Tag Archives: Panda Security

your smartphone is no longer the “smartest” option

android2

Synching your smartphone and computer might increase your chances of being hacked

A classic piece of advice that helps keep email, social networks and other online services safe is by enabling something called two-step verification. This security mechanism makes it more difficult for a cyber-delinquent to access your account through two-step verification. When a different device from the “usual” one (different computer or smartphone) tries to access your account, they must enter a code that is sent to the mobile phone associated with the account in order to continue.

If a cyber-criminal is trying to get into your account, who in theory cannot access your smartphone, this two-step process makes it very complicated for him. Or so we thought.  A group of researchers from the Free University of Amsterdam showed us that this type of protection is becoming more and more flawed the better we communicate with each other using our different devices.  This means that the more computers, smartphones or devices that have access to your account and passwords, the higher your chances are of getting an account hijacked by a cyber-criminal.

The two-step verification is one of
the most popular security measures

In other words, because we are able to synchronize applications between two devices, like your computer and smartphone (and what you do in one can affect the other), the effectiveness of two-step verification decreases.

 

Computer android

 

Android and iOS, equally vulnerable

The study’s authors have showed us the possibility of installing apps offered through Android onto your smartphone remotely through the computer (accessing Google Play with the browser) or installing remotely through iTunes.

In both of the above cases, following slightly different strategies, they have managed to intercept the verification code that websites send to your smartphone through SMS when there is a two-step verification, so it is very possible that a hypothetical cyber-criminal could access your Facebook, Google or Amazon accounts—to cite just a few.

The verification code that websites
send you through SMS can be intercepted

 

Don’t stop doing what you’ve been doing

Just because you have found out about this vulnerability does not mean it is no longer advisable to activate this safety measure in all the services that offer it.  There will always be a few obstacles that you can put between the attackers and your personal information.

The post your smartphone is no longer the “smartest” option appeared first on Panda Security Mediacenter.

Be careful with CryptoBit, the latest threat detected

A few days ago at PandaLabs, Panda Security’s anti-malware lab, we discovered a type of ransomware that we believe is extremely important to talk about, especially because of its novelty and its unique features. The name of this new ransomware is CryptoBit.

If we compare it to what we’ve learned thus far from other ransomware, we can say that CryptoBit is a one-of-a-kind specimen. It’s different from other ransomware for many reasons, one of the main differences being the message that appears instructing the victim to rescue their files. Its additional features will be revealed in this article.

Analyzed Sample

This report focuses on the analysis of the following sample:

a67855dbd18652e99f13d29045b09391382bb8c817cda1e498cd01eb4a7bdf2c (sha256)

This sample is protected thanks to a “packer”, a trojan that disguises another type of malware. After “unpacking” it, we can notice that, in addition to a date of recent compilation (April 5, 2016 at 12:20:55 PM), there is a total lack of strings, evidence that the author of CryptoBit wished to hinder the analysis of your code, by any and all means.

Distribution

After analyzing the data provided by Panda Security’s “collective intelligence systems”, it is possible to determine the vector that was used to distribute CryptoBit is being used by the “Exploits Kits” that affect different web browsers.

Behavior

Once the sample’s behavior is unpacked and analyzed, we can more accurately determine the basic way CryptoBit works:

Cryptobit_1

 

The first thing CryptoBit does is check the keyboard’s configured languages. If the keyboard is configured with one of the following codes: 0x1a7, 0x419 (Russian) or 0x43f (Kazakh), the program does not end up encrypting any file.

After making sure that the keyboard is not in their blacklist, CryptoBit goes to all local disk drives, network folders, and removable drives (USB), searching for files containing any of the intended extensions. What is its objective? To encrypt the entire contents of the file (another unusual feature) in order to request their rescue later on.

In particular, CryptoBit is interested in the following file extensions:

ods crp arj tar raw xlsm prproj der 7zip bpw dxf ppj tib nbf dot pps dbf qif nsf ifx cdr pdb kdbx tbl docx qbw accdb eml pptx kdb p12 tax xls pgp rar xml sql 4dd iso max ofx sdf dwg idx rtf dotx saj gdb wdb pfx docm dwk qba mpp 4db myo doc xlsx ppt gpg gho sdc odp psw psd cer mpd qbb dwfx dbx mdb crt sko nba jpg nv2 mdf ksd qbo key pdf aes 3ds qfx ppsx sxc gxk aep odt odb dotm accdt fdb csv txt zip

 

Once the process of file encryption has begun, the user can see a window on their computer similar to the one show below:

Cryptobit_2

 

 

In this message we see some details that draw our attention and which can be used to classify this new type of ransomware:

ID shown as “58903347”

In the number shown for the analyzed sample, this value is always the same. It does not matter if you run this Malware repeatedly, or if you do it on different devices.  This suggests that we will find ourselves with an ID of ransomware rather than a particular user (or computer).

