Tag Archives: News

Cyber-security is a worry for the health industry, but is it sufficiently protected?

A recent report by the non-governmental organization HIMSS, focused on improvements made in the health sector due to the introduction of information technology, has revealed that the sector is extremely vulnerable to cyber-attacks.

According to the report, two-thirds of those questioned (made up of industry professionals from around the world) confirmed that their organization had suffered a recent data attack. This is an alarming example of how valuable private patient information is to cybercriminals.

ciber-security, attack

Information security continues to be a priority in IT strategies

The concern about the protection of confidential information is of increasing importance to those who work in the industry, and they are working harder to ensure that this information is kept secure and private. This is reflected in the survey as nearly 9 out of 10 stated that cyber-security has taken on a greater importance in their business in the last year.

Lisa Gallagher, vice-president of Technology Solutions at HIMSS, claims that “health organizations need to adapt quicker in order to defend themselves against cyber-attacks”. So, what does this involve? According to Gallagher, this means incorporating new tools and carrying out frequent analysis of its security processes. Fortunately, half of those questioned agreed that their company had undertaken steps to improve its online security, the protection of its endpoints, the loss of personal data, and disaster recovery. Despite the wealth of protection technology available, however, the majority of those questioned have doubts that their company can protect against attacks on its IT infrastructure and private data.

The use of antivirus and antimalware software is the most widespread

In general, according to the report, companies within the health sector use, on average, 11 different types of technology to guarantee their security. Furthermore, over half of these companies have employees dedicated to the management of private information and data.

This is a logical move considering that 42% of those questioned believe that there are new and growing threats that need to be detected and stopped. These threats have, in half of the cases, been detected by internal security systems. Just 17% of those surveyed admitted that security breaches had been detected by an external source, such as a patient whose information had been compromised.

Another important and positive detail that comes from the survey is the increased use of antivirus and antimalware software by companies (87% of those polled confirmed that their business had implemented the software). Not only this, but 80% also stated that their company was increasing its monitoring of online security to detect and investigate security breaches.

health industry

Consequences of attacks

With regards to security incidents, the majority (62%) have stemmed from a disturbance in the IT systems that has not only affected the IT operations, but also health care – albeit in a more limited way.

To have personnel available that are ready to detect and stop the attacks is vital. According to the report, 64% agree that not having skilled professionals on hand is a barrier against combating cyber-attacks.

The majority of those questioned (70%) also agree that phishing attacks, which are more and more frequent, and the spread of malware, are incentives to improve the protection of private information. In order to achieve this, 59% of those surveyed feel that it is important to share information about cyber-attacks with other sectors.

It is important to point out that these attacks aren’t just confined to the health sector. Many other companies have suffered breaches of security including Sony Pictures, which saw information stolen relating to employee salaries, unreleased films, and private mails between directors. Other businesses in the maritime oil industry  have also suffered information theft, which we recently discovered at Panda Security.

Finally, an example of a company from the health sector that has suffered an attack is CareFirst BlueCross BlueShield, which offers medical services in the US states of Virginia, Maryland and Washington D.C. Last year the company found out that private information relating to over a million of its online users could have been compromised in a cyber-attack.

The post Cyber-security is a worry for the health industry, but is it sufficiently protected? appeared first on MediaCenter Panda Security.

Why you should change your Skype password now

The advice comes as a response to users complaining in the Skype forum that they have been apparently receiving malicious links from friends.

This sort of attack, where attackers either gain access or can mimic an authentic account is known as spoofing and can be very successful due to the level of trust that people have in their own contacts.

Skype Spoofing

 

If you think that you or someone you know has been a victim of spoofing, here are three things that you should you do.

 

Don’t click

Normally, spoofing or phishing emails will contain a link to a site. Don’t click on it, especially if it is a shortened link as seen in the Skype forum example. If you believe it could be genuine, hover over the link and your browser will reveal the final destination of the link.

