Tag Archives: featured1

Cybercrime Reaches New Heights in the Third Quarter

pandalabs-q3-header

Cybercrime isn’t slowing down anytime soon. This quarter, cybercriminals were increasingly more ingenious, using innovative technologies and new tools to spread their wares. According to the PandaLabs report, 18 million new malware samples were captured in this quarter alone, an average of 200,000 each day.

The wave of sophisticated attacks used this quarter confirm that Ransomware attacks and the theft of data (that is sold on the black market) are the most-used tactics this quarter. We also witnessed increasing DDoS attacks, interference with the Internet of Things (such as connect cars), along with a new kind of ransomware attacks that are focused on iOs-based mobile devices.

Ransomware and the Evolution of Cybercrime

According to the National Crime Agency of the United Kingdom, cybercrime currently makes up more than 50% of the crimes committed in the UK.

graphs_hacker

In addition to the traditional infection techniques via exploits and spam, there are some other extremely effective techniques, specifically directed at businesses. We saw this in September when a group of attackers successfully installed the Crysis ransomware on a French company’s server.

graphs_imgtexto-videojuegos

Cybercriminals struck gold when they started compromising game sites. Millions of people have been victims of these kinds of attacks including users of the pornographic website Brazzers, who suffered a security breach where 800,000 users’ data was stolen.

graphs_imgtexto-tpv

 

PunkeyPOS and PosCardStealer have become the biggest nightmare for Point of Sale terminals in establishments, mainly in the United States, and compromised client credit and debit card data.

graphs_imgtexto-banco

In August, SWIFT released a statement that revealed that many attacks similar to the Bangladesh one are taking place. They did not include exact amount stolen and number of attacked banks in their statement. What is mentioned, however, is that these financial entities did not have adequate security measures in place.

graphs_imgtexto-troyano

Lately, the ransomware attacks on iPhones and iPads are increasing. But in contrast to their Windows counterparts, the cybercriminals do not use malware for these attacks. Instead, they use the victim’s AppleID and password (usually obtained through phishing) to ask for a reward from the “Find my IPhone” application.

If you would like to learn more about the biggest data thefts in history (like the recent attacks on Yahoo and Dropbox), stay updated about the latest DDos attacks, learn more about the hackable IoT devices, or stay informed about the cyberwar evolution, please download our quarterly PandaLabs report.

 

Download PandaLabs Report Q3:

International Edition
flag_of_russia-svg Russian Edition

 

The post Cybercrime Reaches New Heights in the Third Quarter appeared first on Panda Security Mediacenter.

Malware posing as Dual Instance app steals users’ Twitter credentials

Do you have more than one Twitter or WhatsApp account? If you answered yes, do you want to log in to these multiple accounts at the same time? Up until this point, logging in to multiple social media accounts at one time has only been possible by using more than one mobile device. Dual Instance is a technique that allows you to run more than one instance of a mobile application simultaneously. As we know, it never takes malware authors long to catch on to new trends, so cybercriminals have recently taken it upon themselves to create malicious versions of Dual Instance apps.

US presidential debates and cyber security.

pandasecurity-us-election-cyber-security

What we’ve learned from the first two debates and what to expect from the last one?

One of the major questions discussed during the 1st presidential debate between Donald Trump and Hillary Clinton was about cyber security. We were secretly hoping that questions about cyber safety will be part of the topic list in the 2nd debate too but unfortunately this was not exactly the case.
Discussions around Donald Trump’s recently leaked “locker room talk” recording ended up being a bit more entertaining for the moderators than the cyber future of the free world. However, we hope the cyber security topic will be discussed again in the third and final presidential debate scheduled for later today.

The next president of the United States of America will have to make some hard decisions. See what they are below;

Government and private institutions are under attack!

Both candidates admitted that there is a 21st century war that is happening right now and right here in the USA. Even though that USA is certainly one of the dominating powers in this area, secrets are being stolen from both public and private sectors on a daily basis.

Hundreds of thousands of people and businesses are being affected by cybercrimes every year.

Who is behind it and how to tackle the problem?
According to Hillary Clinton, the threat is coming from organized cyber gangs as well as states. Even though there is no hard proof, there’s been speculation that North Korea, Iran, Russia and China have been behind some of the cyber-attacks executed on US soil. How are these issues going to be dealt with? Stay tuned.

How dangerous are whistle-blowers?

This is the question we will most likely see tonight. Pressuring Ecuador to cut off the internet of Julian Assange is not doing USA any good. Countries such as Russia welcome whistle-blowers. Are whistle-blowers heroes protecting the first amendment or traitors? We would love to hear the thoughts of the next president of the USA.
Being president of the free world is arguably one of the toughest jobs in the world.

