Tag Archives: featured1

CSI: Cyber. A Fake Cyber Security TV Series?

csi

It was bound to happen. The latest episode in the popular CSI series had all the ingredients to be not very faithful to reality. If we already far from credible elements in the versions of Las Vegas, Miami, and New York, what can we expect from ‘CSI: Cyber’?

In this occasion, the characters are part of the FBI’s Cyber Crimes Division.

The series premiered on March 4, 2015 on USA, and a day later worldwide. The team, led by Oscar winner Patricia Arquette, work to solve computer-related cases.

The relationship between the franchise CSI and technology has never been good. After fifteen years of fiction, they still surprise us with some of the techniques used to solve crimes. Just think how do they are able to expand images and still get spectacular resolution, which in real life would be magical.

But introducing cybersecurity elements into CSI’s typical plot hasn’t improved things. As some experts in the subject had suspected, the series has enough details to pull our hairs out, and it is not very useful if you want to learn something about cybersecurity.

Just by watching the pilot episode we can verify how much ‘CSI: Cyber‘ distorts the industry reality. Spoiler alert: from here on, there might be some spoilers of the first episode!

In one of the scenes we can see two of the experts analyzing the code searching for something suspicious, and how they find it right away. No wonders: The code is written in green over a black screen except where the malware is (barely) hidden, that is in written in red.

In addition, everything happens at tremendous speed. They are able to discover the hacking of a baby monitor based on vulnerability in the manufacturer source code in just half an hour.

As if that wasn’t enough, cybercriminals have brilliant minds, and also, twisted. In the first chapter, they create such a complex encryption key that in order to remember it they had it tattooed! Typical, isn’t it?

This first chapter is peppered with many other details that drag computer security experts through the mud. For starters, the FBI’s Cyber Crimes Division is led by a psychologist (Patricia Arquette) who hunts cybercriminals driven by one bad experience she had years back.. Maybe no expert in this matter was able to lead this Division…

It is true that we have still the whole season to finally find out if ‘CSI: Cyber‘ deals with cyber security in a more realistic way than in the first episode. In the first episode the experts manage to geo-locate the suspects through just an IP address (something that maybe a good cybercriminal won’t allow), or hacking an Xbox, what else awaits us?

Something that we can actually learn from the series is the Internet of Things, something so useful that helps us monitor every aspect of our live, also carries certain risks. As soon as something is connected to the network, it is potentially vulnerable. Anything: your baby monitor, your home’s thermostat or your toothbrush.

The post CSI: Cyber. A Fake Cyber Security TV Series? appeared first on MediaCenter Panda Security.

WhatsApp calls available for Android!

whatsapp phone

Waiting is over! Calls via WhatsApp are available for Android users, but just for some users and only if they have the latest version installed. These calls can be made with an app beta version and also with the 2.12.5 update, launched already in Google Play.

Nevertheless, if you are an Android user and meet these requirements, but still aren’t able to use it, don’t despair. As before, WhatsApp hasn’t deployed it automatically yet.

How can you activate the calls in WhatsApp? For example, if you get a call from one of your contacts that already has it activated!

If not, just a bit of patience, and wait for your turn! Meanwhile, don’t fall for scams!

And if you want to protect your phone, download now our free Android antivirus.

The post WhatsApp calls available for Android! appeared first on MediaCenter Panda Security.

The Future Of Internet Dating – Infographic

the future of internet dating r5

The Future Of Internet Dating

The year is 2031. Internet dating is to thank (or blame) for a projected 50% of relationships globally.

Smart phones and tablets replaced quills and love-letters long ago. Things move fast.

The world is a jungle of off-the-shelf love, mixed intentions, tactical selfies and clinical alliances.

Vicious creatures wait to ambush you – technologically and romantically – on your way through the online dating undergrowth.

Who can you trust? Where will you be safe? How can you attempt to build your survival hut and thrive in these wild times?

You have delicate information that needs to be kept safe, protected, discreet and available only to those you choose. Those happy few.

Turn to the king of this new-age jungle.

Panda Security. Stay Protected

If you want to share this infographic, here it’s the code!

The post The Future Of Internet Dating – Infographic appeared first on MediaCenter Panda Security.

5 things you can do to boost your Wi-Fi network

laptop and routers

Where you place your router can make a big difference in signal strength.

Where you physically place your router makes a difference – not only to the signal, but to your security.

