Tag Archives: Cybersecurity

Yahoo Data Breach: Top 5 things you should do immediately

pandasecurity-yahoo-accounts-hacked

Yahoo’s biggest nightmare was confirmed yesterday – back in late 2014, a copy of certain user account information has been stolen from Yahoo’s network. The story started developing in early August when a hacker named “Peace” was openly trying to sell personal information of more than 500 million Yahoo account users on the dark web.

According to Yahoo, the account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.

Even though the breach happened two years ago it is not too late to take action, especially if you haven’t changed your password in a while.

Top 5 things you should do immediately

Change your password now!

It is as simple as that. Change not only your Yahoo password on your Yahoo account, but also review all your online accounts on which you’ve used the same or similar information. The sooner you do it, the better!

Turn on the two-step authentication that Yahoo offers.

Two-step verification uses both your password and an extra security code to verify your identity whenever you sign in to your account. If someone else tries to access your account, even if they can guess your password, they still won’t be able to get in without using two-step verification.

Pick better passwords.

We cannot stress more on the fact that using the same passwords for many accounts is not recommended. As you remember Yahoo are not the only one who’ve had similar issues. Back in 2014 eBay asked 145 million of their users to change passwords after a data breach. Changing your passwords often must be a habit!

Update your security questions immediately.

Yahoo says about 1 billion people globally engage with one of its properties each month. The chances your password is in the wrong hands are not minimal and the risk is real. Take action and don’t wait anymore, time is key here.

Go through old emails and remove sensitive content.

If your Yahoo account information is indeed for sale on the dark web, someone can hack into your email at any minute. There is tons of document scans, tax returns, credit card details and invoices that may be laying around your inbox. All these documents contain information you want to keep for yourself.

Remain vigilant! After Yahoo admitted the data breach you may be approached by fraudsters pretending to be someone they are not. It is important for you to not engage with online fee-based, toll-free-number services. Even though the incident happened nearly 2 years ago and you may be off the hook, we advise you to remain cautious and spend some time making sure you are fully protected.

The post Yahoo Data Breach: Top 5 things you should do immediately appeared first on Panda Security Mediacenter.

Panda Security Achieves 100% Detection Rate

awards-pandaPanda Security  solutions were recently recognized by Virus Bulletin, one of the world leaders in testing security for the prevention, detection and elimination of malicious software and spam.

With more than two decades of experience, Virus Bulletin regularly analyzes the latest viruses then evaluates the current anti-malware products on the market in their publication. This year, Virus Bulletin has honored Panda with a VB100 certificate in their most recent comparative test.

Here you can see the complete report with all of the results of the 2016 study: https://www.virusbulletin.com/testing/results/latest/vb100-antimalware

A History that Guarantees 100% Detection

This is not the first time that Panda Security’s cybersecurity solutions have received a high grade from a demanding approving agency.

Halfway through this year, the independent organization AV-TEST, named Panda as the best antivirus software for Windows End Users. On this occasion, Panda was also given a certification that recognized their software as the highest protection against 0-Day attacks, and the Panda products additionally had the highest ratio of detection for the most extended and frequent malware. The lightness of the software on the system load and its impact on PC use were also key factors included in the test results.

Additionally, at the end of 2015 Panda was recognized in the Real World Protection Test for the proper functioning and efficiency of our solutions. So, have you enjoyed the benefits of the Panda guarantee?

panda-security-solutions-tests

The post Panda Security Achieves 100% Detection Rate appeared first on Panda Security Mediacenter.

Regain your privacy: Facebook’s new (creepy) ad system

PandaSecurity-Facebook

Running a service as large as Facebook is extremely expensive. So rather than charge users like you and me a fee for accessing the social network, Facebook use our profiles to sell adverts. The more they know about us and our preferences, the more advertisers are willing to pay to show us online ads that match our tastes.

For most people, a few targeted ads in their Facebook timeline is a more than fair swap for the entertainment they get in return. However a new development in the Facebook advertising model may not be quite so agreeable.

