Tag Archives: featured1

Advanced Reporting Tool, an Intelligent Control Platform

art-main

A platform that can detect a company’s internal threats? Many organizations and companies could have avoided major scandals if they acted in time: there’s the case of Snowden and the stolen NSA files, Bradley Manning and the US diplomatic cables, and Hervé Falciani and top-secret information from the HSBC private bank. These are all clear examples that, with cybersecurity, you can’t just cross your fingers and think “this won’t happen to me”. Any business could be threatened by an insider.

That’s why Panda Security has introduced the latest version of its Advanced Reporting Tool. This efficient and easy-to-use tool satisfies business needs; it is capable of maximizing Big Data performance to control the corporate resources.

Threats in the Workplace

PandaLabs detects 200,000 samples of new malware daily. It is imperative for businesses to control all security issues, especially those that stem from the misuse and abuse of corporate resources, leading to attacks, threats, vulnerabilities, or data leaks.

art-2

 

While Adaptive Defense collects all information on processes running on the endpoint, the Advanced Reporting Tool automatically stores and correlates this information. The platform automatically generates security intelligence that allow users to identify strange behaviors or problems.

 

 

The Advanced Reporting Tool enables the IT administrator to:

  • Focus on relevant information, increasing efficiency in the IT department by finding security risks or misappropriation in the corporate infrastructure.
  • Pinpoint problems by extracting behavior patterns from resources and users, identifying its impact on the business.
  • Alert in real-time about all events that could be a potential data breach.
  • Generate configurable reports showing the status of key security indicators and how they are evolving.

What does the latest version offer?

art-1In addition to the existing Big Data Cloud Service and its real-time alerts, the latest version includes predefined and adaptable analysis with three different action areas:

  • Information about IT security incidents: generates security intelligence then processes and associates those events as intrusion attempts.
  • Controls network applications and resources: detects user patterns of IT resources.
  • Controls access to business data: shows any access to confidential information and its online traffic.

 

Feedback from SIEM system

For organizations already using a SIEM, the Advanced Reporting Tool compliments it providing a SIEMFeeder which feeds your SIEM relevant data and associates it with the information you already have.  The SIEMFeeder gathers information from all endpoints that are protected by Adaptive Defense.

The feedback provided by the SIEMFeeder enables you to detect insiders before they become the biggest threat to your business.  The SIEMFeeder creates behavioral logics and locates all anomalies existing in your technological system.

The post Advanced Reporting Tool, an Intelligent Control Platform appeared first on Panda Security Mediacenter.

Got something to hide? Don’t pixelate it.

pixelate Many businesses share documents that are pixelated in order to protect private information, whether they be bank account numbers, photographs or other private information. Although pixelation used to be a simple and sufficient way to hide confidential information, now computers are smart enough to read these distorted images—even when your eye cannot. Pixelated documents are no longer safe!

Researchers from the University of Texas and Cornell Tech have developed software based on artificial intelligence that is capable of reading standard content-masking techniques (like blurring or pixelation) in order to read what was originally covered up.

One of the authors, Vitaly Shmatikov, warned that, aside from the complex technical developments, “the techniques we’re using in this paper are very standard in image recognition, which is a disturbing thought.”

But these researchers aren’t the only ones developing this type of software. More powerful object and facial recognition techniques already exist for those who want to use them. This means cybercriminals may already have the tools to unveil private information you thought was hidden.

pixelate

To carry out their research, the team fed neural networks images with faces, words and objects. The more times the neural networks “see” these images, the easier they can recognize them. After successfully memorizing the photos, the neural networks were able to successful defeat three privacy protection technologies including YouTube blurring technology, pixelation and Privacy Preserving Photo Sharing (P3).

In conclusion, pixelating or blurring information is no longer the best way to share confidential documents. After this research, the software was able to recognize 80% of the distorted images.

According to Lawrence Saul, a machine learning researcher at the University of California, San Diego, “For the purposes of defeating privacy, you don’t really need to show that 99.9 percent of the time you can reconstruct. If 40 or 50 percent of the time you can guess the face or figure out what the text is then that’s enough to render that privacy method as something that should be obsolete.”

To keep you corporate information safe, the best you can do is avoid sharing it (if you can) and above all, protect it with the appropriate protection for your company.

