Tag Archives: featured1

Modern Day Fears – Don’t Let The Monsters Get You

pandasecurity-modern-days-fears-halloween-2It is this time of the year when we are all going to Halloween costume parties, playing pranks on each other and visiting haunted attractions. Why do we do it? Well, we want to ward off the evil spirits while having fun in the process. There is nothing wrong with that!

However there are plenty of scary things going on in real life too. Instead of going to Knott’s Scary Farm, turn on the TV. We’ve come up with a list of modern world fears. We sincerely believe that 10 years from now you will be more afraid of hackers in Eastern Europe than from going to the dentist. In the year 2025, the Bogeyman will no longer be after you, he most likely will be after your virtual reality goggles and your credit card information!

Here are a few things people are scared of this Halloween

DDoS-o-phobia

Early this week half the internet went down after an unprecedented DDoS attack. The attack was so big that people were unable to complain on Twitter, as Twitter itself was down. Experts say an army of smart fridges, webcams, DVRs and other IoT devices managed to ruin your Monday morning! This on its own sounds like the plot of a Hollywood blockbuster, a bad one obviously. The media reported that some manufacturers left their devices so vulnerable to hacking attacks that they now are having some of their products recalled.

Imagine telling someone, 20 years ago, that an army of smart fridges and webcams would cause a major disruption in people’s lives! They would probably have laughed and brushed you off as a joker. Today though it is reality and is a real threat to our everyday life. Twitter and Facebook are like electricity, people start panicking when these services go missing.

Hack-o-phobia

So far we’ve learned that there are millions of people literally begging to be hacked as they don’t have their cell phone passwords set. The good news is that the other 2/3 of the US adult population actually have their cell phone passwords set and they are not interested in giving it up easily. Monsters are scary, but sharing your precious moments and credit card information with complete strangers whose main purpose in life is to ruin yours, sounds even scarier.

People should be scared, especially if they are not doing much to prevent hackers from stealing information from their smart devices.

Cell-phone-damage-o-phobia

The dog used to be man’s best friend, now it is the smartphone! A recent study confirmed that every day we spend more than four hours staring at our smartphones. We’ve never been as reliant on smartphones as we are now. With this in mind, we are attached to our smartphones and one of our biggest fears is of damaging them, or even worse, having our device in the hands of people who want to take advantage of all the confidential information on it.

So before you start watching horror movies at home – turn on the news channel, the threat is real and your fears are justified. Be prepared, be very prepared… by downloading the best free antivirus software in the world.

Panda Security wishes you a very scary Halloween! Stay safe!

The post Modern Day Fears – Don’t Let The Monsters Get You appeared first on Panda Security Mediacenter.

Insiders, their costumes are so good you won’t even recognize them.

halloween panda securityKnock knock! Trick or treat! Companies and cybercriminals play the same game. You could be opening back doors to cybercriminals this year, without even knowing it. You’ll lose this game if you don’t fight back. Ransomware attacks will capture your documents and the attackers will be expecting a big juicy reward (if you want your files back, that is). This Halloween, beware!

An insider could already be hiding within company walls, brewing up trouble. A recent study shows that 60% of attacks perpetrated in businesses were carried out from inside the workplace. From undercover spies to terrorism gangs to disgruntled employees that steal top-secret information. Double, double toil and trouble…

And what about you? What type of Insider are you?

gohst panda securityAttacks by staff with privileged access represents one of the greatest threats for the security of the corporate information and data of your customers. Research conducted by Ponemon Institute indicate that hackers and criminal insiders are the main culprits of the security holes and data breaches. Three quarters of these attacks are ill intended, and one quarter of them are accidently carried out by employees without bad intention.

This year, the global cost of the infractions carried out by insiders with bad intentions is 154 euros per capita, much higher than the cost of infractions caused by system errors and involuntary offenses (about 125 euros and 120 euros per capita).