Think of your router like you would a cordless phone’s base. If you wander too far away from the base station, your call may drop or have static interference. If your wireless devices, like your laptop, are out of your router’s range, then your connection speed can slow down to an annoying crawl or your connection may drop.

Generally, a Wi-Fi router should work well for about 100 ft (30m) in every direction. If your walls are thin or your router is placed in the wrong location, you could be helping a thief steal your bandwidth.

Here are 5 things you can do to optimize your reception and reduce the chance of your neighbor piggy backing on your signal:

  1. 1. Place your router in a central location. For the optimal coverage, place the router in the middle of the desired coverage area. Think about all the devices you are using along with their location, and place the router at a mid-point and as high as possible so the signal gets dispersed throughout the area.
  2. 2. Avoid walls, ceilings or shelves. If the signal has to go around corners, or through walls, ceilings or shelves, then it will have a hard time getting to your device. Insulated walls, or ones made of brick or concrete can impede the signal. Even fish tanks (it’s the water that’s the problem) and mirrors can have an effect.
  3. 3. Place appliances far away from the router. Appliances operate on the same frequency as routers, so avoid placing the router close to cordless phones, microwaves, or TVs.
  4. 4. Name your Wi-Fi something alarming. Follow the trend to rename your Wi-Fi network to something that will potentially scare would-be thieves from mooching off your Wi-Fi connection. The name “FBI Surveillance Van” was popular a few years ago, or use my favorite c:virus.exe.
  5. Better yet – set up a password for your network with WPA2 encryption. Read more about securing your router from 12 ways to boost your router’s security.
  6. 5. Put up Wi-Fi blocking wallpaper. Decorate your room and block your Wi-Fi signal at the same time. MetaPaper is wallpaper that helps businesses and home users improve the security of their data and protect their Wi-Fi networks from intruders. Re-setting your password is definitely cheaper, but this is a clever innovation especially for business owners concerned about their data security.

BONUS TIP:

Avast Home Network Security scans a user’s home network and routers for potential security issues that could allow a hacker attack. The scan looks for misconfigured Wi-Fi networks, exposes weak or default Wi-Fi passwords, vulnerable routers, compromised Internet connections, and enabled, but not protected, IPv6. It also lists all devices on the network so you can make sure only your known devices are connected.

To run a scan on your home network, open the Avast user interface and click on Scan>Scan for network threats. If Avast finds a vulnerability it will guide you on how to fix it.

Hacking Hollande, Merkel and Cameron’s eyes through their photos in Google

eye

In Origins, a movie released last year, appears a worldwide biometric signature file different to the fingerprint’s one; an iris readings record. Although this disturbing reality is still unthinkable, there have been many steps in incorporating eye scanners as a method of personal identification.

This technology is already being used in some companies to control their employees’ entrance and exit, as well as in corporations with strict security measures. But, its daily use is getting closer. Mobile phones manufacturers like Samsung, Nokia and Fujitsu have announced that their upcoming models will have an iris scanner among its features.

Maybe in the future it would be enough to peer at the screen to unlock your mobile phone or access some of its features. If so, you’d better check the pictures you upload on the Internet. Jan Krissler, expert in computer security for Telekom Innovation Laboratories, proved that some of these biometric systems can be evaded simply using snapshots taken from Google Images.

Krissler had previously exposed the vulnerabilities of fingerprint readers. In December he copied none other than the German’s defense minister, Ursula Von der Leyen

eye scanner

On that occasion he used the Verifinger recognition program to read Von der Leyen’s fingerprint, that he had photographed himself in a public event. Then he printed the result on a transparent surface, applied latex and there it was a fingerprint clone! However, he wasn’t been able to do further verification or testing.

This time, Krissler claimed he can do something similar with eye scanners without using his own camera. As we mentioned, you just need to search with certain premises in Google Images. The first one is that the target’s eyes must have enough brightness, as the researcher used a system based on infrared light, Panasonic’s Authenticam BM-ET200 which is one of the most extended technologies.

You also need a high quality image; size and clarity are important, to a certain point. In his tests he succeeded to use iris with diameters that did not exceed 75 pixels. It’s easier to deceive an eye scanner than a fingerprint reader, you don’t even have to make a clone, just print the picture and show it to the device, and it will mix it up with the real one.