The post Got something to hide? Don’t pixelate it. appeared first on Panda Security Mediacenter.

Smart cities with Invisible Dangers

Smart-Cities

Smart cities are a real thing—could you live in one? Do you live in one?

Actually, a smart city is an “urban development vision” used to manage a city’s assets by integrating multiple information and communication technology (ICT) and Internet of Things (IoT) solutions within the city. A smart city’s ultimate goal is to improve the quality of life for its residents.

With just an internet connection and one of the endless number of devices available, residents can do a multitude of things like pay parking meters and purchase movie tickets.  Did your device run out of battery while you were on-the-go? Go ahead and hook up to one of your city’s many public charging stations.

Yes, a properly planned smart city can make life more convenient, but this is also a double ended sword. However convenient, in regards to internet security, it is very dangerous. At the end of any given day, there’s a high possibility that any one of these connected devices could be hacked, while criminals getaway with your top private information.

Danger wherever you look

City Bikes

The next time you take one of those public bikes for a spin, keep in mind that these electric bike stations are run by a computer… a computer that can be hacked like any other connected device. You’ll see that at each bike station there’s a small computer screen for riders to register, recharge passes, report incidents, and map the other stations in close proximity. But like any other computer, cybercriminals can use a lot of different techniques to take advantage of any vulnerability that these systems might have.

On these payment screens, in the maps section, there are various (public) sections on the platform, such as “Report an Error” “Privacy Policy” and “Terms of Use”. When these are tapped, an internet explorer window pops up. From there, the cybercriminals have access to a virtual keyboard—this will ultimately give them the power to execute those unwanted applications. This is the start of their hack—now they can access and collect info belonging to all those wanting to rent a city bike, getting their full names, verified email addresses and phone numbers. Some hackers will be able to steal customer payment data, too.

Taxis

New York City’s famous yellow taxi has jumped on the “smart experience” bandwagon. Aside from the tourist maps, Broadway ads and business cards that fill the back seat of the yellow cabs, passengers can use the tablet attached to the Plexiglas divider separating you from the driver. Go ahead and read the news during your commute, and when you arrive at your location, and make your payment from the same device.  Just remember, if a cybercriminal gets in the back of this cab he could successfully install malware and gain access to a lot of customer information. Likewise, remember to watch out for the public chargers in the taxi. Just imagine all the people whose privacy could be in danger.

We leave you with a last note, if a city wishes to become a smart city, installing these intelligent devices requires that all businesses commit to the necessary security measures to safeguard government and public privacy. Keep your citizens safe by following adequate security assurances.

 

The post Smart cities with Invisible Dangers appeared first on Panda Security Mediacenter.

Is it safe to connect to a public Wi-Fi hotspot?

Is it safe to connect to a public Wi-Fi hotspot?

Enjoy going for a drink at your local coffee store whilst getting some work done or browsing the web? With more and more cafes, bars and libraries these days resembling public workspaces and free Wi-Fi feeling like an essential part of daily life, it is very easy to go to a local café and feel at home.

But are public Wi-fi hotspots really safe places to browse the Internet or do we have to be on high alert anytime we’re online in a public place?

Let’s have a look at some of the dangers one faces when connecting to a public network:

Page Spoofing

 It’s easy to take for granted that a venue’s network actually belongs to that specific venue.

How many times have you sat down at a cafe and connected to the venue’s network at the click of a button? It’s this simplicity that hackers take advantage of when creating a malicious access point.

It’s very easy for an attacker to create a fake page that looks very much like the real thing. For example, when you sign up to the network you may be redirected to a Facebook sign in page. This could potentially be a fake, and entering your details would send them straight to the cyber attacker.

Luckily there are small indicators that can help us, on most occasions, to know if a page is definitely a fake.

Facebook for example, encrypts all data sent to its pages by connecting its users via SSL.

If any page that typically connects through SSL doesn’t show a padlock next to the page address it’s best not to give personal details!

Sniffing Apps

In an open network it is very easy for an attacker to capture the data traffic sent from your device. In fact, there are free easy to use apps, called “sniffing apps”, dedicated to this very purpose.

