant upfront investments. Whether organizations use all the modules, just part of the solution, or employ 10 or 100 agents, Altitude uCI provides the ability to engage with customers and provide them with outstanding service.

 

The post Panda Security and Altitude Partner to Secure Information in the Contact Center appeared first on Panda Security Mediacenter.

Panda Endpoint Protection Is Given The VB100 Certificate By Virus Bulletin For Windows 10

virus-bulletin-panda-awards

Panda Security’s cybersecurity solutions have been recognized by the independent consultancy Virus Bulletin, which specializes in the prevention, detection, and elimination of malicious software and spam.

The publication, which regularly features analyses of the latest virus threats and evaluations of the leading anti-malware products on the market, has awarded Panda Endpoint Protection the VB100 certificate in the most recent comparative examination of 2016 with Windows 10 Pro.

The publication, which regularly features analyses of the latest virus threats and evaluations of the leading anti-malware products on the market, has awarded Panda Endpoint Protection the VB100 certificate in the most recent comparative examination of 2016 with Windows 10 Pro.

Panda Security consistently maintains excellent results in the latest tests, placing the Spanish company in a privileged position.

See the complete report with study results here.

Quality Assurance Certification

Windows 10 has become the predetermined OS for Windows launched by Microsoft. There have been various issues which have set off alarm bells for some of the most cautious users.

The first characteristic of Microsoft’s new operating system that we should be aware of is that it has been designed like a cloud service. This means that now, whether you like it or not, you will share more information than ever with Microsoft. Fortunately, there are some things that you can configure to minimize the damage if you consider this to be a threat to your security.

Another of the characteristics of Windows 10 that has caused much debate is the “Advertisement ID”. It is basically a code, a unique identification number, which works like the cookies of a webpage.

For some, the new location options that Microsoft has included may feel invasive. Also potentially invasive is the fact that, as happens with Apple’s Siri or with Google Now, this tool requires access to large quantities of personal information in order to respond to whatever questions a user may ask it.

If this new operating system still hasn’t convinced you, and you’d prefer to keep your information private after installing Windows 10, the most advisable course of action would be to turn to a good cybersecurity solution such as the one offered by Panda Security, compatible with Windows 10 and vouched for by Virus Bulletin.

The post Panda Endpoint Protection Is Given The VB100 Certificate By Virus Bulletin For Windows 10 appeared first on Panda Security Mediacenter.