During Black Friday and the weeks leading up to Christmas, tech savvy shoppers visit brick-and-mortar stores to see the items they want to buy, but they use price comparison apps on their phones to check for the best deal. This is called “showrooming”. Shopping apps do things like scan barcodes for price comparisons between your local retailer and online stores, send alerts when the price drops, find money-saving coupons, and even tell which stores in the mall have a particular item on sale.
Tag Archives: featured1
Block unwanted calls on your iPhone
Back in the day when families had one phone in the house, it was guaranteed that as they sat down to dinner, a telemarketer would call. Now that we carry our phones with us, we can be interrupted at any time by telemarketers, robocallers, scammers, political campaigners, and even the crazy ex.
Kevin Chapman joins as new SMB General Manager
Today, I am pleased to announce that Kevin Chapman has joined our team as Avast’s new General Manager of our SMB business unit. I have known Kevin for years, and I am very glad he is joining us.
In this role, Kevin will lead all aspects of our SMB business, including our go-to-market strategy, product management, marketing, sales and support. Kevin joins us with a long background in security as well as great experience working with the channel having spent many years in senior roles at Symantec. He brings a track record building SMB operations and leading global teams.
The Malware Plateau – Less New Malware
Back in 2008 McAfee researcher Toralv Dirro posted a blog on new malware growth slowing – admittedly from an exponential rate to straightforward linear growth – around 20,000 new malware samples each day. He then went on to say that “Now with constant, although still massive, growth there is some light at the end of the tunnel for the security industry”.
Unfortunately this 2008 malware plateau was a temporary respite – by 2010 new malware creation had tripled to 63,000 and in 2015 the quantity received by PandaLabs topped out at 230,000 new samples every day.
Over the last 12 months PandaLabs have seen a levelling-out of new malware at around 200,000 samples per day. This trend is verified by statistics from malware lab AV-Test, and it would appear for the first time in forever the amount of new malware samples released this year will be lower than the previous year.
For 2016 the red section shows current new malware registered by AV-Test up to 16th Nov and the blue section projects this malware to year end – less than last year.
So we’re all safer now, right?
Wrong. There are still 200,000 new malware samples every day and cyber-attacks are showing they are more dangerous than ever – with cybercrime making up more than 50% of crimes committed in some countries.
This new malware creation plateau can be attributed to:
- Less traditional malware – Viruses and worms are being dropped in favour of Trojans, especially ransomware.
- Highly targeted malware attacks – Upwards of 90% of malware is unique to a specific endpoint rendering signature and heuristic detection useless, and the samples less likely to reach malware labs.
- Self-destruct malware – we are seeing examples of Ransomware and APTs that once successful in their mission delete themselves, as if antivirus vendors can’t identify the malware it can be used again.
Also attackers are using alternative techniques to gain access:
- Social engineering – the amount of data freely available on for businesses and endusers online means compromising their systems can be done without malware.
- File-less attacks – there has been an increase of threats that instead of using malware files they abuse legitimate system tools (such as PowerShell) in conjuction with registry entries, allowing to exfiltrate data from a business – with no exploits used, no malicious URLs and no malware ever touching the system.
- The rise of the Internet of Things – Routers, IP cameras and even thermostats and baby monitors, with poor security design and often default settings, are giving easy access to work and home networks. Once in the crooks have easy access to your data or can use your devices to conduct Distributed Denial of Service (DDoS) attacks on others.
To combat the evolving threat landscape Gartner recommend that businesses improve their existing security with Endpoint Detection and Response solutions, such as Panda Adaptive Defense.
Written by Neil Martin, Marketing Manager at Panda UK.
The post The Malware Plateau – Less New Malware appeared first on Panda Security Mediacenter.
3 million Android phones vulnerable due to pre-installed rootkit
Security researchers at BitSight (AnubisNetworks) have found a backdoor that affects 3 million budget Android devices. The backdoor makes the phones vulnerable to a Man-in-the-Middle (MITM) attack and could allow attackers to remotely execute commands to take complete control of a device.