 

Get protection

As cyberattacks get ever more complicated and better disguised, it can become difficult to stay protected. That’s why it’s important to get the best possible antivirus solution that can help keep you safe not just from viruses and malware but additional tools like AVG’s LinkScanner technology can scan links and attachments to check whether they are safe even before you click on them.

 

Changing your password

Just as Microsoft advised on the Skype forums, if you believe you’ve been a victim of any kind of spoofing or account fraud, it’s important to change your password. If someone has access to your account you should put a stop to that as soon as possible.

Take a little time when developing your new password and make sure that it gives you as much protection as possible.

For help doing this, take a look at the graphic below that will help you create a strong, unique password in three simple steps.

Making a strong password

Panda Free, the best free antivirus of 2015

PC Magazine has named Panda Free as the best free antivirus of 2015. Ranking ahead of the likes of Bitdefender, Malwarebytes and Avast, Panda’s antivirus has been awarded the Editor’s Choice by this prestigious media outlet.

best free antivirus

The features highlighted include its speed and ease of installation along with its cloud based technology. What’s more, its ability to block malicious URLs was highly rated.

Are you ready to try out the best free antivirus of the year?

DOWNLOAD PANDA FREE

The post Panda Free, the best free antivirus of 2015 appeared first on MediaCenter Panda Security.

Three reasons to protect your Windows 10 machine with AVG

If you’re on Windows 7 or 8.1, the free upgrade to Windows 10 is quite compelling as it sports the return of the Start menu, a fresh look and some exciting new features.

Windows 10

 

But with millions of users upgrading, it becomes the next big target for hackers and scammers.  Having robust security software will be no less important on Windows 10 than on previous versions.

AVG helps keep you safe, no matter whether you’ve upgraded your old PC or got a brand new one. Here’s three reasons why AVG can help keep you safer than the Windows 10 built in Windows Defender:

 

Better Protection

In AV Comparatives monthly real-world protection study, Windows Defender provides a 90.9% protection rate which is just not competitive. AVG scored 99% with zero false positives in May of 2015.

AVG Internet Security

 

Better Reviews

PCMag wrote in April 2015: ‘It’s true that Windows 8 and 8.1 come with antivirus protection built in, but you can’t rely on it to protect you against malware attacks.’ – According to the reviews, the detection hasn’t improved noticeably with Windows 10, so specialist solutions are recommended. 

On the other hand, Windows 10 compatible AVG AntiVirus Free 2015 has 4/5 stars on CNET and 8/10 on Top Ten Reviews.

 

More features

While the built-in protection could help you against viruses, there are a wide variety of threats on the Internet.

A good, free antivirus product such as AVG AntiVirus sticks out of the pack by not just offering critical on-demand scans or real-time protection, but also anti-phishing mechanisms, URL scanning and behavior-based detection scans. And with the full-featured AVG Internet Security Suite you will get not just the award-winning antivirus protection, but the following essentials on top:

  • E-Mail Protection: Detects infected or rogue inbound attachments so they can’t damage your PC.
  • Online Shield: Checks files before you download them to ensure they are safe
  • Data Safe: Encrypts and stores your valuable documents
  • More frequent updates: Checks for updates every 2 hours if you want to.
  • Anti-Spam: Stops spammers and scammers getting to you.
  • Shopping Protection with Enhanced Firewall: Blocks hackers attempting to access the private data stored on your PC.

AVG Product Selector

 

All our AVG security products are 100% compatible with Windows 10 and help protect you from all threats going forward.

 

Existing Users: How to Ensure Ongoing Protection

Are you running AVG AntiVirus, AVG Internet Security or AVG Protection? If so, then you should’ve already received the free update to the latest product version which is tested and ready for Windows 10, as detailed here in this blog post.

If you don’t see the latest dashboard (such as the one below), then there’s a slight chance something went wrong and you may have to download the latest versions:

  • AVG Internet Security, AntiVirus, or AntiVirus Free users click here.
  • AVG Protection or Ultimate bundle customers click here.