All your advertisement profile data in one place

Claiming they want to “enhance” the online advertising experience for their users, Facebook has announced a new partnership with four data brokers, Datalogix, Epsilon, Acxiom and BlueKai. These businesses also create profiles based on our shopping and dining habits (among other factors), giving Facebook a way to link up our on- and off-line lives.

Combining all of these profiles gives Facebook an incredibly detailed insight into every detail of our lives – and means that they can target adverts at us even more accurately. They will also be showing us adverts outside the confines of the Facebook site and apps. We will start to see highly targeted ads everywhere as we surf the web.

For anyone concerned about retaining even the smallest degree of privacy, this is a concerning development. So what can you do about it?

1. Check your Facebook advertising settings

Facebook does provide you with a (limited) selection of account controls. You can find out more in this blog post here.

2. Install ad-blocker and security software

Many of the systems used by online advertisers and data brokers are incredibly similar to the malware used by cybercriminals. Panda Gold Protection provides tools designed to protect your data on social networks (or elsewhere on the web) for instance.

A second tool, like AdBlock or Ghostery allows you to block specific trackers used by advertisers for an additional layer of privacy. These tools are especially effective for preventing BlueKai from collecting your web browsing data.
We highly recommend non Panda users to download and use our Panda Cloud Cleaner to check if their computer is free of malware and Potentially Unwanted Programs (PUPs).

3. Opt out from the brokers

Three of Facebook’s data broker partners allow you to opt out of their data collection routines. Although relatively straightforward, you have to do the hard work to make it happen.

The instructions below will help you opt out:
• Acxiom (complete the form, and click the confirmation link in the email that follows): https://isapps.acxiom.com/optout/optout.aspx
• Datalogix (simple – just click this link): https://www.datalogix.com/privacy/rel-opt-out-confirmation/
• Epsilom (click the “Choose all companies” button on the AdChoices website to opt out): http://www.aboutads.info/choices/

What happens when you opt out?

Following these steps will somewhat limit the tracking habits of these companies, but it won’t stop them entirely. After all, everything you share on Facebook is fed into their advertising algorithms.

You will also find that the adverts you do see online may have no relevance to your interests at all. So you need to weigh up the importance of relevant advertising to your web browsing experience.

Ready to improve your online privacy? Start your free Panda Protection Service trial today.

The post Regain your privacy: Facebook’s new (creepy) ad system appeared first on Panda Security Mediacenter.

5 simple tricks to boost your PC security

Because we rely on technology to manage every detail of our lives, devices are a natural target for criminals. Why steal your wallet when they can grab your online banking password and empty your account remotely?
Keeping your PC and other devices secure is incredibly important. Here are five ways you to avoid becoming a victim of cybercrime.

Security Tips:

Use your PC’s built-in tools

Since the launch of Windows Vista, Microsoft has included a feature called “User Account Control” in every version of their Windows operating system – including Windows 10. This built-in security function prompts you to enter a user name and password every time a new piece of software is installed. Without the password, the software will not be installed.
For many people, this constant prompting for a password is extremely annoying – so they simply disable User Account Control (UAC). Once turned off, software can be installed silently – making it much easier for viruses and malware to infect your PC. If you have disabled UAC, you need to re-enable it now.

Treat email with caution

There are over 205 billion emails sent every day, making it one of the most popular communications methods available. This is why email is used so often to launch cyberattacks.
From infected attachments that install malware, to phishing scams that trick you into disclosing sensitive information, your inbox is a potential minefield. You must learn to treat incoming email with caution, double-checking attachments and links before clicking them.
If you can get into this habit, your mailbox will be a lot safer place.

Install antivirus and internet security tools

Cyberattack methods are constantly evolving, and staying on top of security developments is a full-time job for seasoned IT experts. You can reduce the risk of becoming a victim by installing a trusted anti-malware solution like those offered by Panda Security.
Antivirus and internet security tools are designed to test files and we links automatically, blocking and removing harmful content before it can infect your PC. Preventing malware infections is much more effective that trying to remove them later.