The number of bitcoins you have to pay

In general, the required amount of Bitcoins are fixed, or have a limit. In this specific example, we see that the author (or authors) are requesting a bailout that is a little excessive.

How to get in contact with “them”

The user is not able to contact the hacker through a web server accessible via a URL, and they do not ask the user for anything in particular, at least they don’t at this exact moment.

They ask the user to contact them with using an email address that seems untrustworthy (ex. [email protected]). If the victim does not receive a response, they can also contact the hacker using an application called “Bitmessage”, a branch of another application that can be found in “GitHub”.

Additionally, if this message is not enough to convince them that their files have been encrypted, each time that this folder is accessed with one of these (now) indecipherable files, the user will discover a couple of extra files that were created intentionally:

 

Cryptobit_3OKSOWATHAPPENDTOYOURFILES.TXT

If we take a look at this file we will find the same message (this time in text format) that is shown to the user after their files are encrypted.

sekretzbel0ngt0us.KEY

In this second file we see a hexadecimal sequence with a length of 1024 which, once decoded, will correspond to a binary sequence of 512 bytes (or 4096-bits).

Later, in the “encrypted” section, it will show us the meaning of the file called “sekretzbel0ngt0us.KEY“, where encryption has been used to encrypt other files.

Another CryptoBit action that is visible to the user is an HTTP request that looks like:

http://videodrome69.net/knock.php?id=58903347

Notice: the requested script “knock.php” does not exist, what it’s doing is ignoring the intentions of the last action.

Encryption of Files

Encrypting files to encrypt other files, in each run, CryptoBit generates the algorithm AES, or “Advanced Encryption Standard” (a random key of length 32 bytes or 256 bits), making it practically impossible to decrypt files unless this information known.

In order for us to not lose this key which allows us to decrypt files if the ransom was paid, the author of this ransomware, stores the AES key generated with an encryption using the RSA algorithm.

A public key that is chosen is a length of 4096 bits and we find it “hardcoded” within the analyzed sample.

Once encrypted with a RSA AES key, it will be stored in the files named “sekretzbel0ngt0us.KEY“, making it only comprehensible if there are corresponding RSA “private keys” (which in theory, would only be in the possession of the cypher’s author.)

In this section, we notice a specific detail: the absence of calls to the native libraries that encrypt files using the RSA algorithm. CryptoBit uses a series of statically compiled routines that allow you to operate with large numbers (“big numbers”), making it possible to reproduce the RSA encryption algorithm.

Conclusion

As we can see, this newly discovered ransomware phenomenon is not going out of style. We are finding new samples every day that still surprise us. In this specific case, we aren’t as shocked by the use of “serious cryptography” (AES + RSA), something that is more and more standardized, but we are amazed by the ambition behind it and can appreciate its good design and interesting ideas.

As always, keep your antivirus updated and make sure to back up your important files.

 

Analysis of CryptoBit by: Alberto Moro, Abel Valero and Daniel Garcia

 

 

 

The post Be careful with CryptoBit, the latest threat detected appeared first on Panda Security Mediacenter.

Linked Out: how job-search platforms are being used for ransomware

job-search-ransomware

Infecting computers with a new type of Ransomware 

Sending out your resume into the net’s black hole can make the job application process feel hopeless.  Where do our resumes end up?  Do recruiters even read them?   The recipe for landing a job is already a difficult task in itself, but now we have to squeeze a little more fear into it.  Every time we apply for jobs, we could be falling prey to one of these new cyber-attacks that use ransomware to hold your computer hostage. 

 

Warn those fresh-grads that they could be fresh-meat

Digital-age criminals are posing as hiring companies on various job-posting websites.  The cyber-criminals are tricking both candidates and recruiters, asking them for too much information, like, credentials and economic information.  Know anyone on the job hunt? Are you familiar with LinkedIn?  Like we’ve stated before, these are becoming some of the best resources for cyber-criminals.

We’ve also seen these wrong-doers capture innocent job-searchers by “pretending” to be hiring managers from important companies, where they post false job advertisements so they can phish for credentials and other sensitive information.  In addition to phishing, we have been advised of another type of attack: a variant of malware that black-hats are using to infect company computer systems when their recruiters download, what they think to be, a candidate’s CV.

