Tag Archives: featured1

Top 10 Best Cyber Gifts for Christmas

pandasecurity-mc-gift

The Christmas countdown has officially begun! Surely you managed to grab a few bargains during the Black Friday sales last month but now it is time for another shopping spree. No matter how far in advance you get the gifts for your friends and family, there is always someone on that list who is difficult to shop for. The good news is that these days we have digital gifts too, so you don’t really need to go out in the cold. Should we mention that you save on Christmas wrapping too. You can send your gift via email.

Check out the top 10 cyber Christmas stocking fillers

1. Gift cards

It may not be the most personal stocking filler but this is a present that will never be returned to the store. The freedom you get with receiving a gift card is spectacular.

2. Donation for a good cause

It’s not a secret that sometimes your loved ones already own everything they really want. It is really hard to buy something classy without spending a huge amount of money. A donation towards a good cause may not be a bad idea – what you are gifting is hope for someone in need.

3. Skype credit

If you have friends and relatives living abroad it may be a good idea for you to buy them the opportunity to always be in touch with the rest of the family. Adding Skype credit to someone’s account is fast and easy. If you are on a tight budget $10 can go a long way with skype credit. It can buy your loved ones hours of conversations with your relatives and/or friends abroad.

4. Social media followers

This is probably number one present for all the attention seeking millennials. No matter how social media involved your loved ones are, they would always be happy to get an additional 10k followers on Instagram. Always make sure you have your protection on when buying social media followers. People operating this sort of service are sometimes in it for more than just your business.

5. GroupOn voucher

Wine tasting and horseback riding are not cyber gifts in particular, but the vouchers that you buy most certainly are as they get generated by e-commerce marketplaces such as GroupOn. Give your loved ones the gift of adventure.

6. Monthly magazine subscription

With so many platforms on the internet pretty much anyone is now able to create content. The fake news, according to some, influenced this year’s elections so we need to make sure that people are getting their information from reliable sources. You won’t break the bank if you get someone a yearly online subscription to a reputable publication.

7. Crypto currency

It may be the perfect way for you to introduce someone to cryptocurrencies such as Bitcoin, Litecoin, Peercoin etc. If you have a geeky friend, he or she would absolutely love the cryptocurrency gift even though it would be hard to put in a physical stocking.

8. Video game

Buying videogames does not necessarily mean buying a physical copy – digital ones are also available and are often cheaper or come with perks. Getting a game as a present for someone is not a bad idea at all.

9. Concert e-tickets

Follow these instructions – go to the person’s profile on FB, check out the bands he/she likes, get them the dreamed experience with their favourite music idol. Sometimes VIP ‘greet and meet’ is also available.

10. Protection

Last but not least, it is Panda Security’s latest software antivirus – Panda Protection’s subscription or discover Panda’s full security portfolio for more advanced solutions. Our product does not protect only your family but your identity and money. Doing online shopping without protection is equal to driving without car insurance. Save the hassle for your loved ones by giving them the gift of safety and security.

The post Top 10 Best Cyber Gifts for Christmas appeared first on Panda Security Mediacenter.

How does automatic renewal work for Panda’s homeusers

How to stay protected without having to renew your subscription

It seems like only yesterday when you installed your Panda Security antivirus protection, and all of a sudden… Oh no! You realize your antivirus protection is about to expire!

Already? How can it be?

It's time to renew your antivirus protection

Deep inside, you know this is something you have to do if you don’t want to find your computer locked by a nasty virus once again just when you are going to watch Narcos, but, really…

Why should you renew your antivirus subscription?