Done? Perfect. Once you’ve upgraded from Windows 7 or 8 to Windows 10, all you need to do is check your task bar and see whether your AVG product is still active.

AVG Dashboard

 

If for some reason, the protection is inactive or you can’t find the AVG icon, please download and install the latest versions as mentioned above. That’s all it takes! Again, this process should be fully automated and won’t need to manually update.

 

3D printers: recognize the most popular frauds and their risks

3D printing has a great future, but also begins to be part of our present. For years, there were who anticipated the arrival of a third industrial revolution starring this technology. A new era in which companies from different sectors will need to reinvent their processes and look for new ways to add value, since customers will have in their hands the tools to manufacture (at home) tons of products that now have to buy from companies.

pc garaje

Uncomplicated access to manufacturing tools opens endless possibilities, but the popularization of 3D printers has made them desirable among cyber crooks. The attackers are looking for a way of taking advantage of this technology to achieve their malicious purposes.

The most alarming episode so far was the one starred by Cody Wilson, who shared the instructions to manufacture the first printed gun in 3D on the Internet. Just a few days after hanging his designs on the net, the US Department of State ordered him to remove those files and threatened him they would begin a judicial process that would include prison terms and multimillion-dollar penalties. Nevertheless, Wilson filed a lawsuit against this American authority alleging that such restriction violates his freedom of speech.

Beyond plans and weapons designs that even today we can find on the Internet, there are, unfortunately, many other alternatives for criminals. Without going any further, at the end of 2014, in a joint operation by Spanish police, the Bulgarian and the European Center of Europol cybercrime authorities, more than 30 people in Malaga (Spain) and in different city of Bulgaria were arrested accused of stealing data to make fake credit cards and mobile phone cards.

In the searches they found more than 1,000 devices. From camcorders for bars, credit card readers and magnetic strips as well as plastic cards ready to be encoded. Members of the criminal organization used a 3D printer to manufacture cloned cards from the stolen data.

police guns

One of the main advantages that comes with 3D printing is that it allows the user to make his own designs. However, this is one of the major drawbacks when talking about the wide range of possibilities opened for criminals. Now they have the ability to produce their own tools, without having to resort to the black market and without fearing the police detecting a suspicious package.

According to the experts, with these tools an attacker could cause chaos on an assembly line. They could, for example, design defective replicas of a piece, leaving the product assembled useless, and causing huge losses to the manufacturer. That, or infect such a part of the device with some malware in order to get information from the future user who will buy it and use it. The consequences would be disastrous.

3Dprint

3D printing offers so many possibilities that even to access the factory in which the thieves want to deposit these false or intoxicated parts, they could manufacture their own keys. Knowing the lock model and its weaknesses, they would just have to design a tool, which is able to activate the mechanism and open the door. Without forcing it and without attracting attention or leaving any trace.

3D printing, in a not-too-distant future, will play a decisive role in our lives and will eventually transform many industrial processes. And at the same time, will give criminals a new repertoire of tools to achieve their evil goals.

The post 3D printers: recognize the most popular frauds and their risks appeared first on MediaCenter Panda Security.

Careful! Phishing Targeting Google Play Android Developers!

We have detected a phishing campaign targeting Android developers who are publishing their creations in Google Play, Android’s official app store. The from field in the email comes from “Play Developer Support”, with the subject “Update your Account Informations”, as you can see in the following screenshot:

phishing developers

If you click in the link provided, you are redirected to a web site that looks like Google, although obviously it isn’t:

phishing gmail

Phishing attacks are designed to steal credentials and users’ identity, that’s why they are extremely popular targeting financial entities and all kind of payment platforms’ customers. This case, however, it is different in the sense that they are not looking to syphon the victims account, the want those credentials because they can use them to spread malware through Google Play.