Just one thing is sure, the debate later today will be fierce!

The post US presidential debates and cyber security. appeared first on Panda Security Mediacenter.

This palm-sized device will supersize your security.

Panda-Security-ORWLWouldn’t you like to get your hands on a tough little device that will boost your business’s security? Meet ORWL, a circular computer device that is engineered to top-off your computer’s security.

A great number of companies have been victims of data leaks because of an insider or cybercriminal who had physical access to their computers or devices. Once a cybercriminal entered your computer, they can access the internals of your computer, tap and leak information, and even hide malicious eavesdropping devices.

After two years of work and a successful crowdfunding campaign, the company Design Shift has designed a device that can identify attack attempts. It prevents undetected tampering of its electrical components and, if tampering is detected, the device immediately erases all data (even when the device is unplugged).

It also acts like a safe vault for your information, only allowing access to your system once the device is unlocked with both a physical key and a password. If the physical key is far from the device, the USB ports automatically deactivate, preventing a cybercriminal with physical access to infect it with malware. ORWL also verifies the integrity of all firmware prior to boot, using a battery-backed secure microcontroller. ORWL isn’t just robust, it’s pretty much impenetrable.

This super-secure computer is complex, but it’s also an open source product, and its inner workings are available for everyone to see.

We continue to witness a large number of sophisticated cyberattacks on banks and ATMs due to a combination of system vulnerabilities and insiders with physical access.  ORWL answers a large part of our problems in terms of physical attacks. In respect to software, which is always a weak point, you can ensure your security and make yourself indispensable with the right kind of solution.

 

 

 

 

The post This palm-sized device will supersize your security. appeared first on Panda Security Mediacenter.

Protect Your Privacy in Windows 10 Anniversary Update

pandasecurity-antivirus-pc
The Windows 10 Anniversary Update has arrived, marking the first birthday of Microsoft’s “last operating system”. As promised, the update contains a raft of new features, bug fixes and enhancements.

And taking their promise to improve security and privacy, Microsoft has been quick to emphasise advances in both areas.

Going biometric

One of the flashiest features of Windows 10 is Windows Hello – the biometric login protection system. Compatible devices allow you to log into your computer using a fingerprint – or by snapping a picture of your face using the built-in webcam.

These local security provisions are incredibly hard to crack, reducing the likelihood of someone cracking your password. The latest update is also supposed to have improved the speed of login, so you can start using your computer more quickly.

Behind the scenes

Windows Defender, an anti-virus scanner built directly into Windows, has also received some attention. The tool is intended to protect against software threats to your privacy from the web, the Cloud, or in your email.

According to Microsoft’s own advertising, Windows defender is the only anti-virus tool you need. But are they right?

There are gaps in Microsoft’s armour
According to reviews by independent news websites like CNet, Windows Defender performs relatively well in terms of identifying and removing malware. They do point out however that the tool lags behind specialist antivirus tools, allowing some malware to escape its detection routines.

Windows 10 is undeniably more secure than any of Microsoft’s previous operating systems. But on its own, Windows Defender cannot provide complete protection for your PC running the Windows 10 Anniversary Update. In the last laboratories test (Avtest.org, av-comparatives.org,…), Defender remains in the tail of the antivirus, with reallylow detection rates

There is also the issue of social engineering, where cybercriminals try and trick you into installing malware. Phishing emails from your bank are a classic example – click the links in a forged email and you will be prompted to install an application that is supposed to verify your account, or add online banking features. The reality is that you are being tricked into infecting your computer.

Which means that you really need a second, complementary security package in place to plug the gaps.

Choosing a security tool like Panda Antivirus for Windows allows you to protect against advanced threats, like malware hidden on websites. The parental controls settings allow you to prevent access to risky websites for instance, while the built-in scanner can detect and block viruses and malware as they try to install themselves.

And when the worst happens?

There is always a risk that a brand new virus infects your computer before anyone can release a patch to block it. With the all-new ransomware variants on the loose, it could be that your files are encrypted before the antivirus scanners detect the infection.

The only solution in this situation (other than paying the ransom) is to restore your files from backup. Sophisticated ransomware can also encrypt your Windows backups – so an add-on solution, like the backup function in Panda Antivirus can help. These backups offer additional protection against malware, even uploading critical information from the cloud where it is out of reach by the malware.

These additional backup tools offer a way to get your files back quickly and easily in the event of an infection.