1. Because hackers have the bad habit of never ceasing to come up with new ways to hijack your identity, files or photos to try and steal your money. So it’s better to keep your computer and software always up to date

via GIPHY

2. Because with the Tuneup feature included in Panda Security’s new product lineup, you can say goodbye to seeing your devices slow down over time.

tune up your devices

3. Because the parental controls will help you keep your kids away from inappropriate Internet content.

renew antivirus

Plus, there is a simple way to stay protected without having to remind yourself of the need to renew your antivirus subscription. Isn’t it great? All you have to do is click a button the next time you renew your license.
Make sure you select the auto-renewal option when renewing. This way, whenever your subscription expires, it will be automatically renewed and you will remain protected one more year without having to lift a finger.

pandasecurity-automatic-antivirus-renewal-2-jpg

Plus…. The more you renew with Panda the better conditions you’ll get, as you’ll get bigger and bigger discounts with each renewal to reward your loyalty.

renew antivirus

Renueva mi protección ahora

The post How does automatic renewal work for Panda’s homeusers appeared first on Panda Security Mediacenter.

In 2017, less malware and more advanced attacks

pandalabs-predictions

The decline in new malware and the increased professionalization of attacks will set the tone in cybersecurity for next year, according to PandaLabs’ Cybersecurity  Predictions for 2017. Ransomware will encompass the majority of attacks, and companies will amass a larger number of increasingly advanced intrusions.

As far as cybersecurity goes, we bid farewell to a year replete with high-profile attacks that have jeopardized large corporations and private users. Ransomware attacks from Petya, Trojans such as Gugi for Android, the spyware Pegasus, PunkeyPOS, or large-scale attacks targeting point of sale terminals as well as the recent DDoS (Distributed Denial of Service) attacks have affected large organizations and international communication networks.

We rank the most popular attacks of the year, analyzing their evolution and taking a look at the cybernetic threats that 2017 has in store:

Cybercrime

Cybercriminals focus their efforts on those attacks which can rake in the most profit, using more effective tactics and professionalizing their operations in a way that allows them to make quick and easy money in an efficient manner.

Ransomware

This Trojan Horse will take center stage with regard to cybersecurity and will cannibalize other more traditional attacks that are based on data theft. The pursuit of profit is the primary motivation of cybercriminals, and ransomware is the simplest and most effective way to achieve this. Some things never change: victims of this hijacking malware will have to decide whether to pay, or not, to recover their data. Panda Security encourages victims to keep in mind that paying the ransom does not guarantee the total recovery of stolen data.

Companies

The number of attacks directed at corporations will increase, as these attacks become more and more advanced. Companies are already the prime target of cybercriminals, as their information is more valuable than that of private users.

Internet of Things (IoT)

The next cybersecurity nightmare. The technological revolution has ushered in the complete integration of smaller devices into the grid, which can be converted into entryways into corporate networks.

DDoS Attacks

The final months of 2016 witnessed the most powerful DDoS (Distributed Denial of Service) attacks in history. These attacks were carried out by bot networks that relied on thousands of affected IoT devices (IP cameras, routers, etc.). 2017 will see an increase in this kind of attack, which is typically used to blackmail companies or to harm their business (by blocking web access, online shopping, etc.).

Mobile Phones

Focusing on one single OS makes it easier for cybercriminals to fix a target with maximal dissemination and profitability. Android users will get the worst of it in the next 12 months.

Cyberwar

The precarious situation with regard to international relations can have huge — and serious — consequences in the field of cybersecurity. Governments will want access to still more information (at a time when encryption is becoming more popular), and intelligence agencies will become still more interested in obtaining information that could benefit industry in their countries. A global situation of this kind could hamper data sharing initiatives in the next year.

Download the Pandalab’s Predictions here:

Download

 

 

The post In 2017, less malware and more advanced attacks appeared first on Panda Security Mediacenter.

Online games: 5 risks to your online security and privacy

We all love playing online games; from time to time until late in the night on our mobile devices, gaming consoles, or  computer. One of the most amazing things about gaming now,  is that we are  connected to the whole world and can interact with  each other in many ways. To do so, we are required  to set up accounts on game platforms and talk to people we don’t know at all.

Panda Security and Altitude Partner to Secure Information in the Contact Center

partnership-panda

Panda Security, a leading advanced cybersecurity company, and Altitude, a global provider of omnichannel solutions that deliver great customer experiences, today announced a new strategic partnership. This partnership will combine Panda and Altitude expertise, solutions and services to maximize and optimize the prevention of data leakage in the contact center.

