Tag Archives: Panda Security

WhatsApp to allow users to verify messages with a QR code

WhatsApp is set to unveil a new measure that will allow its millions of users to verify the validity of messages with a new encryption system that incorporates the scanning of a QR code.

According to XatakaAndroid, the developers of WhatsApp have leaked different sentences in various languages on the application’s collaborative translation portal, which many have taken as clues about new features that are set to be introduced.

whatsapp qr

This time, “the three leaked sentences mention a point-to-point encryption on WhatsApp, which protects the privacy of messages; the need to scan a QR code to verify that the chat is correctly encrypted, and the how to activate the tool, which will be from the settings menu”.

This means that each use can manually check if their conversations are secure, not because WhatsApp is ramping up its security, but rather that it can help each user to ensure that their privacy isn’t at risk. The only drawback to this feature is that both the sender and receiver must be in the same physical space for it to work.

To carry out this action, user A has to scan a QR code on the device of user B, and vice versa, which could prove to be difficult as if both people are in the same space then it’s unlikely they’ll have a chat over WhatsApp as opposed to face-to-face.

We’re still waiting for the application to confirm this new feature, so we’ll keep you updated when we know!

The post WhatsApp to allow users to verify messages with a QR code appeared first on MediaCenter Panda Security.

Worry for Samsung Galaxy users as calls could be intercepted

samsung

Whenever we talk over the phone we tend to give away lots of information about ourselves without even thinking about it. Whether it’s where we are or where we’re going to, confidential details about our professional life, or just daily complaints and events, we do so thinking that what we say is only going to be heard by the other person on the line. Sometimes we even reveal information relating to banking details, such as the account number and our date of birth, if we have to make a call to our bank.

As we like to keep a tab on our personal privacy, it’s normal for us to go to an empty room to continue a conversation or to even use a lower tone of voice so as to avoid being overheard. However, these measures might not mean an awful lot if you happen to use a Samsung Galaxy.

According to a demonstration by Daniel Komaromy and Nico Golde, two IT experts, at the recent Mobile Pwn2Own conference in Tokyo, it is possible to intercept calls made on Galaxy S6, S6 Edge, and Note 4 models.

samsung button

The investigators used the baseband chip of the devices to carry out the attack, as the chip is used to complete all radio communications. To access it, the pair used a “man-in-the-middle” attack – a classic technique that allows a cybercriminal to read and intercept a victim’s messages without them knowing a thing.

In this case, they managed to intercept voice calls by connecting these two devices with a false station, making the smartphones near to it think that it was actually a legitimate communication tower.

Once connected, these security experts were able to communicate remotely with the baseband processor without alerting the user. From that moment on they were free to intercept, listen, and even record phone calls. With a simple method, these two investigators managed to spy on these devices.

So, does this mean that any cybercriminal might be able to easily control your Galaxy device and listen to everything that I share in confidence? Komaromy and Golde have highlighted that the system that they have presented is just an example – the idea would be to later redirect the calls to a proxy to carry out the real attack and allow for the call to reach its true destination.

What’s more, these experts haven’t divulged all of the details of their experiment and have informed Samsung of their findings, so that the company can quickly find a way to clear up this vulnerability before it’s too late.

smatphones

Unfortunately, this is only one of many methods that can be used by a cyber attacker to wreak havoc. As we’ve already told you, some cybercriminals have already developed programs that activate the microphone on our smartphones so as to spy on us.

A group of investigators from the University of Stanford even developed Gyrophone, an application that used the gyroscope to capture sound vibrations created by a human voice to spy on calls.

Although we’re not going to tell you to stop using your phone for calling, we would recommend that you try to avoid giving out details relating to your bank account or access codes for your smartphone or computer while on the phone.

This piece of advice is particularly important if your job requires a high degree of privacy. Worrying about whether your smartphone is safe enough to not be targeted by cybercriminals is another thing to keep in mind, as you never know if one of them is interested in listening in on your conversations.

The post Worry for Samsung Galaxy users as calls could be intercepted appeared first on MediaCenter Panda Security.

Panda Antivirus for Mac, compatible with El Capitan

el capitan

September 30 saw the launch of El Capitan, Apple’s new operating system for its computers.