Although the common WPA2 routers do encrypt connections, these apps are capable of sniffing out the PSK (password). If an attacker does this they can then decrypt all traffic connected from a device to the network.

These risks have actually led police in Derbyshire in the UK to release a statement this month on the growing dangers of cyber crime:

“The UK now has more than 300,000 public Wi-Fi hotspots, which means more people than ever before are potential targets for cyber criminals, simply because they don’t know how secure the networks they’re using are.”

Third-Party Data Gathering

Sadly, even when you’re connected to a venue’s actual network you have no guarantee of privacy. In fact, venues often use their public Wi-fi hotspots to gather information about consumers.

Though third-party data gathering isn’t likely to end up with your passwords or your identity being stolen, your personal details are often being taken without your consent.

Whilst most venues directly ask a customer for an email address or number in order to access their Wi-fi, some go the extra mile of injecting cookies into your device’s network in order to track your browser history, typically resulting in an onslaught of targeted ads.

A great way to protect yourself against these attacks as well as against sniffing apps is to use a VPN (Virtual Private Network) service. This will ensure that all data traffic from your device is encrypted, whether the page you’re visiting is secure or not.

Another step that can be taken is to use a personal mobile broadband dongle, which, though slower, can be used in public spaces and is less likely to be compromised.

The best bet always, however, is simply to avoid sharing personal information, especially bank details, when on a public network. Stick to that principal rule and you should be ok.

Happy browsing!

The post Is it safe to connect to a public Wi-Fi hotspot? appeared first on Panda Security Mediacenter.

Struggling with your Panda security subscription renewal?

How to renew your Panda antivirus subscription?

Renew your Panda Antivirus it’s easier than you think. Here’s how to do it.

pandasecurity-renew-antivirus-infographic

You can renew your subscription in three ways:

1.Go to Panda Security’s website.

On the homepage, go to “My Account” ➡ “Product Renewal”. To access your Renewals area you’ll have to enter your email address and customer ID. You can find your customer ID in the welcome email that you received after purchasing your product.

If you can’t find your customer ID, don’t worry. There are other ways to renew your subscription:

2.Open your antivirus, go to “My Products” and click the Renew option.

Alternatively,

3.Renew your subscription from the renewal notices

Renew your subscription from the renewal notices you will receive at your mailbox or from the pop-up messages displayed by your antivirus.

Once in your personal area, select the protection whose subscription you want to renew. You will receive an email with a new activation code. Then, enter the new activation code in “My Products” ➡ “I have an activation code”. The next time you open your antivirus your protection will have been extended.

Follow these simple steps to remain protected!

The post Struggling with your Panda security subscription renewal? appeared first on Panda Security Mediacenter.

Apple Macs – more secure, but not invulnerable

pandasecurity-apple-macs-not-invulnerable

Over the years, Apple computers have developed a reputation for exceptional security. In fact, many people believe that Macs are completely invulnerable to malware, like viruses and ransomware.

But in an age where cybercriminals are using increasingly sophisticated attacks to break into computers, Apple owners need to know the truth.

No computer is 100% secure

The first thing to realise is that Apple computers are not completely hack proof. No computer is completely hack proof. It is completely untrue to say that Apple Macs cannot be hacked, or be infected with malware.

In fact, one of the first viruses ever created was targeted at the Apple II computer back in 1982. The virus was relatively harmless – it simply displayed a rather childish poem on screen. But the reality was that the computer’s built-in security had been breached.

More malware followed over the years, each becoming more serious as time went on.

OS X significantly improves security

With the release of OS X in 2001, Apple significantly improved the security of their operating system. The core of the operating system made it much harder for malware to install itself – and it was around this time that Apple began to attract a reputation for being 100% secure – one they did little to dispel.

Interestingly, there has been roughly one significant item of Mac malware released every year since 2004. But the fact that there are less viruses targeting OS X than Windows, helped drive the legend of invulnerability. In most cases the only way to “catch” one of these viruses was to install illegal software from a “warez” website.

Ransomware – a true game-changer

Like its Windows-based relatives, most Mac malware was designed to steal personal information. However these viruses were relatively easy to identify and remove – often before any real damage was caused.