A history of perfect crimes

wolfman panda securityAt the beginning of this month, an employee from the US government, Harold Thomas Martin, was accused of stealing classified information related to the NSA (National Security Agency). Let’s not forget the Edward Snowden leak from three years ago.

Shalom Bilik, who was subcontracted for computer system maintenance for Israel’s Ministry of Social Security and Welfare, accessed a database and stole information pertaining to 9 million Israeli citizens so he could sell it later on the black market.

Even Dropbox couldn’t escape from the insiders, when a cybercriminal stole data pertaining to more than 500 million users thanks to a negligence of an employee. It happened this time because of the carelessness of a Dropbox employee. The cybercriminals were able to obtain his LinkedIn password, which was the same one he used for saving files in the Dropbox Cloud. Stored in the cloud was a work document that contained a long list of email addresses. Access to more than 500 million users? What a treat for criminals who want to trick users with massive same campaigns.

Some tips to keep you protected from internal threats

  1. freddy panda securityStart using a cybersecurity solution that has advanced protection features, and that also has the capacity to detect and remedy possible threats.
  2. Lack of control over what happens in all devices and systems is a common point in all analyzed attacks. What will help us is a tool that’s capable of controlling all active processes on every device connected to the corporate network.
  3. Revise personnel policies and control systems in order to adjust to privacy requirements and adapt them to the technology that’s available.
  4. Keep your operating systems updated and programs on all of your company’s devices.

Make sure that Halloween only comes once a year. Manage, control and protect your information against advanced threats with Panda Solutions for Companies.

The post Insiders, their costumes are so good you won’t even recognize them. appeared first on Panda Security Mediacenter.

(In)Security Cameras

camera panda security

When security cameras are more like a hole than a protecting Wall, you have a problem. Cameras are a double-edged sword and webcams are the perfect example of that: they allow people to keep in touch with their loved ones and help companies hold meetings regardless of the distance between participants. However, even Mark Zuckerberg covers his laptop camera for security reasons in order to avoid being spied on. The danger in this case seems obvious, but our laptop cameras are not the only ones that pose a certain risk.

Many companies use video surveillance systems, and security cameras obviously play a key part in those systems. Watching the areas that surround a company’s premises to prevent theft or try to identify potential trespassers is something essential for any organization. However, a network of surveillance cameras can also become a threat if attackers find a vulnerability in it.

This has been shown by a recent study carried out by a team of Hungarian researchers who found multiple vulnerabilities in the cameras of Taiwanese CCTV manufacturer AVTECH. These flaws could pose many risks to companies entrusting their business security to this maker’s devices if connected to the Internet.

Security, step-by-step

First, the cloud that these cameras connect to in order to sync data does not use the HTTPS protocol to secure transmissions. As a result, any cyber-criminal could be able to access the footage captured by the CCTV cameras, which could also be downloaded without needing to enter a username and password.

This way, an attacker with the necessary knowledge could obtain the images taken by a company’s video surveillance system, and use that information for more dangerous activities. They could use that information to, for example, find out the exact location of the security personnel at any time, find out if there are employees on the premises or if the place is empty, and even use the cameras to view passwords and confidential data.

In addition to the severity of the flaws, what really surprises us is the fact that AVTECH has not given any kind of explanation about the vulnerabilities discovered or any potential fixes. Obviously, any organization thats use surveillance products must be able to trust them as well as the makers that provide them, something that seems extremely difficult in this case.

Even though it’s true that any surveillance system can have its flaws, there are steps that can be taken to reduce the risk to businesses: do not connect video surveillance devices to the Internet, and keep your devices’ firmware always up to date.

The post (In)Security Cameras appeared first on Panda Security Mediacenter.

Hucky Ransomware: A Hungarian Locky Wannabe

At Avast Threat Labs, we are constantly monitoring the threat landscape and evaluating current risks. Most of the time, we face prevalent strains of malware, such as Locky or Cerber ransomware, but from time to time we are alerted by our automated systems about anomalies within active in-the-wild samples. These alerts are either new techniques used by known malware or a discovery of a new strain.