They wanna get ya with PETYA

This type of malware, called Petya, spreads via email. Here’s the process of infection:

  1. HR managers of the organization receive an email from a potential candidate for a job, which includes a link to their resume and a photograph, both stored in Dropbox.
  2. When you click on the link, the user begins to download a self-extracting file that contains a Trojan.
  3. The malware gets into the antivirus program to help pave the way for its partner-in-crime, the ransomware, which later blocks the entire operating system.
  4. Windows’ “blue screen of death” stamps the screen.  Dun Dun Dun.  If you try to restart the computer, you will see a skull on a red background with a message from the hacker. (Safe mode is pointless at this point because the malware disables it.)

Ransomware_imagen 2

Ransomware_image

 

The only way to regain control of your device and sensitive information is to pay a ransom.  Currently, the approximate cost to release a system and files is around 0.99 bitcoins which exchanges to approximately €431,379 (bitcoins: the first digital currency.  Although it has been said that this form of payment could be used for “legitimate” reasons, it’s more commonly used on the deep web as a form of payment for theft and the black market.)

It’s easy to be a victim in this scenario when there’s always someone looking to prey upon the desperate.  In the summer of 2015, a group of security experts identified a number of emails sent to companies with resumes, and in this case, in a ZIP compressed file containing a malicious code.

Despite the uncertainty and fear that comes with an attack of this type, don’t give into the pressure!  Paying the ransom does not guarantee that they are to unlock the infected computer (it might even motivate the perp to ask for an even larger sum instead.)

Infected, now what?

  • The solution for someone affected would be to consult a computer or security expert (like those that are part of our technical team) to guide you in the process of eliminating the ransomware from your system and browser, and reconfiguring your computer.
  • The absolute best way to prevent this kind of malware hijacking your system is by taking precautions, because generally, the users themselves are the ones opening (unknowingly) the doors to infection. 
  • Be sure to install all security patches and system updates, in order to keep the browser and antivirus updated.  Regularly back-up your files.
  • Try not to download documents or access links from unknown sources, and if you do, check their format. 
  • Lastly, keep updated with the new attacks and threats detected by security experts; this way you’ll know exactly what you should pay attention to.

As they say, prevention is always better than the cure.

The post Linked Out: how job-search platforms are being used for ransomware appeared first on Panda Security Mediacenter.

Facebook alerts you if someone tries to steal your identity

Facebook-identity-theft-photo-1

Connections are made and maintained online via social media

You can get insight into the life of a stranger through their Instagram photos, Snapchats, or profile pages, but when does it become too much? Our names alone can connect the dots for a perpetrator, making it easy to know our whereabouts. Information about where we work, where we went to University, or where our favorite coffee shop is…it’s all online.  Everything you “share” can have serious backlash: identity theft.

Celebrities are commonly impersonated online, on fake Instagram and Facebook accounts, but they are not the only ones who need to keep track of their digital reputations. A stranger can copy your photos and concoct their own version of your life.  It could be very possible that someone has already impersonated you.

Fight the fakes

The social network created by Mark Zuckerberg is fighting these fake accounts. A tool has been created that automatically notifies users who may be victims of phishing. This feature is already available in 75% of the world’s countries.

When Facebook detects that another person may be posing as you, they automatically notify you about the potentially “fake” profile. After that, the user can confirm or deny whether the profile is a fake. If it’s confirmed, Facebook gets to work; more specifically, the team manually carries out this part of the notification system.

Although they say impersonation is not a widespread problem, Zuckberberg has added this to the list of harassment he doesn’t want associated with his company. To fight it, they will continue their strict and controversial naming policy (requiring users to identify themselves with their real names), but will also actively pursue phishers.

Facebook-identity-theft-clones

Using our photos without our consent

Facebook has also launched two other security features that are next in line. One is a new system that reports the existence of intimate photos shared without the user’s consent and the other is a tool that lets them check the security status of images uploaded to their accounts. They have also introduced a feature that gives users the ability to manage the privacy settings of their photos (Who can see them? Do you really want them to be public?).

Though security is always advancing, the bad guys of the Internet are closely following behind. Next time you decide to upload personal photos, “check-in” to a geographical location, or update your work history on LinkedIn, remember that someone, somewhere might use your identity for their own personal gain.

The post Facebook alerts you if someone tries to steal your identity appeared first on Panda Security Mediacenter.