And what about the rest of the devices we have at home?

Today a big danger is to forget to protect the rest of the dives we have at home like Mac, iMac, iphones, Adnroid devices. Windows Does not provide multiplatform security solutions and today is it mandatory to protect smartphones

Security has been tightened in Windows 10, and again in the Anniversary Update. But no platform is ever completely secure – you will always need a second tool to maintain security and privacy. To learn more about securing your PC after the Windows 10 Anniversary Update, click here to download a free trial of Panda Security Complete Protection.

The post Protect Your Privacy in Windows 10 Anniversary Update appeared first on Panda Security Mediacenter.

Can we trust our computers? Many have been tampered with during the manufacturing process.

3How can you prevent a manufacturing sabotage from becoming an IT disaster? Securing your company’s network with the right protection measures isn’t always enough. Of course you should install an adequate protection system and ensure that your employees use robust passwords. However, there is something that we cannot control: the manufacturing process.

Did you know that your business’s computers can be manipulated during the manufacturing process? A cybercriminal’s network is very sophisticated. In fact, these hackers have accomplices allover the world, including in factories where parts are produced (like microchips). Since the products are tampered with before the computer is finished, no one really suspects that the pieces are infected after they’re installed.

Luckily, manufacturers have discovered a complex solution that can beat this scheme. A new system was proposed by Siddhard Garg, a computer engineering professor at NYU. He believes that for the tightest security the microchips should be strategically manufactured in different phases.

Garg’s proposal makes it so that cybercriminals never know exactly where the piece will be created, making it difficult or impossible to carry out their plans.

Math makes the difference

Garg’s proposal isn’t a new one. In fact, this idea of distributing the manufacturing process to various factories is already being practiced. However, this professor has gone a step further; his method requires advanced mathematics. Instead of randomly distributing the microchip production, this will ensure the greatest security without heavily increasing the production costs. Garg’s system doesn’t just aim to prevent microchip tampering, it will also stop the production of counterfeit parts that affects both manufacturers and buyers.

With this method, since you aren’t building an entire chip in a same factory, there is no finished design to steal and copy.

The post Can we trust our computers? Many have been tampered with during the manufacturing process. appeared first on Panda Security Mediacenter.

Which are the best mobile messaging apps?

pandasecurity-best-mobile-messaging-apps
There are dozens of messaging apps available for your smartphone, each with its own strong points. This guide will help you understand which are the best – and how to use each one securely.

Best for – Apple users

Built into every iPhone and iPad as standard, Apple’s iMessage app is a safe and secure tool for staying in touch with friends and family. You can send text, photos and videos quickly and easily – and your messages are encrypted to prevent people snooping on them.

The only drawback is that iMessage only works on Apple devices. So if your friends have Android handsets, you won’t be able to contact them this way.

Staying safe: Make sure you have a passcode enabled on your phone. You should also consider disabling the message preview on your lock screen.

Best for – picture messages

Despite the controversy about how teens may be using the app to send inappropriate pictures, Snapchat remains a useful tool for picture messaging. You can add sketches or text to your photos to make sure people understand your messages.

Snapchat is available on iOS and Android, so you can stay in touch with all your friends.

Staying safe: Just because Snapchat deletes your pictures automatically, don’t assume that they cannot be recovered or saved. Think very carefully about the potential consequences before sending explicit or embarrassing snaps.

Best for – the most users

An add-on service to the social network, Facebook Messenger boasts well over a million users. So if your friends have a Facebook account, they will also be available on Messenger.

Facebook Messenger is available on iOS, Android, Windows Mobile and Blackberry smartphones, as well as any internet connected PC. You can also make voice and video calls using the app.

If you really need the message to get through, Facebook Messenger is a great option.

Staying safe: Facebook has added end-to-end encryption to Messenger, but it is not enabled by default. You must switch this feature on to prevent your messages being intercepted – and to stop Facebook snooping on your conversations.

Best for all-round connections

It may seem like it sometimes, but not everyone has a smartphone. Although you can always rely on traditional SMS, the messaging cost can quickly escalate.

WhatsApp uses your phone’s data connection, allowing you to message with your data allowance, or when connected to a WiFi network. As well as being available on all the major smartphone platforms, the app can also be installed on older/less powerful devices running Symbian. Which means you can message even more people – for free.

So if your friends are resistant to technology, WhatsApp could be what you need to stay in touch.

Staying safe: WhatsApp has struggled with security problems in the past, so you will need to have an additional tool to identify potential problems and block malware/loopholes. Panda’s Mobile Security toolkit can help provide that cover. You should also check to make sure that end-to-end encryption has been enabled, and that you have disabled data sharing with Facebook to protect your privacy.