Facebook banned to stop collecting users data on WhatsApp

Facebook banned to stop collecting users data on WhatsApp

Facebook banned from gathering Whatsapp users data in Germany

To help better serve users of the WhatsApp messaging app, Facebook recently implemented a number of changes to the terms and conditions associated with the service. The new policy addresses information sharing between WhatsApp and Facebook – anyone who continues to use the app agrees to having some of their personal data sent back to Facebook for analysis and marketing purposes.

Concerned about potential abuses of this new sharing agreement, a German regulator has stepped in, forcing Facebook to put their plans on hold. Facebook has been ordered to stop sharing the information of their German users. They have also been forced to delete any data that has already been transferred from WhatsApp.

According to the data commissioner for Hamburg who issued the stop order, the 30 million German people currently using WhatsApp should have the option of whether or not they want to connect their account to Facebook. By forcing every WhatsApp user to make the link, users are deprived of the choice.

Which is apparently illegal under German data protection laws.

What is Facebook doing?

According to the new user agreement, Facebook is collecting a few specific details from WhatsApp – the names and numbers of people contained in your address book, who you call, and how long you speak for. They claim that this information can then be used to put WhatsApp users in touch with “relevant” businesses, and to help improve suggested friend recommendations on the Facebook social network.

Facebook has assured users that they will not be selling these details to advertisers, or sharing personal data publicly.

Don’t panic yet

WhatsApp and Facebook have stated that their data collection and sharing programmes are entirely legal – both at EU and local government levels. But following the German announcement, information commissioners in the UK and the US have also voiced concerns about the deal. Neither has yet confirmed whether there will be any further investigations or sanctions however.

For WhatsApp users, this all sounds pretty scary. Facebook’s disclosure seems fairly straightforward – but government reactions reveal the complexities of managing and controlling personal data in the social media age.

It is extremely important to note that neither WhatsApp nor Facebook have access to your calls or messages sent using the app however. Every communication is encrypted between you and the recipient so no one, including Facebook, can listen in.

Which means that even if Facebook changes their data sharing policies again in future, your most sensitive conversations will not be used in any way.

Time to tighten control of your personal data

The WhatsApp data sharing row is a timely reminder that your personal data is valuable, and it is being shared between providers. If you haven’t read every word of the terms and conditions for every app installed on your smartphone, you probably don’t know which are doing it though.
You can regain some of that control using Panda Mobile Security. This Android anti-virus app not only detects malware, but it also allows you to control the data access permissions for every app you have installed. You can control who can access your data, reducing the risk of becoming a victim of identity theft – or the target of determined advertisers and sales people!

The post Facebook banned to stop collecting users data on WhatsApp appeared first on Panda Security Mediacenter.

The Antifraud Card of the Future!

credit card

Whether you usually use a personal or corporate credit card, anyone can be the victim of a data breach. Criminals can easily use a phishing attack to take your card number, PIN and even the security code on the back of your card. What’s worse is that they’re so quick! By the time you’ve discovered the theft, it will be too late. Even if your company quickly cancels the card, you will already have some serious problems… the thief will have already spent your hard earned cash.

These kind of attacks happen more often than you think. In the first half of 2016 there were more than a million cases of financial fraud with the objective of robbing credit card data. This statistic is worrisome, without a doubt, especially considering that this number doubled the results from 2015.

This is where Motion Code steps in. This new technology was developed by the French company Oberthur and will revolutionize the way we make purchases. Its goal is pretty simple: to preserve your security by changing the security code on the back of your credit card, constantly.

How will they do this exactly? Well, unlike the cards we use now that have a tiny rectangle on the back with three secret numbers, Oberthur has proposed a solution: they want to substitute this rectangle with a small screen that changes the numbers every hour. At first glance, the credit cards are exactly the same, but instead of the security code changing every three years, the numbers change every hour.