Surely we all have a picture with these qualities, but it will never surpass the amount there is of any famous person, including politicians. Just type Barack Obama or François Hollande on Google and thousands of snapshots will emerge, of all sizes and shapes.

angela merkel

Krissler searched the faces of Vladimir Putin, Hillary Clinton, and David Cameron among others, before choosing Angela’s Merkel to carry out his verification. He chose an iris with a 175 diameter of the German Chancellor which Panasonic’s scanner recognize without a problem.

However, in an actual attack, the process wouldn’t end here, and the remaining steps are complicated. Accessing the biometric readers which Merkel or other politicians would use is not as simple as getting their picture.

Furthermore, although Fujitsu’s technology is also based on infrared light there are other methods, and there is the possibility to apply protection filters to the pictures. Despite these obstacles and reservations, Krissler wants his findings to be a warning to manufactures so they implement safety measures to future developments and to future users so they watch what they post, never better said!

The post Hacking Hollande, Merkel and Cameron’s eyes through their photos in Google appeared first on MediaCenter Panda Security.

Stay safe during March Madness using Avast SecureLine

Avast SecureLine VPN lets you watch March Madness while traveling.

Avast SecureLine VPN gives you access to geo-restricted programming and protects you from unsecured Wi-Fi.

Stay safe on public Wi-Fi while watching the game from anywhere in the world with Avast SecureLine VPN.

March Madness is in full swing — this year’s NCAA Tournament is now in its second week and we’re already down to the Sweet 16. When you think about March Madness, you probably think about your bracket, your favorite college basketball teams, and the bets you’ll place on those who you think will win the tournament.  Although it’s easy to get caught up in the spirit of March Madness, it’s the betting process that you should really be paying attention to: this popular activity serves as the perfect opportunity for hackers to access your personal information.

Since most people watch the NCAA games in bars or cafes with friends, they make the majority of their bets using their mobile devices while connected to public and often unsecured Wi-Fi networks. Public Wi-Fi networks are convenient, but they‘re not safe. Cybercrooks can easily access and steal personal data when you‘re connected to these unprotected networks. Even if you’re transmitting data from one HTTPS site to another, it’s the connection in-between the two sites that really puts your data at risk. Additionally, developments such as real-time betting make the odds for getting hacked even greater.

During March Madness, a time of year when so many financial transactions are being made, cybercrooks are especially likely to steal your banking info (e.g. your credit card and/or account numbers) and personal info (e.g. your social security number, social media accounts, etc.). Avast SecureLine VPN for Android and updated for iOS devices keeps these cybercrooks at bay and securely allows you to use your PCs, smartphones, and tablets on unsecure Wi-Fi networks while participating in March Madness at your favorite bar or cafe.

“Unfortunately hacking isn’t a complicated process – there are tools available online that anyone can easily use to steal personal data,” says Ondrej Vlček, COO at AVAST. “We created Avast SecureLine VPN to allow users to browse the web anonymously and safely, especially while using open Wi-Fi.”

Watch content from all over the world

You don’t have to miss a single game or your favorite program while you are traveling. SecureLine VPN makes it look like you’re connected from a different location, allowing you to view ‘local’ content anywhere because your shown geo-IP address will be different from your real one.

Play geo-restricted content from all over the world.

Play content from all over the world while connected via SecureLine VPN.

 

Keep your data and identity safe using Avast SecureLine

VPN stands for Virtual Private Network. Avast SecureLine VPN creates a private ‘tunnel’ through the internet for your data to travel through, and everything – your web browsing history, your email, your IMs, your VOIP, everything –  inbound and outbound through the tunnel is encrypted. Even if your data is intercepted, your identity is protected, since Avast SecureLine masks your IP address.

For those of you interested in technical specs, here are the highlights:

  • Avast Secureline VPN uses OpenVPN protocol.
  • The encryption used is 256bit AES.
  • Communication on all ports is encrypted.

How to get Avast SecureLine

Avast SecureLine VPN is available for Android on Google Play and for iOS in the Apple App Store.

 

Smart TVs have become the new target for cyber criminals

smart TV curve

Smart TVs bring along benefits that actual televisions can’t offer. Internet access and communication with other devices make possible choose your broadcast program, share your favorite shows, watch YouTube videos and use other apps that we already have on our phones.

As Google couldn’t be less, has already launched Android TV, their small-screen Android operation system. We hope that the giant and the other technological companies are aware that connected TVs not only come loaded with virtues, but also with risks in security issues.