The most worrisome thing is how easy it would be to automate all the process for criminals. You just need to:

Phishing attacks are designed to steal credentials and users’ identity, that’s why they are extremely popular targeting financial entities and all kind of payment platforms’ customers. This case, however, it is different in the sense that they are not looking to syphon the victims account, the want those credentials because they can use them to spread malware through Google Play.

The most worrisome thing is how easy it would be to automate all the process for criminals. You just need to:

  • Build a crawler (there are a number of open source projects to help out in this task) to download information of all apps published in Google Play.
  • Parse that information to obtain developers’ email addresses.
  • Sent out a personalized phishing campaign, even the phishing page could be personalized for the specific developer so the “conversion rate” is better.
  • As the attacker has the information from the apps published by each developer, it could be built an alert system to warn him each time a developer with a popular (millions of downloads) app has fallen in the trap.

From here, one of the easier (and unsophisticated) attacks would be to publish malicious apps using that account. Imagine that someone gets to steal the developer credentials of Candy Crush and publish Candy Crush 2 on the developer behalf…

If the attackers were skilled enough, and find a way to modify the current app of the developer without using the private key (this one cannot be obtained with the stolen credentials), they could publish an updated version of any app. In the example above, imagine that the attackers create an update of Candy Crush with a hidden Trojan in it: hundreds of millions of users would download and install it without ever suspecting they are being compromised.

The post Careful! Phishing Targeting Google Play Android Developers! appeared first on MediaCenter Panda Security.

Tablet AntiVirus Security FREE scoops award

We are happy to announce that AVG’s Tablet AntiVirus Security FREE has been voted as the best tablet security app in a Czech and Slovak app award.

The awards, organized by Czech company Tuesday Business Network, are designed to celebrate the very best of Czech and Slovak app development industry.

A shortlist of products was drawn up by public nominations and an expert panel selected the winners.

AVG Tablet AntiVirus Security FREE has many powerful protection and anti-theft features that can help you keep your device safe as well as protecting the data stored on it.

These include:

  • App scanning
  • Remote locating/locking/wiping if it gets lost or stolen.
  • Task killer to help you improve the speed of your device
  • Secure web browser to protect you from malicious links and phishing attacks
  • Battery, storage and data package usage monitors
  • And many more

 

Download AVG Tablet AntiVirus Security FREE from Google Play today.

We’re all guilty of checking our devices too often

For over four years now, we have been researching the use of technology by families, specifically how our kids use technology to learn and communicate. Our latest research looks at how much time we, the adults, and our kids spend using devices and the effects that this has on family life.

Are adults checking their devices too often? The simple answer is yes. Both kids and adults are in agreement with this as 54% of children say this and 52% of adults. At the same time, both kids and adults agree that it’s the kids that spend more time on their devices, 46% and 49%.

It would appear that the parent’s have some bad habits too, nearly one in four admit they answer their phone during meal times and one in three while watching TV with their kids. This makes our kids feel unimportant, at least that what 32% said in our survey.

Digital Diaries Infographic

Technology is changing our world, whether interactive education, TV on demand or communicating with our friends and family. Its important though that we distinguish between family time and device time and give each other the time and attention that we deserve.

In my family, we have ‘the basket’.  The basket lives in the kitchen and during meal times and at 9pm all our devices are relegated to the basket. This means for those precious moments of our day that we sit opposite each other; we communicate with out distractions and swap our news.

The challenge is clear that we, as the parents, need to set the example to our kids that the devices are super useful, engaging and give us great pleasure, but we need to show them that there is a time to put them down and spend quality time with each other.

Amusingly, I am writing this blog sitting in an RV in Yellowstone National Park, where there is no phone signal, yet both my son and wife are sitting playing a game on their phones competing to see who can get the highest score. It’s a great example of the addictiveness. As soon as I finish writing they will have them confiscated! Tomorrow we’ll go hiking and have a device free day.

I challenge you to set the example and get a phone basket!

Personal data is becoming a primary target at every level

I recently published a blog about the data breach at the Office of Personal Management (OPM) and the Interior Department which is being blamed on China.