Introducing Panda Protection Service, who said cybersecurity was expensive?

Panda_Protection_Service_Antivirus

 

Technology is always changing, growing, and improving our lives, whether it is at a business or a personal level. Digital transformation affects everyone. In Spain, more than 26 million Internet users regularly access the Internet from different devices, but do they always do it safely? At Panda Security, we want to lead our users on the road to digitization, offering solutions like Panda Protection Service.

Save on cybersecurity

2015 holds the record as the year with the most malware created in history. In total, there were 84 millions of new samples detected and neutralized by PandaLabs, with an average of 230,000 per day. One of the main methods of attacks that has become increasingly popular is done by compromising routers in homes and businesses, allowing the attacker to be in control of the device for a continued period of time.

How can we protect our privacy and the privacy of our loved ones? Panda Protection Service was created to provide maximum protection for your devices and those of your family, by optimizing device performance in the most economical way. A monthly subscription system allows users to pay only for what they use with the flexibility of canceling the service at any time they choose.

Protect your digital world, no strings attached.

Consumers (currently known as “multiscreen users”) have changed. Not only have their habits changed, but they have changed in the way they interact with their devices, using more than one device at a time to do many different things. Social networks are the main catalysts of user activity. According to the latest study published by IAB, the most commonly used devices that are connected to Social Media are PCs (99% of users), phones (75%), tablets (28%), and lastly, Smart TVs, that are currently present in about 6,350,400 households.

Social media is the primary use of the Internet for most users (to see what’s going on with their friends, to send messages, post, chat, etc.), and can get expensive if preventative security measures aren’t taken. Try Panda Protection Service to safeguard all of your devices… the first month is free!

 

The post Introducing Panda Protection Service, who said cybersecurity was expensive? appeared first on Panda Security Mediacenter.

They’ll hack your Android in T Minus 10 seconds

FOTO 1

The word that scared all Google users last summer is back and worse than ever. Stagefright, nicknamed by its founder Metaphor, is even more dangerous in its new version.

Much like its name’s meaning, Stagefright, hides deep in the Android library, unnoticeable to Android users as they watch videos of cute puppies and crafty DIY hacks, all the while exposing themselves to its vulnerabilities.

How many devices are affected?

Now in its second swing, these Stagefright vulnerabilities have already affected hundreds of thousands of Android devices through holes in the multimedia library. More specifically, they have even affected those who use versions 5.0-5.1 (23.5% of affected Androids) and some using versions 2.2 and 4.0 (unsafe due to old terminals that had been exposed to previous viruses).

Google fights back

After the bugs’ discovery, Google implemented a series of bug-fixes and other security measures, even creating its own group of vulnerabilities to counter the attacks. Upgrades and patches were set up to make it more difficult for Stagefright to infiltrate an Android in a real attack.

Unfortunately, Metaphor has been able to dodge these protection mechanisms that were added to the more modern versions of the Android. With this new exploit, as their own creators have shown, Stagefright can easily control devices as diverse and modern as the Nexus 5, Samsung Galaxy S5 UN, UN LG G3 or HTC One UN.

So, how exactly does Stagefright break in?

Sneakily. The user does not need to be using their smartphone during an attack, really. In the case of Stagefright, the attacker can gain access through a particular website (e.g. through a malicious video link received by email or MMS). In a proof of concept, an email with a corrupted video link promoting videos of kittens leads to a page actually containing this material. The recipient has no way of knowing, that while the video is rendering, their Android is also being attacked. It can take as little as 10 to 15 seconds for the cyber-criminal to have control of their victim’s terminal.

Spent some time today messing with Lightroom's post-processing tools to teach myself. I don't want to end up relying on them for every shot but it's nice to know what I have to work with.

Metaphor’s strategy is not exactly new. It largely relies on the attacks that were released last summer, when the holes were first discovered. However, today’s danger lies in Stagefright’s ability to bypass ASLR, which is the barrier Google raised in all versions of Android after 4.1. The problem is that this new threat binds itself not only to older devices but also to more modern ones. Those who have Android´s Lollipop 5.1 are not even safe, representing about 19% of all of Android smartphones.

No matter what, the best way to protect your Android and all other risks associated with Stagefright is to keep your operating system as up-to-date as possible and install a good antivirus. If your phone has been left out of the recent updates, take caution: you should not browse pages unless they are fully trusted. Even those who promise photos of adorable and fluffy kittens.

The 5 best online services to sign up to

Few things give us more piece of mind than signing up for a service that you can cancel whenever you want and at no extra cost.