The emergence of ransomware has completely changed the game however. These malware infections encrypt the files stored on your Apple computer so that you can no longer read or use them. The only way to decrypt them is by paying a ransom to the cybercriminal behind the infection.

Eventually the ransomware infection will make all of your files unreadable.

There’s still worse to come

Cybercriminals are also creating new attacks that use a number of different techniques to trick you installing their malware. An infected email may be followed by an official-sounding phone call for instance, encouraging you to download and install an application to assist with internet banking, or to troubleshoot a technical issue.

Hackers are also becoming more patient, sometimes spending days and weeks building trust with their victims, using a technique known as “social engineering”. Which makes these attacks all the more subtle and effective.

Mac anti-virus software is no longer optional

When Mac malware was relatively rare, the chances of your computer becoming infected were slim. Mac malware is becoming more common and sophisticated – so all of your computers need to be protected with a comprehensive security package.

Panda Antivirus help to block malware and ransomware before it can be installed on your computer. It will also help to protect against social engineering attacks – you won’t be able to install dodgy software, even by accident.

To learn more about how to protect your Mac, download a free trial of Panda Mac Antivirus now.

The post Apple Macs – more secure, but not invulnerable appeared first on Panda Security Mediacenter.

“Securing a business involves so much more than plugging in various pieces of computer technology”, Simon Edwards

guest article panda

I met Simon Edwards in January 2007 at the first AMTSO meeting in Bilbao. For many years, Simon dedicated himself to testing security products for Dennis Publishing and, at the time, he was also the technical director of Dennis Technology Labs. The prestige gained over the years has made him a recognized authority in this sector.  Less than a year ago he began a new career path when he started his own business, SE Labs.

1 – Since your time as the editor of the Computer Shopper magazine, your life has been linked with computer security. What has your experience been like in such a changing and innovative industry?

simon-edwards-mediumres

Simon Edwards, founder of SE Labs

I have always approached the security business from an ethical position because we genuinely want to make a bad situation better. We do much more than testing anti-malware products. We provide threat intelligence to very large companies and, in the UK, the insurance industry uses our information to make important decisions. That is a new diversion from testing, but we do still test security products and that feeds back into the threat intelligence information we provide. We didn’t set out to create a security testing business from day one, though.

When I was first asked to write an anti-virus group test I thought about how to do it, but without any input from other testers or even the companies that made anti-virus programs. In complete isolation from the experts I came up with a method of testing and found that some well-known threats could bypass anti-virus, particularly those that were more like Trojans and hacking attacks rather than standard self-replicating ‘viruses’. That was interesting.

The response from the readers was fantastic and every time we published such a test we sold more magazines than in a usual month. The anti-virus industry was less pleased and I received aggressive phone calls from some people who, today, I actually count as very good friends. We just had to get to know each other and develop trust.

I think that the default position the security industries take, when confronted by challenging results from a new face, is to attack. “We don’t know this guy and he’s saying our product sucks? He must be an idiot, or corrupt!” Nothing much has changed on that front. At least now people know SE Labs creates useful tests and works ethically. Well, most people do. There are some companies, particularly new ones, who are still working out what’s what. They assume that if you don’t support their marketing message then you are an enemy with a biased agenda.

The default position the security industries take, when confronted by challenging results from a new face, is to attack.

One big change is that vendors are starting to see the usefulness of testers really attacking systems, rather than just scanning regular malware that exists on the general internet. We were running hacking attacks in tests back in the days of Back Orifice 2000  and we also used other tools that the bad guys had access to. At the time that was extremely controversial, as the industry had a general view that creating threats was taboo. Many still feel that way, but we’ve been crafting targeted attacks for testing purposes ever since, and it seems fair considering how many products claim to prevent such things.

2- What is like to be an entrepreneur? Are you still able to perform the tests yourself or has management become the main part of your day-to-day?

I personally review every set of data that powers the tests that we publish, and I also develop the test methodologies used by the talented testers who actually sit in front of the systems and put the products through their paces. The ongoing testing and general office tasks are managed by the SE Labs team in London. Once a test is up and running I trust the team and spend most of my time doing one of a million other things. What’s really cool about setting up a company from scratch is that there are so many creative tasks to carry out. But, as we’ll see, there’s also a load of nonsense to contend with too.