Don’t reuse your passwords

The average internet user has 26 different online accounts. It’s no surprise then that we tend to use the same logon details over and over again – we typically share the same five passwords between our accounts. But if a password is cracked by hackers, they have everything needed to access all of the accounts that share that same word.

If you really can’t remember all of your different passwords, a tool like a Password Manager can. This apps generate unique, “strong” passwords and store them securely. When you need to logon, the password app “remembers” the correct logon details for you automatically.

Treat “free” WiFi with caution

When out and about, free WiFi hotspots can be a lifesaver, but everything is not always as it seems. Criminals have been known to set up wireless networks in public places in order to trap unsuspecting victims. These fake WiFi hotspots then collect all of the data sent and received by people connected to it – including sensitive data like credit card numbers and passwords.

You must always check that the hotspot is from a reputable provider – if you’re not sure, don’t connect. You can always ask a member of staff for assistance. If you will be using your device on public networks regularly, you should also consider whether a secure VPN subscription would help to keep you even safer.

Although keeping your PC safe may feel like a battle, many of the challenges can be overcome through the use of good security tools, and your own common sense. For more help and advice on how to keep your PC secure from criminals, please get in touch.

The post 5 simple tricks to boost your PC security appeared first on Panda Security Mediacenter.

Are your children ready to go back to school?

It is this time of the year when children are heading back to school. Not only will they be taking with them their memories from an amazing summer spent chasing Pokemons, and their hopes to have fun while learning more about the world… they’ll also be taking lots of consumer electronics. A recent study by the Consumer Technology Association suggests that consumers will spend more than $15 billion on back-to-school technology; this is a colossal sum. No matter how old your children are, they’ll either have a cell phone, a smartwatch, portable memory sticks, a tablet or a laptop. For some of them, this may even be the first time they are alone with the new technology you’ve just bought them. And with great power comes great responsibility.

Here at Panda, we’ve drawn up a list of products that your children will most likely be taking to school with them this Fall:

Cell phone

Cell phones could be a distraction and are forbidden in a number of schools here in the USA. However, there is now a way around it – connected smartwatches. They connect straight to the LTE network making it possible to make and receive calls.

Cell phones are the main focus of new hacker attacks and malware, so don’t forget to install a security product to protect your children. Moreover, in many cases security products can also protect and monitor smartwatches.

Laptop and Tablet

Delivering a presentation and taking notes has never been easier. Having a laptop or a tablet at school is a must, almost every publisher offers digital versions of their textbooks. Say goodbye to the heavy backpack!

Make sure you install trustworthy programs and remember, you should always have the latest version with all security patches applied, this prevents security holes from being exploited by viruses.

USB Stick

Every day children exchange pen-drives with schoolmates. Make sure you have the tools needed to protect your PC and Mac. Most of the time kids don’t even realise their pen drives are infected.

Did you know that many infections occur directly from USB drives? To protect against this type of infection, be sure to choose an antivirus which, when any USB drive (external hard drive, device, USB, etc.) is inserted, offers the possibility to scan it and clean it in case of infection, so you can use it without risk.

PC/Mac Software

Whether it’s the latest graphic design software or simply a tool that helps you solve math problems, the software you have on your children’s learning devices is as important and as the devices themselves.

Nowadays, technology and BYOD devices are a huge part of the learning process and our children’s lives and future have never been so reliant on technology. Let’s make sure we teach them how to take advantage safely of the benefits the 21st century offers them. All these products can be protected as Panda Security detects and blocks 99.9% of threats no matter what devices or platform they are using. So sleep tight while we work on detecting the remaining 0.01%.

The post Are your children ready to go back to school? appeared first on Panda Security Mediacenter.

Companies that are making the same mistake as Dropbox

dropbox panda security

Though it may seem trivial, it is not: the security of your company and of your customers depends largely on the passwords that your employees use. In fact, should any of them make such a serious error as, for example, reusing their login credentials across different services, the consequences could be catastrophic, as Dropbox has recently learned.