What we all want is to be able to try it out during a certain period and, if we like it, sign up for it fully. If after a few weeks we realize that the service doesn’t offer us what we need, we also want to be able to unsubscribe just as easily as we signed up.

This is why we want to present 5 of the online services that we use the most, although we’re sure you already know of a few of them.

The 5 best online services to sign up to

Netflix

PandaSecurity online services Netflix

You’ve surely heard of Orange is the New Black or House of Cards. Both of these give us a fair idea of what to expect if we sign up to this entertainment service. For a monthly fee you have multimedia content, especially TV series and films. You can try it for free and, later, sign up for a plan that best suits you.

Evernote

PandaSecurity onlines services Evernote

Taking something down on your phone and later forgetting it is there in front of us is something that happens to us all. If you want a solution to these mental lapses then Evernote is the tool for you. You can download it on any device and synchronize it across them. Also, if you want to use it on a more professional basis, it offers a professional version that allows you to scan business cards, edit PDFs, and save emails.

Spotify

PandaSecurity servicios online Spotify

It’s probable that you know the benefits of Spotify and that you’re already a user, but have you tried the Premium version? We recommend that you try out the free monthly trial, although we guarantee that you won’t be able to live without it after! You can download music, listen offline, avoid any ads, and most importantly, all of your music is stored in just one place.

Amazon

PandaSecurity online services amazon

If you’re already using Amazon for all your purchases, then you need to check out Amazon Premium. You can carry out all the purchases that you like and without having to worry about postage charges. As always, you can try it for free for a month and if you are convinced, become one of their millions of VIP customers. One thing, though… be careful with your purchases – with no postal charges, it’s very easy to go overboard on the purchases!

And, as we don’t want to miss out on all this, we invite you to try out our new online service:

Panda Protection Service

With Panda Protection Service you will have the best antivirus protection for an unlimited number of devices (computers, tablets or smartphones) and the advantage of being able to sign up for as long as you want. Forget about yearly subscriptions; Panda Protection Service’s monthly plan gives you total freedom and the first month even comes for free. You can also cancel your subscription whenever you want with no extra cost involved.

PandaSecurity online services panda protection service

Features of Panda Protection Service

  1. Protect your family
  • Control the browser for all your devices (PCs, tablets, mobiles)
  • Block inappropriate content
  • Protect your home network from intruders
  • Keep your photos and personal files private
  • Locate your devices at any time
  • Control the applications downloaded on your mobile devices
  1. Looks after your privacy
  • Keep your personal and banking data safe
  • Enjoy a real-time antivirus protection
  • Protect all your devices that are connected to a Wi-Fi network with instant alerts
  • Manage the passwords to all your accounts and always have them on hand
  • Remotely wipe your device in the event of loss or theft
  1. Optimize your devices
  • Know the location of your devices in real-time
  • Remotely block and delete files
  • Possibility of identifying the thief in event of mobile theft
  • Optimize the performance of your devices (PCs or mobiles) and improve battery life
  • Anti-theft system alerts

Also, as with all of our antiviruses, Panda Protection Service comes with the best security guarantee – should you get infected, we will offer a full refund.

Do you want to try our multiplatform antivirus for free?

The post The 5 best online services to sign up to appeared first on MediaCenter Panda Security.

Google filters thousands of ads to avoid cyberattacks

google chrome

We’re all sick and tired of those pesky banners, pop-ups, and annoying advertisements that try to trick us into giving out our information when trying to surf the Internet. However, if it weren’t for Google, it could actually be a whole lot worse.

Just last year, the search engine monster disabled more than 780,000 advertisements that failed to adhere to the company’s privacy policy. This figure shows that Google is becoming more and more concerned about removing this type of advertising from its pages – in 2014 it blocked 524,000 advertisements, nearly a third less than last year. In fact, the company has claimed that it has more than 1,000 employees working to fight against potentially malicious ads.

As you can imagine, all of this hard work isn’t just done for your personal benefit. The company bases its business model on advertising that it sells to its advertisers, which means keeping the network free from malicious publicity is of their own benefit in the long run.

This means that Google avoids putting its users at risk when using the search engine and at the same time protects the advertisers, who already lose €5.7 million a year because of the infamous network of bots that simulate human behavior.

online fraud

Google has also revealed details about the types of adverts that it has blocked for failing to meet its privacy policy. The pages that violate its medicinal policy, such as drugs that haven’t been approved by the authorities, were the most blocked – Google disabled a total of 12,500 ads that tried to promote alternatives to prescription medicine.

