Tag Archives: Panda Security

Why It Is Easier To Control Your Company’s iPhones With iOS 9

It is increasingly common for employees to use their personal technological devices to complete job-related work, whether it is responding to a corporate email from their Smartphone, managing a client relationship from the ease of their tablet, or performing typical work tasks at distance from home, using a personal laptop.

Teleworking, and a trend called BYOD (Bring Your Own Device), are at rise and have made the people in charge of security companies increasingly aware of the risks involved with the use of these devices. These devices should be treated with the same protection measures as office computers and systems.

Apple is aware of this and has included a set of tools to facilitate what is called MDM (Mobile Device Management) in iOS 9. This will help employees control their devices and access company resources more securely.

Thanks to these developments, companies can control the traffic of any employee’s iPhone, track IP addresses or install an application to track their location, for example. To respect employee privacy, the Smartphone will show their users that these actions are being taken on their devices, like someone is browsing their history or seeing the location of their device.

Companies can see any employee’s iPhone location.

In addition, the latest version of iOS allows for application white lists or black lists, which makes it possible for IT security managers to decide what can run and what cannot in employee devices. Same with passwords: If a website is not on the list of trusted sites, the user will not be able to save their user name and password for upcoming sessions (“Do you want to remember your username and password?”).

The MDM tools that Apple has added to its mobile operating system also allow managers to configure notifications that employees can receive on their phones; they can decide what will be displayed and what won’t, by adjusting the permissions of each app. Lastly, the person in charge for the company can block devices or erase their contents, remotely.

The person in charge for the company can block devices or erase their contents, remotely.

Thus, Apple has strengthened the security of their devices for the business environment, which requires even higher standards than usual for sensitive company information. It is a great step forward, but it is not the only measure that should be taken by IT security managers. They should always install a good anti-virus in each employee device, which is also essential to avoid malware and cyber-attacks. Let’s remember: a single infected mobile could cost your company thousands of euros.

The post Why It Is Easier To Control Your Company’s iPhones With iOS 9 appeared first on Panda Security Mediacenter.

Be a Better Friend to the Environment with These Five Apps…

1605-enviromentday-wwf-2-04

Though we often speak of electronic waste and the darker side of technology, whose insatiable energy consumption is causing serious harm to the environment, we can actually use technology for good. It’s possible for the internet and our Smartphones to be environmentally friendly.

 

This Sunday, June 5th, we celebrate World Environment Day. We wanted to take this opportunity to share some of our favorite applications that help us be more sustainable.  Help us save the planet!

 

How Big is Your Footprint?

 

Our everyday routines have a greater impact on Mother Nature than we think. The first step in reducing our carbon footprint is to be aware of our actions. GiveO2 is an incredibly useful application that analyzes transportation activity and offers rewards if they are improved. Come on! “Compete to be the most sustainable!”

Leafully helps track how much electricity you consume by showing how your energy consumption is effecting the environment and how many trees are needed to offset the pollution.

 

We All Need Oxygen

 

You probably already recycle in one way or another; you try to save water, electricity, fuel and, in general, you try to respect our environment. But you can take it a step further. Applications like Gardenate educate users how to cultivate and take care of their gardens and vegetables. Don’t have a garden? This app can also help you take care of your household plants.  It notifies you when you need to irrigate, fertilize or treat them.

 

Not a Star in the Sky

 

Light pollution is often forgot about in today’s busy world. Light pollution is when we are unable to see the sky clearly due to artificial lights and street lamps. Loss of the Night is an app that raises light pollution awareness by helping users measure skyglow. The app was created so that, in the future, “cities will save energy and money, while having appropriately lit streets, dark bedrooms, and a sky once again full of stars”.

 

I Can’t Hear You!

 

Noise, especially in large cities, is another way we are unknowingly damaging the environment. Apps like NoiseTube helps us track the noise level in the most bustling and quietest cities.  Users are able to measure the noise level in their surrounding area then upload it to the app, enabling any Smartphone user to participate in “global noise mapping”.

 

Take Action

 

It is time to take action and help save our planet. There are a multitude of apps (like Go Green) that offer advice and recommendations for a more sustainable lifestyle. Are you part of the solution or part of the problem? Find out if you are helping or hurting the environment and, if necessary, change what you’re doing.  Check out the official

 

Go with peace as you download these apps, but make sure to download them off an official site like Google Play, the App Store, or the Windows Store, to avoid malware threats. And remember to have a good anti-virus on your device that will help you protect yourself from any of threat.

The post Be a Better Friend to the Environment with These Five Apps… appeared first on Panda Security Mediacenter.

Billion Dollar Sting: A Financial Corporation’s Worst Nightmare

Banks panda security

For years cybercriminals have had their focus on money, and most specifically in the financial system. For more than a decade they have been mainly targeting the weakest link in the chain: the final user that uses online banking services. This approach has some benefits for these cybercriminals: poor security in the end user, small money thefts that can go undetected for some time, etc. However it also has some cons: need of money mules, being able to find (infect) a victim that is using one of the targeted banks, avoiding antimalware software, etc.

In other words, they can make a lot of money, but at the same time it will require a lot of effort from their side.