When you are running a company on your own you make decisions about literally everything. One day I would be negotiating six-figure finance deals and then I’d be fielding questions about teaspoons. I spent literally half a day in Ikea arguing with colleagues about which cutlery sets to buy.

There is a lot of emotion and some immaturity in this emerging ‘next-gen’ industry.

Back to testing, I have spent a large amount of time trying to work with the newer companies in the industry. Some of them can be reluctant and I understand why. Startups are vulnerable and a poor result could kill a business before it even starts. That said, some of the aggressive marketing we’ve seen very much invites testing to challenge quite extraordinary claims. There is a lot of emotion and some immaturity in this emerging ‘next-gen’ industry. That needs to stop, because it does not serve the customers.

3- As Director of SE Labs, does your work continue to surprise you on a daily basis? Do you have to adapt your tests to the type of attacks that appear frequently? 

A fundamental part of what we do is to seek out and use prevalent threats. Theoretically every product should score 100 per cent in our tests because we’re not using threats from the edges of the internet or zero day threats. So it’s always been quite surprising to me that most vendors don’t score 100 per cent. It’s well-known in the security world that a test in which everyone scores 100 per cent is useless. I don’t think that’s true, as long as the test comes with a good explanation of what it’s trying to achieve.

But regardless, if I throw 100 well-known threats at the leading anti-malware products I know there will be compromises. And that still surprises me. We work with many vendors to help them fix these issues.

4- In addition to traditional security solutions, in the past few years several new solutions have appeared on the market with names like “Next Gen AV” that use a different approach to protect businesses. Have you had the opportunity to try one of these solutions? What has your experience been like?

We have managed to gain access to some so-called ‘next-gen’ products and I know what you’re expecting me to say! But they are not the snake oil that their crazy marketing suggests. They are proving to be competent solutions. I don’t think I’d want to run many on my systems without some other form of anti-malware, but they are not the ‘smoke and mirrors’ fake solution I think many people assume. They are not perfect but neither are they rubbish.

It’s always been quite surprising to me that most vendors don’t score 100 per cent.

5- There are also solutions from “traditional” manufacturers within the EDR category (Endpoint Detection and Response). Have you had the opportunity to try out any of them? 

Indeed we have, and we even run one on these products alongside so-called ‘traditional’ AV on our own systems. Being able to track a breach if/when it happens could be useful. Although we’re a relatively small company, it would be naïve to think that no-one would ever mess with us. We take security seriously, especially considering the nature of some of our clients (we don’t just test anti-malware products, but also provide security advice to some of the largest companies in the world). Our influence extends beyond the basic ‘AV test’ world and, as such, we need to be very careful.

6- You have been involved in AMTSO since the very beginning, and in fact you are currently a member of the Board of Director. In your opinion, what are the major accomplishments AMTSO has achieved since its inception?

The relationship between testers of anti-malware products and the developers of those products is a million times better today than it was. This is important because a good relationship means a productive development cycle of the software that we all use to protect our computers. Once it was the case that vendors hated testers and treated their results as something to work around, rather than use to improve products. I think that AMTSO has largely fixed that problem.

7- What are the challenges that AMTSO has to face in the near future in the testing landscape?

The next-generation companies are opposed to testing. They might claim otherwise, but in my opinion they don’t want to be challenged. Their focus is investment and growth. AMTSO needs to bring these companies into the fold and help them understand that there is something more important than just raising investment funding. Customers count and they need to be protected. Testing actually plays a crucial part in that. They can’t expect to succeed if they operate in a vacuum.

8- In your opinion, what is the biggest challenge that institutions and corporations are up against today in regards to cybersecurity? Does that time lag really exist between adopting new technologies in businesses and applying the proper security measures?

I think the biggest challenge is that securing a business involves so much more than plugging in various pieces of computer technology. Users are potentially the strongest link in the chain, whereas often they are accused of being the weakest. Training can help a lot here. Going back to fundamentals and really understanding what security is would help. It’s easier to spend a few millions on some new types of firewalls, but that’s not going to do the job. CISOs need to understand that.

 

The post “Securing a business involves so much more than plugging in various pieces of computer technology”, Simon Edwards appeared first on Panda Security Mediacenter.