It’s not a coincidence that the company is interested in blocking this type of advertising. In 2011, it paid $500,000,000 (around €346,000,000) to force the closure of an investigation by the United States’ Department of Justice. It was accused of selling ads to online drug companies from Canada but that were based in the US, which was wholly illegal.

Another area that Google cracked down on last year was the proliferation of websites that tried to trick its clients by offering them absurd methods of losing weight (up to 30,000 ads) or those that sold knock-off goods (between 10,000 and 18,000 ads).

It isn’t just worried about users receiving false advertising, but rather it is trying to avoid and stop phishing attacks being spread by malicious pages. Last year alone saw 7,000 pages blocked which were trying to get users to part with their sensitive information, along with 17,000 false advertisements that put our computers in danger.

The company has also disables more than 10,000 pages that offered unwanted software to users that could have caused unusual results which negatively affect the user experience. Google is also working on avoiding the unwanted installation of software that could end up damaging the user’s computer.

report phishing page

Users can also inform Google of when they detect suspicious advertisements or pages that seem to have been designed to steal information. In fact, any user can make a claim against a phishing page by filling out a simple form.

So, any time that you accidentally download a malicious file without even realizing it, the best option is to have a good antivirus installed which will advise you not to open it. This will help you avoid any potential catastrophes.

The post Google filters thousands of ads to avoid cyberattacks appeared first on MediaCenter Panda Security.

The Nigerian Skype scam is back to try and trick us once again

It’s possibly one of the oldest and least plausible scams out there, but the infamous Nigerian scam is still a popular method used by cybercriminals as they look to that advantage of would-be victims online.

What was once an email-based scam has since taken to Skype, where one of our colleagues recently received the following (and strangely worded) message via the communication service:

skype scam

As you can see, they tell you that a victim of an Indonesian earthquake has died, leaving behind a princely sum of $7.5 million in a bank account. Luckily for our colleague, his surname, Fernández, is the same as the victim’s. This is a sufficient a link as needed for the earthquake victim’s friend to get in touch with his generous offer.

skype fraud

What the scammer proposes is that the sum of money stored in the bank account be shared equally between both parties, although the operation must be done under utmost secrecy and without anyone else knowing about it. In order or the deal to be carried out and for more details on how the transfer will be done, our Nigerian friend needs our colleague to get in touch with him.

It’s blatantly obvious that there is no money to be exchanged in all of this, and that there was never any earthquake victim to begin with. These scammers simply contact us with the hope of getting our private information and to try access our bank accounts.

So there you have it – never give out your personal information online and never carry out banking transactions that are related to prizes, inheritances, or lotteries.

The post The Nigerian Skype scam is back to try and trick us once again appeared first on MediaCenter Panda Security.

Afraid you might have a virus? Analyze and disinfect your PC for free with Panda Cloud Cleaner!

malware computer

It might be that you’re too trusting and haven’t installed an antivirus on your PC, or that your license has recently expired, or that you have an antivirus but it doesn’t guarantee maximum protection and… maybe you’ve been infected!

If you notice that the performance of your computer has changed, or that simple tasks that previously worked fine are now running incorrectly, it’s likely that some type of malware (virus, Trojan, work, etc.) has installed itself on your PC.

How do I know if my PC is infected?

At Panda Security we make user security our priority, even those who don’t use our antivirus. This is why we offer a free tool that can analyze your PC, determine if it has been infected, and eliminate any type of malware that may be lurking on it.

You can download Panda Cloud Cleaner for free here.

disinfect pc

Why should I use Panda Cloud Cleaner on my PC?

  • It’s a tool that has been specifically designed to eliminate spyware, malware, and all types of viruses. It won’t miss a thing!
  • It’s lightweight and easy-to-use. It will only take a few minutes to download, install and analyze your computer.
  • It updates in real-time thanks to Panda Security’s Collective Intelligence. It learns from each analysis!
  • It continues working in offline mode (without Internet connection), no matter how aggressive the malware may be. You can leave it installed so that it’s there when you need it the most. 

Although it’s a very useful tool, you should keep in mind that Panda Cloud Cleaner isn’t an antivirus. It doesn’t protect you against new attacks, but rather eliminates the malware that is already on your PC. This is why we recommend that you use it in conjunction with an advanced security solution.

The post Afraid you might have a virus? Analyze and disinfect your PC for free with Panda Cloud Cleaner! appeared first on MediaCenter Panda Security.