The case of Dropbox, in figures.

Just a few days ago, the cloud storage company acknowledged that passwords of more than 68 million accounts had been leaked, with a security issue jeopardizing the information of its more tan 500 million users. All the problems started with a simple lapse on the part of one of the company’s employees

The incident occurred in 2012, when some Dropbox users began to complain: email accounts that they had used exclusively to register for the service had started to receive a lot of spam messages. The key to the mystery lay in the theft of passwords from a Dropbox employee: cyber-crooks had got hold of the employee’s LinkedIn password, which was the same as the one used for the cloud storage account. And in the Dropbox account, the employee had a document with a list of user’s email accounts. The perfect gift for spammers.

Some of the passwords that have now been leaked correspond to those accounts included in the previous theft some years before. In fact, a few days before its acknowledgement of this latest leak, Dropbox asked users that had not changed their passwords for some years to do so as soon as possible: “We’re reaching out to let you know that if you haven’t updated your password since mid-2012, you’ll be prompted to update it the next time you sign in. This is purely a preventative measure and we’re sorry for the inconvenience”, read the email.

Some of the passwords filtered correspond to hacked accounts years ago (…) Dropbox asked users that has not changed their passwords for 4 years ago to do so as soon as possible.

In short, poor password practice by employees in company email or service accounts can put the whole company at risk. In fact, Dropbox has already taken measures to enable employees to comply with corporate security rules, including among other things, not reusing passwords. You can also do the same. Panda’s security solutions include a password manager to facilitate the use of different passwords for different services, without having to memorize each one.

 

The post Companies that are making the same mistake as Dropbox appeared first on Panda Security Mediacenter.

Post-vacation Security Tips for your Business

password panda securityExcept for the few of us who choose to visit faraway places at other times of the year, for the majority of us, our vacation time is coming to end. Whether we are refreshed or nostalgic for our summertime getaway, let’s make sure to take into account our IT security while we get back on track.

Memory, Oh Memory

Recent research has proven that the last weeks of summer are an especially sensitive time of the year for some vacation side effects. Many of us are so relaxed we can’t even remember our passwords!

In that case, it’s easy to restore passwords, but we also have to be very careful while doing so. 77% of people who forget their passwords deliberately choose easier ones to replace their former passwords. Of course they do this to avoid another memory lapse, but they must also remember that this makes their password much less effective and lowers their security—in addition to the IT security at their workplace.

Check Out Your Well-Traveled Devices

When a laptop or mobile device leaves their usual space, they can be exposed to a higher number of threats because cybercriminals can connect to these devices (with or without your knowledge) while you’re accessing Wi-Fi networks at hotels, cafeterias and other public spots.

If you have been careful while using these access points it doesn’t mean something will happen. However, during the times of BYOD (Bring Your Own Device), all you have to do is review the devices that access the company network (laptops, mobile phones, tablets etc.) at the end of the summer. We hope you don’t have an unpleasant surprise waiting for you.

Recycling and Good Practices

The best time to revise routines or implement better practices is right after vacation time. This is also an ideal time to conduct an employee training, if your business permits it, in order to update workers on the latest threats. With proper training, your workers will be less likely of biting the “phishing” hook that comes after them.

September Novelties

While the weather is cooling down in the month of September, the technology sector is also getting ready for the hottest presentations of the year. Tech giants like Apple and Google always announce their newest updates and innovations. Companies await security developments regarding the new terminals and operating systems and as soon as the new versions are released, they are reviewed and updated. If your devices are obsolete and no longer support the upgrades, this is a great time to renew them.

Keep these tips in mind without forgetting to take precautions that we must bear in mind throughout the year, as is to have a good  cybersecurity solution that allows us to enjoy a  safe surfing on our corporate network.

The post Post-vacation Security Tips for your Business appeared first on Panda Security Mediacenter.