Staying connected – and safe

These messaging apps will help you stay connected. And when it comes to staying safe, a little common sense goes a long way:

• Always make sure your phone is protected with a pass code.
• Never share information that is sensitive or embarrassing.
• Install a security app to prevent malware or hackers from stealing your data

And that’s it. Have fun!

The post Which are the best mobile messaging apps? appeared first on Panda Security Mediacenter.

Bye Bye BlackBerry. There’s a new kind of smartphone security.

BlackBerry

BlackBerry used to define the Smartphone sphere. Once popular for its physical keyboard and exclusive-for-users IM service, now BlackBerry has been left out in the cold. The Canadian company recently announced that they will no longer make the devices. However, they will continue to market the phones that will be manufactured by other companies. So, why buy a BlackBerry in 2016?

Because they’ve got an incredible reputation for security (as a matter of fact, many government officials use BlackBerry devices for that reason). In 2000 the brand was known as Research In Motion (RIM) and offered Subscription-based emailing. At this time, all emails sent and received by BlackBerry phones had to pass through highly-protected servers. This means that an attacker wouldn’t be able to intercept the phone’s messages. This encryption measure is pretty common in today’s phones, but it wasn’t 16 years ago.

User security remains a priority for BlackBerry. They have hardened security in their newest model, the DTEK50– a Smartphone manufactured by Alcatel that’s running on Android.

The phone is also named “the smartest smartphone in the world” and has a number of security-related features. This super secure Smartphone encrypts its users’ photographs, bank information and also uses the software necessary to store passwords safely. It also notifies its owners if someone uses the camera remotely to take photos or videos, or if the microphone is being used to record conversations.  

Most businesses think about security when building their IT infrastructure. By focusing exclusively on the corporate environment, BlackBerry is going back to its roots, and for good reason: it doesn’t matter who continues to make BlackBerry phones, the company still promises to enforce the strongest security possible.

 

The post Bye Bye BlackBerry. There’s a new kind of smartphone security. appeared first on Panda Security Mediacenter.

No password? You’re asking to be hacked.

75 million smartphones in the US don’t have their passwords set on

TransUnion’s latest Cyber Security Survey confirmed that Americans who feel extremely or very concerned about cyber threats have increased 20 percent since last year – from 46 percent in 2015 to 55 percent in 2016. Fears are legitimate – hacking and cyber security have even become one of the main topics in the presidential debates between Donald Trump and Hillary Clinton.

If you think this is surprising keep reading, the most shocking part of the survey is not the fact that its’ findings confirm the notion that we are constantly under cyber danger/attack – we already know that. The most shocking part is the facts that despite the increasing fear, nearly 50% of the participants admit that they don’t take actions to protect their content.

Nearly half of the people who participated in the survey admitted they don’t lock their phones with a password.

Let us translate this for you – currently there are nearly 320 million people legally living in the USA with about 225 million of them being adults. More than two thirds of the adults living in the US have smartphones. If the statistics are right, a quick math shows there are more than 75 million people in the US whose smartphones don’t have their passcodes set on. This is scary! This means two out of the three Kardashians don’t have passcodes on their phones! What could go wrong? We will let Kim and Kanye tell you.

What should you do?

Setup a password on your cell phone.

We all know what the consequences of identity theft are – unless you want a stranger buying a car in your name, or leasing a property in a city you’ve never heard of using your SSN, you should go find your phone and setup your password on, right now. Then add a recurring reminder on your calendar to change it frequently!

Admit the problem.

The threat is real and hundreds of thousands of peoples’ lives are being ruined by hackers stealing their precious information. Having a lock on your phone might be a good beginning but it does not solve your problem entirely.

Find a solution that works best for you.

The option we recommend is Panda Security Antivirus.Downloading your copy of Panda Security antivirus will protect you from getting your email hacked, and it will keep your credit cards, personal information and cell phone safe.

According to TransUnion about 1 million people will call TransUnion Fraud Victim Assistance Department in 2016. Let’s hold hands together, be more protective of our personal information and decrease the number of calls they get by practicing common sense. It’s natural to want to protect ourselves, but it is hard to wish to protect what we have if we don’t realize that the threat is real. The most astonishing results come from taking practical, protective actions before things go wrong. Let’s not get to the point where we are in need of calling the fraud department by acting now and protecting our personal information early rather than late.

The post No password? You’re asking to be hacked. appeared first on Panda Security Mediacenter.