Recent research  shows a 29% increase in data breaches since 2013, with an average cost of $4 million per incident and an average cost of $158 per lost or stolen record. Other reports  point out that, for the first time, in 2015 security events traced to insiders have outranked security incidents by outsiders.

Innovative integrated monitoring and security platform for the contact center

The Panda Security and Altitude partnership will provide an integrated monitoring and security platform that relies on big data and analytics to detect and block outsider and insider threats in the contact center. Both companies will work together to deliver endpoint protection, detection and response, data leak prevention and user/entity behavior analytics.

“Contact Centers need to be more effective in preventing breaches and they need to be able to react if the prevention fails” said Raúl Pérez García, Global Presales Manager at Panda Security. “Our solution, integrated with Altitude, analyzes and correlates all the information generated about cyber-threats in order to initiate prevention, detection, response and remediation routines, configuring a whole security intelligence system able to uncover malicious behavior patterns and generate advanced cyber-security action to pre-empt malware”.

“The deliberate or accidental release of sensitive data in contact centers is a problem with far reaching consequences as companies are required to comply with more regulation to take reasonable technical, physical and organizational measures to protect the security of sensitive information”, states Jesus Cuadrado, Business Solutions Manager at Altitude Software. “Together with Panda, we are bringing to the market a solution specifically designed to stop the loss of sensitive information in a contact center environment, focused on automating the protection and detection of mishandled data”.

Panda Adaptive Defense 360 is the first cyber-security service that combines next-generation protection and detection and response technologies, with the ability to classify 100% of running processes. The platform delivers a complete cyber-security infrastructure, comprising a suite of services that connect contextual intelligence with the solutions that implement remedial actions on endpoints. Adaptive protection against malware, integrating prevention, detection, forensic analysis, categorization of all running processes and automated remediation.

The Altitude uCI (Unified Customer Interaction) suite is a complete, modular contact center software solution that provides all the functionality required to provide customers with the best experience. The modularity of the contact center software solution allows contact centers to grow according to business needs, avoiding significant upfront investments. Whether organizations use all the modules, just part of the solution, or employ 10 or 100 agents, Altitude uCI provides the ability to engage with customers and provide them with outstanding service.

 

The post Panda Security and Altitude Partner to Secure Information in the Contact Center appeared first on Panda Security Mediacenter.

Panda Endpoint Protection Is Given The VB100 Certificate By Virus Bulletin For Windows 10

virus-bulletin-panda-awards

Panda Security’s cybersecurity solutions have been recognized by the independent consultancy Virus Bulletin, which specializes in the prevention, detection, and elimination of malicious software and spam.

The publication, which regularly features analyses of the latest virus threats and evaluations of the leading anti-malware products on the market, has awarded Panda Endpoint Protection the VB100 certificate in the most recent comparative examination of 2016 with Windows 10 Pro.

The publication, which regularly features analyses of the latest virus threats and evaluations of the leading anti-malware products on the market, has awarded Panda Endpoint Protection the VB100 certificate in the most recent comparative examination of 2016 with Windows 10 Pro.

Panda Security consistently maintains excellent results in the latest tests, placing the Spanish company in a privileged position.

See the complete report with study results here.

Quality Assurance Certification

Windows 10 has become the predetermined OS for Windows launched by Microsoft. There have been various issues which have set off alarm bells for some of the most cautious users.

The first characteristic of Microsoft’s new operating system that we should be aware of is that it has been designed like a cloud service. This means that now, whether you like it or not, you will share more information than ever with Microsoft. Fortunately, there are some things that you can configure to minimize the damage if you consider this to be a threat to your security.

Another of the characteristics of Windows 10 that has caused much debate is the “Advertisement ID”. It is basically a code, a unique identification number, which works like the cookies of a webpage.

For some, the new location options that Microsoft has included may feel invasive. Also potentially invasive is the fact that, as happens with Apple’s Siri or with Google Now, this tool requires access to large quantities of personal information in order to respond to whatever questions a user may ask it.