At least for now it doesn’t offer such a wide range of possibilities as smartphones, and it is neither a personal computer, but everything points that in a couple of years they will offer similar benefits. Take for example banking operations, like managing our accounts through the banks virtual platforms or online shopping. A delicious treat for cybercriminals.

smart tv android

A recent research of the European Union Agency for Network and Information Security (ENISA) identifies the cyberattacks as the main threats for Smart Homes, this threat will increase as more and more devices are connected within them and the network.

Apart from banking information, there is much more data at the mercy of the assailants. We just have to take a look into the new controversy that splattered Samsung, accused of listening to their customers conversations through their Smart TV’s microphones.

This is because the service conditions advise that in order to enable Voice Recognition, some voice commands must be captured and analyzed through remote control. The privacy policy states: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”

Samsung is not the first company accused of recording their viewers. In 2013, a British developer discovered that LG’s Smart TV was gathering information about the user’s television habits via its smart ad feature. Later that year, Malik Mesellem expert in cyber security found a weakness in Samsung TVs that would make them liable to denial-of-service attacks (the famous DDos).

smart tv

Despite the South Korean company has strongly denied the listening’s accusation, and “third parties” would only be the company responsible of converting the voice commands into orders, suspicions have not disappeared. If they can spy with your phone microphone, why wouldn’t they do it through this one?

 

Nor should we forget that TVs also incorporate cameras, so making video calls is just around the corner. As we are connected to the Net, digital offenders may have access to images of your living room. Creating a new window for cyberespionage, directly into your home.

These devices also store large amounts of personal data, all kinds of documents stored both in the device’s internal memory and in the cloud. A malware installed in the TV could extract information and miss use it.

Experts admit that we must not fall into alarmism and completely reject smart appliances, but is important that we know the risks and be careful.

So if you have an Android operating system TV, the best thing you can do is protect it with Panda Mobile Security, our antivirus for Android. You will not regret it!

 

 

 

 

 

The post Smart TVs have become the new target for cyber criminals appeared first on MediaCenter Panda Security.

New Panda Mobile Security: Stronger mobile protection against fraud and threats now available in 16 languages

Panda Security today announced the launch of a new and improved version of Panda Mobile Security, the company’s solution to protect mobile devices against next-generation threats.

The new Panda Mobile Security allows users to enjoy their devices with complete peace of mind, locate lost or stolen smartphones and tablets, and protect their private information. One of the solution’s new features (‘Costs money’) warns users against downloading apps that send SMS messages to premium-rate numbers.

Panda Mobile Security protects mobile devices against cyber-attacks, neutralizing malware designed to take control of the target system without the user’s consent. For example, it prevents apps from taking photos when the device is turned off or hibernated, or stealing stored data.

Protection from ransomware

Additionally, Panda Mobile Security protects smartphones and tablets against the growing threat of ransomware, that is, malware designed to hijack users’ devices, making them unusable unless a ramsom is paid by the victim.

Increased security with geolocation technologies

Another key feature included in the new release is the use of geolocation to protect users and ensure the security of their devices. The new Panda Mobile Security incorporates an anti-theft system that takes a photo of any person who enters an incorrect unlock code, and then sends the photo and map of their location to the user’s email address. Additionally, should the missing device run out of battery, Panda Mobile Security saves its location in order to use it in case of necessity.

“This new version, and the one to follow shortly with even more features, represent a major step forward in mobile security as they are designed to stop both internal and external threats to users’ devices. Our goal is to make things as simple as possible for our users so that they can enjoy their mobile devices without worrying,“ said Hervé Lambert, Retail Product Marketing Manager at Panda Security.

Panda Mobile Security is now available in 16 languages, and Panda Security is working on a new look and feel to mark the company’s 25th Anniversary and its new corporate identity. Over the next few months the solution will also incorporate motion alerts.

header

The post New Panda Mobile Security: Stronger mobile protection against fraud and threats now available in 16 languages appeared first on MediaCenter Panda Security.

What is Cloud Computing and how it will boost your business – Infographic

What is Cloud Computing

Cloud Computing means storing and accessing data and programs in ‘the cloud’. This concept has been the basis of an entire business model that provides services and computing resources over the Internet.

This technology leverages the cloud to free users from having to worry about processing and storage work. Everything is done from and in the cloud.

Cloud Computing technologies don’t require any type of specific infrastructure from the user and provide cross-platform access at any time from anywhere.

Cloud-based security is an absolute necessity. Therefore, if you are looking for a business antivirus that provides best-of-breed cloud-based protection, look no further. Try Endpoint Protection.