So, if you already have Panda Antivirus for Mac installed on your computer, or you’re thinking about getting an antivirus for Mac, we’ve got you covered – Panda Antivirus for Mac is compatible with El Capitan!

mac antivirus

Advantages of Panda Antivirus for Mac

  • Blocks both malware for Mac OS X and malware for Windows.
  • It scans both files and emails.
  • It quarantines infected files.
  • It offers two kinds of scans: a real-time scan that continuously analyzes Mac files, and another that performs monthly, on-demand scans.
  • You can even scan iPhones, iPads and iPod touch for malware.

Remember that Apple and its devices aren’t invincible. To avoid any nasty surprises such as XcodeGhost, you should always update the operating system, download apps from the official store, and use security software.

Are you ready to try our antivirus for Mac?

The post Panda Antivirus for Mac, compatible with El Capitan appeared first on MediaCenter Panda Security.

XcodeGhost: What it Is and How to Avoid it. The Sheen Comes off Apple’s Invincibility

apple malware

In what is a timely reminder that even the largest, and seemingly controlled, companies can face a cyberattack, Apple revealed that its Chinese App Store had been attacked by malware.

In what is thought to be the first attack on Apple’s App Store, the infection consisted of malicious code placed into iPad and iPhone apps that are popular in China. The hackers created a counterfeit version of Apple’s software for building iOS apps, which they then convinced developers to download. Once the apps were made and downloaded, the attackers were able to steal data about users and send it to servers they control.

The malware, known as XcodeGhost, could also allow the attackers to send fake notifications to users which could result in unsuspecting victims revealing valuable information. Cybersecurity firm Palo Alto Networks also states that is possible for the attackers to see log in information and other actions carried out on the device.

“In China – and in other places around the world – sometimes network speeds are very slow when downloading large files from Apple’s servers,” explained Palo Alto Networks. “As the standard Xcode installer is nearly three gigabytes, some Chinese developers choose to download the package from other sources.

Some of the apps that were affected by the attack include some that are available for purchase in App Stores outside of China, such as thee business card scanner CamCard.

“We’ve removed the apps from the App Store that we know have been created with this counterfeit software,” said Apple spokeswoman Christine Monaghan. “We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps”.

How to avoid XcodeGhost

  • Having the operating system updated.
  • Only download applications from the official store. Of course, in this case the infected apps were in the Apple store, but they have been swiftly eliminated.
  • Use common sense – it’s one of the best ways to protect yourself
  • Also, connect your iPhone or iPod to your Mac and scan it for malware with our antivirus for Mac

The post XcodeGhost: What it Is and How to Avoid it. The Sheen Comes off Apple’s Invincibility appeared first on MediaCenter Panda Security.

We’ve presented the new #Panda2016 solutions to the media!

simplexity

If you’ve ever tried out on of our products then you’ll know that we protect, and make easy, the day to day life of our customers. The digital world is getting more and more complex, at Panda we work to make the digital life of our users easy and safe – that’s why we are SIMPLEXITY!

In the Retail press conference that we held last Friday in Madrid, we decided to continue with this core idea and show this philosophy to the Spanish media in a very special event in the Espacio Mood.

The Global Retail team presented the new Panda 2016 consumer solutions in a relaxed and intimate environment that surprised those in attendance due to its down to earth feel.

panda 2016 evento presentacion

Miguel Bullón, Panda Security’s Global Retail Director, started the presentation by detailing the latest information on the company’s growth both locally and globally, and the company’s strategy for 2016 which will see Panda bet ever more on internationalization with more affiliates and country partners.

He also highlighted the differential value that Panda’s 2016 solutions offer compared to other options in the market – the Panda guarantee.

Miguel Bullón Panda Security

Next, Hervé Lambert, Global Consumer Operations Manager, and Alberto Añon, Consumer Product Manager, listed the advantages and innovations of the new Panda 2016 solutions. They consist of:

  • Multiplatform security
  • Wi-Fi protection
  • Parental control
  • Antitheft services
  • Smartwatch protection

The most memorable moment of the presentation was, without a doubt, the demo that we did comparing the functionality of Panda with that of the competition. The attendees could verify that Panda used up the least resources compared to the competition!

Hervé Lambert, Global Consumer Operations Manager, and Alberto Añon, Consumer Product Manager

That wasn’t all and, before we finished, the journalists were able to unwind and enjoy a massage, interview Miguel Bullón, and share doubts and impressions in a relaxed manner with all of the members of Panda’s Global retail team.

Well done to everyone!

panda global retail team

The Retail team: RAQUEL RUÍZ, MIGUEL BULLÓN, NATALIA LÓPEZ, ALBERTO AÑÓN Y HERVÉ LAMBERT. They rock!