If this new operating system still hasn’t convinced you, and you’d prefer to keep your information private after installing Windows 10, the most advisable course of action would be to turn to a good cybersecurity solution such as the one offered by Panda Security, compatible with Windows 10 and vouched for by Virus Bulletin.

The post Panda Endpoint Protection Is Given The VB100 Certificate By Virus Bulletin For Windows 10 appeared first on Panda Security Mediacenter.

Is WeChat set to shake up the tech industry?

It’s very easy to write off any instant messaging app that isn’t Whatsapp as a clone of the famous messaging giant.

How could anyone possibly take on the might of the Whatsapp –recently ranked as the best messaging app in the world for secure communication- behemoth?

Well, WeChat, a China-based messaging app has an active monthly user base of almost 1 billion users worldwide and has recently been called one of the world’s most powerful apps by Forbes magazine.

Here at Panda Security we’ve taken a look at the reasons behind WeChat’s success story and posed the question.

Can the Chinese messaging giant challenge the western tech companies’ supremacy worldwide?

WeChat is by no means a new player in the game.

The app has been around since 2011, which by tech industry standards is a long time indeed. It’s easy to forget, when some apps currently form such an integral part of our daily lives, that Whatsapp, for example, was founded in 2009, only two years before WeChat.

WeChat is a multifunctional and integral part of daily life in China.

Whatsapp, with its user base of over 1 billion people, can rightfully stake a claim to being the most seamlessly integrated app worldwide, forming an important part of millions of people’s daily lives.

However, many people who have travelled to China, for business reasons or otherwise, have found WeChat to be an unavoidable addition to their mobile devices. The transition back to using Whatsapp, many say, makes the western messaging giant feel one-dimensional by comparison.

Why is this?

WeChat is not simply a messaging app.

It’s many features means that it has managed to roll the functions of several apps into one interface, before companies that provide those functionalities in the west have had a chance to reach the Chinese market.

WeChat Shake, a function that allows you to shake your phone and talk to any other lonely -or bored- stranger who’s shaking there’s, makes the app a Tinder of sorts, helping users to connect with new people. Moments, meanwhile, is a social media feature, Facebook and Messenger combined.

Think Facebook’s recent announcement that you’ll be able to make payments to friends via its Messenger app is world changing? WeChat has had a comprehensive Pay feature since 2013 that even allows users to pay the bills using the app.

The Chinese messaging app is also a Slack, a gaming network and even an app store.

In fact, WeChat’s multifaceted nature means that businesses and brands see having a prominent presence on the app as an essential step towards being successful in China. Not bad for a simple ‘messaging service’.

The big players are paying attention.

Mark Zuckerberg’s recent strategy of splitting the Facebook and Messenger apps may well have been inspired by a desire to emulate WeChat’s multifunctional approach. However, it has also gotten the tech industry in the west paying more attention to the potential of multi-faceted messaging apps, spurring an onslaught of new faces in the messenger market, as well as leading some to believe that WeChat could really stake a claim outside of Asia.

Add this to the fact that a recent Apple keynote speech from Tim Cook, in which he took aim at the Chinese market, heavily featured the WeChat app.

This leads us to the following point…

Do WeChat have an unfair advantage?

Though it’s proving unsurprisingly tough for WeChat to break into the western market, they have a pretty comprehensive, and enviable, home advantage. China’s is, of course, an enormous market that tech giants such as Facebook and Whatsapp have had little success breaking into, due in large part to government bans and censorship within the country. Meanwhile, WeChat, and it’s parent company TenCent have comparable free rein to continue their dominance within China whilst also expanding and taking on the dominance of Facebook et al in the west.

Perhaps the thought of one single tech company playing such an integral part in people’s daily lives is a scary idea. What if the app’s cyber security is breached? Would privacy become an even more controversial issue? All we know is that Silicon Valley has taken note, and the traditional tech giants that we know may be set to face a very real challenge to their dominance in the coming years.

The post Is WeChat set to shake up the tech industry? appeared first on Panda Security Mediacenter.