Be careful not to keep your invoices where your competitors can find them
One of the most common and most sensitive documents that companies handle on a daily basis is invoices. Issuing and receiving them is a fundamental activity for every business, however, people are not always aware of how important they are even after being paid or collected.
Together or individually, they can expose critical information that can be very valuable to your competitors, such as customer lists, product and service descriptions, prices and promotions, or details of key agreements.
However, these files are so common in organizations that they are often treated carelessly or with a complete disregard for security by employees, to the point of being sent via email in unencrypted formats, through instant messaging applications, stored in virtual stores more or less accessible to the public, in physical devices such as pen drives, etc. In fact, it’s quite easy to overlook the importance of the information they can provide to a third party.
Invoices are so common that they are often treated carelessly.
Just do a couple of searches on Google and you’ll realize the extent of the problem. Search for such simple, obvious terms as ‘invoice euros vat inc address tax number date total’ with a filter to show only PDF files, and you’ll find an endless number of sensitive documents that are accessible to the public without companies knowing.
Companies in the textile sector, integrated service companies, travel agencies, etc. The list is too long, especially if you consider how easy it is to protect invoices if you take the appropriate precautions.
First, these and other critical files should never be stored on Internet-facing servers. However, as this can be difficult in the day-to-day reality of the majority of companies, at least it should be checked that those servers are not accessible to the public in such evident places as Google.
In reality, the presence of these and other confidential files in the popular search engine is almost always due to the wrong configuration of corporate servers, or to the fact that these include directories that can be easily crawled by Google’s bots.
Being aware of this and taking the necessary steps to prevent it is one of those simple, effective protection measures that companies often forget about. However, it is very important to understand that invoices contain far more valuable information than may seem apparent at first glance.
The post Be careful not to keep your invoices where your competitors can find them appeared first on Panda Security Mediacenter.
Black Friday and Cyber Monday: how to shop online safely.
How to safely shop online?
It’s not a secret about 70% of the adult US population shops online regularly. With Black Friday and Cyber Monday right around the corner tens of millions of people are preparing to get a bang for their buck. The deals are usually so good even people sceptical about online shopping, and without much experience, may feel tempted to participate in the online frenzy. Last year consumers spent more than $3 billion on Cyber Monday alone. The previous record was in 2015 when they spent “only” $2.75 billion.
Our economy seems stable right now, with that in mind we are pretty sure the deal-hungry buyers will beat last years’ numbers. There is nothing wrong with taking advantage of the great deals, as long as you do it safely. Panda Security has been combating cybercrime for more than 25 years and we can surely tell you a thing or two about how to safely shop online around the holidays.
Top 10 tips of how to safely shop online
Beware of phishing
With Thanksgiving just around the corner, you will begin receiving tons of email newsletters offering you great deals. We do not advise you click on the ones you are not familiar with. Try to stick to the ones you know, and if you don’t know the company that is approaching you, research them online before opening the emails you’ve received from them.
Do research
We know that the deals around Thanksgiving are amazing but sometimes when something is too good to be true, it’s either fraudulent or a scam. Don’t be fooled by the Cyber Monday label, products still cost what they cost if the deal is too good to be true that’s probably because it’s not true. If you are in doubt, simply google the product and see if anyone else offers it for the same price. You may end up getting an even better deal!
Don’t be scared to buy from the ‘usual suspects’
Try to do your online shopping from websites and online retailers that you recognize and you have shopped from before. You shouldn’t worry much if you place an order with a well-known supplies superstore such as Home Depot for example.
Check the URLs
While you surf online you may get so excited by the good deals you’ve found that you may end up on a spoof website. If you are in doubt, check the URL link. If it feels awkward close the browser, open a search engine, type the name of the retailer you are trying to reach and place the order through the real website. Better safe than sorry!