In the last week, there have been a number of experts giving more detail on the depth of the stolen data. The concern is about Standard Form 86 which is used to collect data on potential federal employees applying for positions in National Security.

As you can imagine, this form probes into areas of someone’s background, family and friends that not even those close to the person may know. There are 127 pages of the form and the collection of information includes citizenship, passport, residence schools, military service, employment, financial records, alcohol and drug use, criminal records, psychological and emotional health, groups that may have been associated with, foreign travel, associates including relatives and friends.

The data is extremely valuable to any foreign government or intelligence agency, knowing your enemy in this much detail is a definite advantage. Some observers are suggesting that the data may even be used to blackmail people.  While there is of course this possibility, I doubt anyone who successfully got a position in the NSA would be susceptible to blackmail…

However, there is the risk of an unsuccessful applicant being blackmailed with the data on their Standard Form 86. Naturally, this is bad news for them and they need protection as they are not in positions of national security.

Any breach that affects the people responsible for our security is extremely serious and there needs be a robust plan to assist current and past employees, and even those who simply filled out the form.

Personal data is becoming the primary target for many cyber criminals, foreign powers and governments and the holders of the data need to take precautions to secure it. We are all potential victims of data theft and it’s our responsibility to understand the dangers of handing over our data.

While in this case there is no alternative for national security employees, in many of the data breach cases recently there are ways that we can limit our exposure by sharing less.

AVG opens new Tel Aviv Center of Excellence for mobile

It gives me great pleasure to tell you about AVG’s latest office in Israel, spanning three floors in the brand new Adgar Tower in Tel Aviv.

The view from the large windows on the 23rd floor is impressive, and light pours into every room.

Adgar Tower

The office is set to become AVG’s global center of excellence for mobile and the headquarters for our mobile development and product teams. As the world looks ahead to the Internet of Things and an increasingly mobile future, the AVG office in Tel Aviv is the perfect breeding ground for innovation and growth.

As you would expect from such an important locale, a huge amount of planning went into the office, built with AVG’s core values at its heart:

Transparency

AVG has long held the belief that everything we do should be transparent. In our products, this manifests itself through pioneering projects such as the Short Privacy Notice but in the new Tel Aviv office, it is exists in a wonderful mixture of glass and light.

transparent office

I firmly believe that collaboration is key to the success in a company of any size, and with my background in startups, it was a principle we wanted to ingrain in our new office space. Glass walls and doors of glass ensure that everyone is visible, reachable and approachable. To me, it feels more like an incubator than a corporate office.

Execution

Like any AVG office around the globe, the engineers and workers in the Tel Aviv office pride themselves on attention to detail and high quality execution. Continuing this ethos was something we was certain needed to be done when planning for the future.

Every room houses a team of product and engineering experts all working together with a common purpose, to provide value to over 100 million users of AVG’s mobile products.

We never stop trying to help and protect our users, and the vibrant and collaborative atmosphere in Tel Aviv is the perfect environment to make it happen!

Shaul

Respect

Naturally, any office gets its character from its staff and we wanted to make sure that the new Tel Aviv office felt like home from the word ‘go’.

Work Life Balance

Each team customized the layout and finish of their office, down to choosing their own posters. Like in any business, motivated and impassioned people perform better, feel more rewarded and the office benefits from this.

Never stop hacking

Work-life balance has always been important to me, so we felt it was important that staff in Tel Aviv were able to express themselves for their talents and abilities outside of work. The AVG Talents initiative is the perfect reflection of that.

AVG Talents

Throughout the office, the walls display the artwork, photography and pets of AVG Tel Aviv staff. It doesn’t just make the office look great, but creates a sense of trust and familiarity. It encourages us to value each other not just as colleagues, but as talented and diverse people from all walks of life.

AVG Talents was in full swing this week as the staff band, The Showstoppers, helped us celebrate the new office with a concert, attended by the whole team.

Show Stoppers

Crowd