Endpoint Protection provides cloud-based cross-platform protection for all your endpoints, minimizing maintenance costs and resource usage.

what is cloud computing

5 Reasons why Cloud Computing will boost your business

  1. Save costs.
    a. No need to buy any specific hardware since everything is in the Cloud (is Cloud based), which will drastically reduce the infrastructure costs.
    b. No need maintenance experts since the Cloud based solutions management is maintained by its creators from the cloud.
  2. Optimize resources.
    a. Increase the productivity of your IT department, since they will only have to focus on your problems, not on tools configuration, since the Cloud technology configuration and maintenance is as easy to use as your email.
    b. Increase the productivity of your workers offering them 360 access.
    c. Achieve more efficient and dynamic environments.
  3. Complete mobility.
    a. Access anytime, anywhere.
    b. Total access to the applications and the information.
    c. Access from any device connected to the Internet.
  4. Increase security.
    a. No need to make efforts in order to protect your Cloud based solutions, security is on us.
    b. The security technology you had ever imagined for your business safeguards your data.
    c. In case of disaster the Backup services in the cloud will save your business. You will be able to recover your data anytime.
  5. Growth and expansion flexibility.
    a. Want more licenses, here you go! Want more capacity, here you are! Want to expand your services, done! Everything you want, just by extending your Cloud services.

If you want to share this infographic, here toy have the code:

The post What is Cloud Computing and how it will boost your business – Infographic appeared first on MediaCenter Panda Security.

Browsers security: Why do we ignore their warnings?


chrome pin

Sometimes, Google Chrome tells us to distrust a website and warns us that that site can be dangerous. But instead of listening to it, we ignore it. We are so obsessed on quickly reaching the neck click, that we don’t even read the message.

A study published by Google’s Chrome team stated that only one in four users pays attention to the SSL security certificate warnings and takes their advice. That’s why they decided to redesign them, reducing and simplifying the text, and adding more graphic information. Hoping, this will make users read the information before taking risks.

connection not private

But what does SSL stands for? This acronym refers to “Security Sockets Layer”, a secure connection protocol that enables you to browse the Internet with maximum guarantees. When a browser visits a webpage, it checks the site’s identity and its SSL. It informs you when something goes wrong, the site’s certificate is not from a trusted organization, it has expired, or the connection between the browser and the website is not secure. What’s the objective? The main objective is to prevent the users, letting them know that the site could threaten their safety. For example, if you were making a purchase, someone could steal your credit card information.

Many users may not take into account their browser’s opinion. If their browser simply tells them that the SSL is out of date, likely they won’t understand what this means or the risk this entails. Nevertheless, if they, like Chrome already does, point out that an attacker could steal your information, you would be more vigilant.

“Even though we prefer that the user decides things, in some cases, it simply doesn’t make sense. It’s simply impossible to explain something as complex as cryptography to many users,” says Andreas Gal, chief technology officer at Mozilla. Gal refers in this way to the difficulty of transferring and translating information about privacy to those users who should worry about it.

Lujo Bauer, Associate Research Professor CyLab at Carnegie Mellon University, published a paper in which recommended that web browsers present the information in a comprehensible and concise way, and offer the top options to users. This is why Chrome decided to reduce the text and make the warning signal more visible, even highlighting in blue the “Go Back” option and diminishing the “Advanced Options” that allows access to the not safe site.

Would these measures be useful? Or, are we so lazy that we will continue to ignore the information about our own security? The underlying problem is still there: we stop paying attention after viewing new sites several times. According to a research by Brigham Young University, in which after analyzing a variety of 40 different warnings – like anti-virus, software updates, or SSL– the results showed that after seeing them more than once, we stop noticing them.

do no read this sign

Communicating security problems is complicated if we don’t read the warnings, and the only thing we want is to keep on browsing without being disturbed. “The immediate cost of heeding the warning is high, because I will not be able to achieve my immediate goal, which is to reach the site and complete the bill payment or the status update that I had in mind,” says Raluca Budiu, senior researcher at usability consulting firm Nielsen Norman Group.

Can they steal our information if we dismiss the warnings? The answer is yes.

Do we have a lack of education about Internet? What else can browsers do to draw our attention in order to stop us from entering untrusted sites? Should they block the accss? Or, it is better that they keep letting us choose? You can reflect on it, or look up your browsers security options, so next time it warns you not to enter a site, you’ll pay more attention.

The post Browsers security: Why do we ignore their warnings? appeared first on MediaCenter Panda Security.