The post We’ve presented the new #Panda2016 solutions to the media! appeared first on MediaCenter Panda Security.

EDR technology – much more than just standard protection

Traditional viruses, defined as executables that were sent en masse to cause infection on a large scale, are already controlled by protection systems (Endpoint Protection Platforms). These are popularly known antiviruses which, as the name suggests, protect the system of the user. The problem is that cybercriminals have evolved greatly in recent years and so has their manner of attack.

Cybercriminals change their spots every day and advanced threats are now the main focus. Direct attacks, ransomware (a technique, such as Crypotolocker, that steals information from the infected computer), zero day attacks, persistent threats… they are all spreading through the market. Businesses and everyday users are at risk, not just of information theft, but also the economic fallout of being targeted. It can also reflect badly on a company if it suffers an attack and can damage its reputation.

Fortunately, the security industry has begun to react and many big players in this sector have unveiled platforms which go far beyond just protecting your system – they can detect advanced threats while at the same time giving the best response possible to possible incidents. We are talking about EDR platforms, or Endpoint Detection and Response, to give them their full name. This term was coined in 2013 by the security analyst Gartner Chuvakin and is a trend that we at Panda Security have turned into a true star product with our Adaptive Defense 360 solution.

“The protection offered by EPP (Endpoint Protection Platform) solutions, including those that possess a traditional antivirus, isn’t enough,” explains Eduardo Fernández Canga, an expert at Panda Security. “Antiviruses are still important; they are products that protect against known threats. The problem is that some new forms still manage to enter the system. It’s not good enough to just protect your system, you also need tools that allow you to detect new threats. It’s impossible to say that we can block all malware but we can detect it and act in the best way possible,” he added.

edr technology

A comprehensive and customized solution

This is where a solution like Adaptive Defense 360 comes into play. Designed by over a five-year period by Panda’s experts, this solution is compatible with Windows and soon will be available on Android devices. “Protection solutions that detect a threat always generate an identifier and include a black list. The problem is that if there is an executable that is not on this blacklist then it assumes that it is good and does nothing against it. However, Adaptive Defense does not rely only on a blacklist. It is suspicious of everything running on the endpoint,” emphasizes our expert.

So, how does this platform work? The first thing that it does is install an agent on the user’s device. Then it analyzes the behavior of every application that is running on the system. It then sends information to the cloud regarding the behavior. By using big data and data mining tools, Panda is able to classify 95% of all that shows up, including goodware and malware. To cover the remaining 5%, Panda depends on its group of expert analysts who are able to analyze and classify what the system misses.

detection

An important differential, when compared to other solutions on the market, is that Adaptive Defense draws up a white list “for the client which we use to analyze executables,” says Fernández. Furthermore, the platform doesn’t just classify the executables but rather makes sure that their behavior doesn’t change. “Normally white list solutions aren’t capable of detecting a change when they have classified an executable like goodware. However, we generate a pattern for each executable, so if the latter leaves the pattern then it generates an alert,” adds our expert.

This last part is a relevant factor that allows customers to work with vulnerable applications such as old versions of Java, Chrome or Internet Explorer. “Many businesses feel obligated to work with software which only functions with these applications. Therefore the only way they can be protected while using them is to have a system like Adaptive Defense,” insisted Fernández.

Full control of the information flow in the organization

Another advantage of Adaptive Defense is that it allows the system administrator to know exactly what damage the malware has caused to the computer. Moreover, it allows you to know and control who has access to these harmful executables. For example, it may be the case that an employee accesses confidential information and sends it to someone outside the company. Adaptive Defense, although it doesn’t block these actions, detects them and informs the administrators.

In fact, going a step further, Adaptive Defense is a powerful tool to precisely analyze, understand and visualize the flow of information that occurs both within our organization and outward, and vice versa. “The administrator can know who, how and when data is accessed, with the all of the advantages that it entails,” says Fernández Canga.

The post EDR technology – much more than just standard protection appeared first on MediaCenter Panda Security.

Betatester 2016 competition winners

contestet

We can finally announce the winners of the 2016 Beta competition! :)

The Betatester of the year, and winner of €600, is:

  • Jayakrishnan P, from India

Also, the 9 winners of €200 are:

  • Anil Kumar E.S, from India
  • Saravana Kumar S., from India
  • Andreas Ntonas, from Greece
  • S/o Ramakrishnan, from India
  • HUANG JIN KAI, from Taiwan
  • Lauri Säde, from Estonia
  • Manuel Gredilla, from Spain
  • Alex Molina, from Spain
  • Juan Pablo Sarria Aguilera, from Spain

Thanks to all those who participated for your comments and suggestions – your opinions are always important to us!