Read the file product description as well as the terms and conditions
Sometimes it may seem as if you are buying a brand new device but you may end up getting a refurbished or reconditioned one. The fact that the deal is great, does not mean that the product will be great too. Always take your time to review the terms and conditions, warranty, insurance options, the return policy and the location of the product you are trying to purchase.
Do not use the debit card for your checking account
It may be tempting to pay directly from your checking account but checking accounts have less protection and it will be much harder for you to get your money back if you end up scammed by a phony website. Even if you have the money available in your checking account, better not share your debit card details with the world unless absolutely necessary. Put those expenses on your credit card statement instead!
Verify your order
It is not uncommon for consumer to select more than one item by mistake, or they put the wrong house number, or they check a shipping option that does not work for their needs. This is why we advise you to always double check the order before you make a payment. A few extra seconds won’t waste your day. You don’t want to buy a Christmas gift a week before Christmas to later find out that it ships from China in 3 weeks’ time.
Make sure the site is safe
Don’t buy anything online from a site that does not have SSL encryption. You will know if a site has SSL encryption if the URL starts with HTTPS:// (instead of just HTTP://).
Use antivirus software
It may sound trivial when you hear it from us, but staying protected is really important. Don’t wait until Thanksgiving to get protection. We’ve been combating cybercrime for nearly 3 decades, we can help you and your family stay safe around the holidays.
Use common sense
Last but not least, if you see a website that looks suspicious, just don’t order from there. There’s plenty of fish in the sea – you will find the same offer somewhere else. There is nothing wrong with calling the company directly during business hours to check their legitimacy. Remain vigilant, don’t just give away your hard earned cash!
Every year we spend billions of dollars around Thanksgiving and hackers are preying on us trying to get our card details, trying to steal our identity and personal information. Don’t let them ruin your holiday by simply following the suggestions listed above.
Happy shopping!
The post Black Friday and Cyber Monday: how to shop online safely. appeared first on Panda Security Mediacenter.
Camera drones: A flying spy is peeping into your window
Drones have conquered the world: they are used to hunt down tax evaders and illegal hunters, help suppress wildfires, find victims after natural disasters… They even serve as flying cameras to assist in filming movies and for aerial photography.
Online retail giant Amazon, for example, is planning on using drones for commercial delivery in order to fly purchases right to customers’ front doors. Despite being originally developed for military purposes, drones are slowly finding their place into our everyday lives. However, just as with every other technology, these unmanned aerial vehicles can pose a serious threat if they fall into the wrong hands.
Among other things, drones can be used as highly effective spies. Their ability to get close to almost any place where confidential data is stored (for example, an office) without being seen, makes them the perfect spy. Not only because of their ability to carry cameras and capture images through windows, but also because they can make the perfect weapon to carry out sophisticated cyber-attacks.
Drones can be used by cyber-criminals to easily get their malicious tools close to their target without having to overcome the physical barriers that the potential victim may have in place (security guards, access control systems, biometric sensors, surveillance cameras, etc.).
A drone could hide, for example, a jammer, a malicious hotspot, a device to launch attacks via Bluetooth or NFC, etc. The number of ways in which these aerial devices can be used to spy on victims and steal confidential information is almost endless.
Such is the risk that there are countries such as Sweden that have ruled that camera drones qualify as surveillance cameras, banning their use unless the drone operator has the necessary permit.
However, a cyber-criminal that wanted to use a drone to carry out an attack would still have another option: to take control of someone else’s device. Unfortunately, many of today’s models have vulnerabilities that could allow a remote attacker to take control of them.
Drone manufacturers have the responsibility to increase the security of their aircrafts to mitigate the security and privacy concerns raised by them. As this technology becomes ever more present in our lives, it is clear that the notion of safety and security in IT systems cannot be limited to computers and smartphones, but should also reach other high-flying devices. In this respect, having the cyber-security protection that best adapts to your needs is absolutely essential.
The post Camera drones: A flying spy is peeping into your window appeared first on Panda Security Mediacenter.