This means that the cybercriminal won’t be able to steal a dime: by the time a phishing attack is completed and the data is stolen, the screen will have changed and the whole scheme will be a complete waste of time for the criminal.

It may be inconvenient for your employees to use these cards because they will no longer be able to memorize the security code on the back. But really, who cares? They will have to check the security code every time they use it, but this smallest effort could also bring them the most security benefits in your company.

The post The Antifraud Card of the Future! appeared first on Panda Security Mediacenter.

The Internet collapses, brings the world to a halt for a few hours

 

young man with glasses sitting in front of his computer, programming. the code he is working on (CSS) can be seen through the screen.

A massive cyber-attack against US DNS service provider Dyn knocked out major websites across the Internet last Friday. The attack shut down several websites, including Netflix, Twitter, Amazon and The New York Times. The Internet service was disrupted for almost 11 hours, affecting more than one billion customers around the world.

Cyber crooks are always looking for ways to exploit the latest, most innovative technologies to carry out attacks like those we saw just a few hours ago. Are we in the Age of Internet Attacks? The latest PandaLabs Quarterly Report already warned of the huge number of large-scale distributed denial-of-service (DDoS) attacks that have been occurring over the last few months, and the way many of them are exploiting botnets made up of not only computers but also smart devices like IP cameras.

The recent DDoS attacks reflect the new approach taken by Black Hat hackers when it comes to launching new, more devastating campaigns that combine everyday devices and malware to form highly dangerous armies ready to launch DDoS attacks.

Probing Internet defenses

Just one month ago, security guru Bruce Schneier, published an article with the most revealing title: ‘Someone Is Learning How to Take Down the Internet.’

The recent examples of denial-of-service attacks flood servers with useless traffic that overburdens Internet bandwidth and prevents legitimate users from accessing targeted sites. Attacked servers become saturated with the huge number of requests.

The article explained that the best way to take down the Internet is through a DDoS attack like the one suffered by Dyn, and how some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks, in what seems to be an strategy to gather information and see how well these companies can defend themselves.

A few weeks ago, the website of Brian Krebs, a US journalist specialized in computer security issues, was taken offline as he fell victim to the largest DDoS attack to date. He was only able to go back online after Google came to the rescue.

This attack adds to the list of those suffered by a number of tech giants over the last few months, such as the hack of 500 million Yahoo accounts back in September, or the theft of 60 million  Dropbox user IDs and 100 million LinkedIn passwords.

It is precisely the success of the Internet, with billions of connected devices worldwide, that makes it so appealing to criminals willing to exploit its vulnerabilities. Many of these devices lack basic security measures, making them easy prey for hackers and, in this context, any organization, media company or social networking service can become the victim of the next attack.

 

The post The Internet collapses, brings the world to a halt for a few hours appeared first on Panda Security Mediacenter.

DDoS attack on Dyn took down the bulk of the Internet on Friday

iStock_67356463_MEDIUM-1.jpg

Many of us noticed that some of our favorite websites were acting a little strangely on Friday. Perhaps your tweets were failing to load or your connection to Spotify was wonky. Instead of brushing this off as the result of any regular online bug or unreliable Wi-Fi, take a moment to realize that these sites’ behavior was caused by a massive online attack that wiped out a significant portion of the Internet for hours on end.

Point of Sale attacks through Terminal Server

img-tpvs

Some months ago we published a technical analysis of Multigrain, a Point of Sale Trojan that uses DNS petitions in order to exfiltrate stolen information. We also wrote about one case where this PoS malware was used to infect hundreds of restaurants in the United States.