The post Betatester 2016 competition winners appeared first on MediaCenter Panda Security.

Introducing the new multiplatform and multi-device solutions in the 2016 Consumer Product range!

The new 2016 Consumer Solutions range by Panda Security is finally available! In an increasingly global and multi-device environment, the 2016 Consumer Solutions range is designed to make the digital world easier and more secure.

antivirus 2016

The solutions portfolio for protection on all devices includes:

  • Panda Gold Protection 2016
  • Panda Global Protection 2016
  • Panda Internet Security 2016
  • Panda Antivirus Pro 2016
  • Panda Mobile Security 2016
  • Panda Antivirus for Mac 2016
  • Panda Free Antivirus 2016

It allows you to shop and browse online safely; protects families against inappropriate content; keeps identities and confidential information safe. The monitoring and optimizing of different devices is now easier than ever with the new Panda products.

Multiplatform and multi-device solutions

All of the products in the new 2016 Consumer Solutions range, from the most basic to the most advanced, offer multiplatform protection, providing service on Windows (including Windows 10 compatibility), Android, Mac and even antitheft for iPhone and iPad.

Mac systems and iOS devices are also becoming victims of attacks and threats. Therefore, the new 2016 Consumer Solutions range includes Panda Antivirus 2016 for Mac, a complete protection against viruses and other Internet threats for Mac users. It offers updates, quarantine and the possibility to analyze your iOS devices from your Mac.

The entire range includes an app for iOS that allows for the remote location of the device in case of loss or theft.

Features of the 2016 Consumer Solutions range

  • Data protection (Data Shield) to prevent the stealing of information relating to the devices. In addition Panda Global Protection 2016 and Panda Gold Protection 2016 allow for the safeguarding of files so no one can access them
  • Protection of Wi-Fi networks to display the computers on the network and detect intruders. It also allows for network audits to check its safety and potential vulnerabilities, and to block access from unknown computers.
  • USB protection, providing immunization and a protective shield to analyze the USB when inserted into the device.
  • Improved features such as Parental Control; application control, a highly effective protection against zero-day malware; PC recovery system, safe browsing, and password management and an easier, more intuitive interface (Panda Simplexity).

This is what you can find in the new 2016 Consumer Product range by Panda Security:

consumer comparative

The post Introducing the new multiplatform and multi-device solutions in the 2016 Consumer Product range! appeared first on MediaCenter Panda Security.

Panda Security detects and blocks 99.9% of threats!

March, April, May and June. During the last four months, Panda Security has obtained the best rate protection in the Real World Protection Test by Av-Comparatives.

It’s possible that you don’t know exactly what this means, so that’s where we come in! The test reflects real conditions in which the security solutions of different companies are analyzed and examined.

It is an independent laboratory, so the conclusions drawn from the tests are really important.

In these tests, Panda participated with our free antivirus, Panda Antivirus Free, and successfully detected and blocked 99% of the threats.

It’s easy for us to say this to you in words, but we think you’ll appreciate it more with this info-graph.

best protection

So, there you have it, if you want the best protection… you need Panda!

If you want to share the info-graph you can do it with this code!

The post Panda Security detects and blocks 99.9% of threats! appeared first on MediaCenter Panda Security.

Panda Security, compatible with Windows 10

Next Wednesday, July 29th, Microsoft will launch Windows 10. This new version has been gaining lots of attention in recent months and there are many people eagerly waiting what is seen as the launch of the summer.

If you are one of those and you have a Panda product, then fear not – Panda Security’s antivirus is completely compatible with Windows 10!

windows10 compatible

All of the products from the 2015 range are compatible with the new version of Windows and, if you have an older version but are thinking about updating your operating system, we recommend that you download your antivirus for Windows 10.

How to download an antivirus for Windows 10

It couldn’t be easier! All you need to do is go to the webpage and download your antivirus for Windows 10 which will keep your computer protected against all types of threats.

So, there you have it. On our end, there’s no problem, so now it’s up to you whether update your computer to Windows 10 or not!

The post Panda Security, compatible with Windows 10 appeared first on MediaCenter Panda Security.