5 Tips to make your Cell phone battery last longer.
5 tips to maintain your cell phone battery without compromising experience
When cell phones appeared on the market they were meant to be used for talk and text. However, things have changed and cellular operators no longer stress about the amount of minutes or texts you are using, but for the amount of data you burn through. That’s because people don’t make that many calls anymore – these days your cell phone is being used as a small pocket computer that allows you to connect with your friends and business partners, be up to speed with what is happening around the world and of course entertain yourself by watching videos and playing games.
The devices are no longer about you being able to call someone; it’s about you being connected to the world on a variety of platforms. What makes cell phones such an important tool? Well, they are mobile. It is as simple as that! You can use them almost anywhere and take them with you everywhere. There’s an app for almost anything that keeps to mind. Now while mobility can be an advantage in many ways it can also be perceived as a disadvantage.
With great power comes great responsibility
cell phones are powered by a battery and this battery can often let us down. The laws of the modern world say: Your cell phone battery will most probably die on you the moment you need it most. It is said that should Apple manufacture a car, it will most likely run out of juice every day at about 4pm, just as you’re trying to go home from work. We are so dependent upon cell phones we can no longer execute simple everyday tasks without them. There are reported cases of people unable to get home as their phones have stopped working. How do you get home without the GPS on your device? Let’s admit it – we have become so used to having that cell phone in our pocket we cannot function without it.
Top 5 things you can do to improve your battery life
Always carry a charging cable with you
Phones tend to die in the most unexpected moments so we recommend that you always have a portable power station with you, or at least a cable that will allow you to charge your phone in case of need. Just look at Starbucks as an example. They know people want their devices charged up so they installed wireless chargers at their coffee stores to attract more customers. While this can be the case in some stores, in 9 out of 10 cases, stores that don’t have wireless chargers will be happy to get your phone charged a bit behind the counter while you shop.
Now might be the time to get a portable power station
There are many options on the market that allow you to have your phone charged while on the go. Have you seen all of these people with phones connected with a cable to something in their backpack or purse? They are Pokémon hunters who want to ‘catch’em all’. You cannot catch all the Pokémon if you don’t have a portable charger – your phone won’t make it without a recharge. While this is a common practice amongst Pokémon hunters, regular people take advantage of it just as much. Having a juice pack is a must in this busy world.
Keep a car charger in your car
Just go out there and get yourself a car charger. You will never run out of battery if your phone is charging while you are commuting. Unless you live in New York, here in the USA most people travel to and from work for at least 30 minutes a day. Some phones such as Motorola Droid 2 or Google Pixel allow you to use your phone for up to 8 hours with only 15 minutes charge. This is incredible, take advantage of the fast charging options available for your mobile device.
Consider getting a phone with interchangeable battery
We know in 2016 these are rarity but you can always find a smartphone that allows you to change its battery. Having a bad battery life should not mean you have to buy a brand new device or spend tons of money on external chargers, this means you may just have to replace your battery. Phones such as the latest LG V20 allow you to do exactly that.
Take a look at your phone’s settings
Sometimes the solution is not to constantly charge up your phone. It is more about finding out what drains it and eliminating it. All smartphones have the capability of monitoring battery usage and determining what causes the short or inconsistent battery life of your device. If you see an app that uses up the majority of your battery but you barely use, just delete it – it clogs up your phone’s memory and drains your battery. You don’t need this kind of negativity in your life. Many times apps have background processes that use not only your battery life but your data – always keep an eye on the ‘Settings > Battery’ section of your mobile device.
The post 5 Tips to make your Cell phone battery last longer. appeared first on Panda Security Mediacenter.
Your Android could be sending messages to China
A pre-installed backdoor on more than 700 Android devices was discovered by Kryptowire. The backdoor allows a Chinese company called Adups to transmit information like text messages, contact lists, and IMEI numbers without users’ knowledge or consent – every 72 hours.