At the end of September we have seen again activity, with new attacks infecting PoS with new Multigrain variants. However, unlike this previous attack that was targeting the same kind of victims in a region (restaurants in the US) now it looks like cybercriminals are trying to find new fields where they can maximize their profit. We have seen 2 waves of attacks which victims were companies from a number of countries:

  • Argentina
  • Belgium
  • Brazil
  • Chile
  • France
  • Germany
  • India
  • Ireland
  • Norway
  • Spain
  • Sweden
  • Thailand
  • UK
  • USA

They were from different industries, including the typical restaurants and hotels, but also others not that common in these attacks: Telecommunications, Business IT Services, Engineering, Cargo Insurance, Medical Services, Logistics, Accountants, Medical Services, Unions, Engineering and Industrial Machinery Suppliers.

Why the disparity in victim profiles? It looks like the attackers were not looking for these specific industries. All attacks have been perpetrated through Terminal Server, similar to what we have seen in other cases, using brute-force attacks until they can break into the computers and infect them with Multigrain. These are automated attacks, where cybercriminals start scanning the Internet looking for potential victims, and once located they launch the attack until they gain access.

Tips to prevent attacks in companies

In order to minimize the risk, companies must remember that these services, when possible, are better out of the Internet. In case there is a need for them to be in the open, be sure to use strong credentials (with a strong enough password you can basically avoid brute-force attacks), to use 2FA when possible, use non-standard ports and of course monitor all incoming connections from the outside.

 

The post Point of Sale attacks through Terminal Server appeared first on Panda Security Mediacenter.

How to keep your kids away from dangerous websites

When used correctly, the Internet is an amazing learning resource for your children. But just like any other “open” communications platform, there’s a lot of unsuitable content out there.

As a parent, you want your kids to get the most enjoyment and education from their time online. But you also want to limit access to illegal or undesirable content – at least until you are sure they have the skills needed to protect themselves online.

So which sites present a danger to your kids, and what can you do about them?

Social networking sites

Social media has taken the world by storm – and your kids want to get involved too. But there’s a reason that Facebook, Twitter and Instagram insist that their users must be aged at least 14 – there’s a lot of unsavoury content out there.

Despite this age restriction, many kids are lying about their age and signing up anyway. Which means they are opening themselves to unsuitable content or approaches by criminals.

The most effective way to prevent these problems is to simply block access to social network sites. The Panda Gold Protection antivirus allows you to do just this on your family’s computers.

Warez and torrents

Software piracy is a major problem as criminals share games, videos and software online illegally. Downloading these files – sometimes called ‘warez’ – is completely illegal and could see you prosecuted in court.

It is not unusual for these files to be compromised with malware either. Malware that can steal your personal data, or destroy your computer.

It is vitally important that you prevent access to warez sites, as well as those listing torrents – the tool used to download these files. Your

You should seriously consider blocking access to illegal content for the adults in your house as well the children!

Chat and unrestricted message boards

Online communities aimed at kids, like Club Penguin and Minecraft, tend to be very proactive at detecting and blocking adults who attempt to use the platform for grooming and exploitation. Other “open” forums are not so well managed.

Sites like Omegle and ChatRoulette are notorious for problems for instance. Users are connected randomly for text and video chat – so you have no idea who your kids are talking to – or what they might see. And the same is true of virtually any open chat forum.

Again, you should help your kids understand where to find “safe” online communities, and to avoid those that could be dangerous. You can back this up by blocking access to unmoderated sites, or which are simply unsuitable for children.

Managing access isn’t as hard as it sounds

Blocking access to dangerous sites sounds time consuming and difficult – but with the right internet security tool, the process is actually very easy.

Panda Gold Protection gives you a number of topics, and you simply select the list that applies. So if you want to stop kids accessing sites about tobacco and smoking, you apply that list to your account.

These block lists are centrally managed, and updated regularly. So as new sites and services become available, they are blocked automatically. And once you are sure your kids are mature enough, you simply deselect the lists to restore access.

Need to know more? Ask us a question.

The post How to keep your kids away from dangerous websites appeared first on Panda Security Mediacenter.