Where is the big money? Financial institutions themselves. There is no discussion about this. However it is hard to break into them, and even more complicated to understand how their specific internal systems work in order to be able to fully compromise them, take the money and leave without leaving a trace. It requires a great investment to gather all the intelligence needed for this kind of heist, it is not easy to perform and it might require several months, if not years, of careful planning. Anyway it is worth it if 1 billion dollars can be stolen in just one hit.

This is basically what happened in February at the Bangladesh Central Bank, where attackers infected their system with malware specifically created for this attack and tried to make fraudulent transfers totaling 951 million dollars. That money was in the account Bangladesh Central Bank had at the Federal Reserve Bank of New York. Gladly most of the transfers could be blocked, and “only” 81 million dollars were stolen. But this was not the only case.

Tien Phong Bank, a Vietnamese bank suffered a similar attack in the last Quarter of 2015. That time cybercriminals also tried to make transfers through SWIFT, although the bank could realize in time and could halt the 1 million dollars transfers already on route. And a few months earlier, in January 2015, a bank from Ecuador –Banco del Austro –was hit in a very similar way, and 9 million dollars were stolen.

banks-sting-illustration

What are the similarities among the three cases? Malware was used to perform the attack, and all the money transfers were made using the SWIFT network. SWIFT (Society for Worldwide Interbank Financial Telecommunication) is a cooperative society formed by thousands of financial institutions around the world. Founded in 1973, it provides different services to their members.  The secure transfer of money among banks is one of the services offered and processed by the SWIFT network.

The biggest concern was if the SWIFT network, that was believed to be secure, had been compromised. If this was the case the entire financial system could be at risk. It looks like this was not the case and SWIFT has issued a press release where it clearly states this: “the SWIFT network, core messaging services and software have not been compromised.”

However, that depends on the point of view: cybercriminals successfully used the SWIFT network to perpetrate these heists. And they took a similar approach as the one described in the beginning of this article: target the weakest link in the chain. SWIFT provides a safe environment, but at the end of the day, each financial institution has its own internal system that communicates with the SWIFT network. In the same way cybercriminals were targeting final customers with banking Trojans, now instead of going after the SWIFT network, they are going after the banks connected to it. This means that, while we can say that the SWIFT network is safe so far, we can also say that there are potentially thousands of holes that exist, as many as financial institutions connected to them.

How did these attacks happen exactly?

There are still many unknowns, and some of them won’t ever be solved. These criminals have covered their tracks. In fact, the main purpose of one of the malware pieces used in the heist was to delete these tracks. One thing we know for sure: malware was used. How did it enter? For this we have two different options: there was help from an insider, or it was an external attack through Internet. Both seem plausible, even more so after we learned that the security infrastructure at the Bangladesh Central Bank was obviously not good enough.

If we take a deeper look at the Bangladesh incident, it was a highly sophisticated attack targeting specifically the Bangladesh Central Bank, but the way the malware is structured (using an external configuration file, which makes no sense if this was just a one time job) points out that we’ll find new victims. They will go after banks that have flaws / weaknesses in their security model, such as those that do not monitor the execution of software in their network, and so far the information we have on the other attacks confirm this hypothesis.

In their customer communication SWIFT tells all the banks that their first priority should be to ensure that you have all preventative and detective measures in place to secure your environment.

So that’s easy, right? How can we ensure that? Is there anything at all that can be done to completely prevent any new heist?

Criminals will keep trying, and eventually they may succeed. Anyway we know what they are after (money) and what computers they want to target (those connecting to the SWIFT network). Access to the SWIFT network is highly restricted, it can only be performed from certain computers and only certain users are allowed access to them. Those computers have to be highly fortified, and of course we are not just talking about having updated software and use an antimalware solution.

Only pre-approved software should be let executed in those computers. All executed processes have to be monitored in real time, logging everything that happens and looking for abnormal behaviors. It does not matter if the attack comes from the Internet or with the help of an insider. No unauthorized software can be allowed to be executed in those terminals, and the allowed one has to be protected with anti-exploit technologies and monitored in real time in case some abnormal behavior takes place.

Of course, if some person has physical access to a target computer, at some point they could disable any security solution, which is not a problem by itself if you can get an alert about it on the console used by the security team. Is there any better indicator of compromise than someone tampering with the security software installed in a critical system?

How to avoid these cyber-attacks

One of the most frustrating things that victims have to go through is the lack of knowledge of how the incident happened. How did it happen? When did it start? For how long? What did they do once the computers were compromised? Was there any confidential information leak? As an example, in the Bangladesh Central Bank case, three pieces of malware could be recovered after the incident, but that’s what there was left. Attackers probably used many other tools that were deleted and the victim won’t know anything about them.

Knowledge is power: being able to know how a security incident happened will help you fix any security weakness in your environment.

There are only a few solutions that are capable of delivering this level of service, Panda created Adaptive Defense for these type of cases and we already have financial companies, governments, and big corporations in different verticals (health, hotels, insurance, public utilities, etc.) actively using Panda Adaptive Defense. All of them suffer not just the regular cyber-attacks, but really targeted attacks against their assets. We have shown some of them, such as the one targeting a luxury hotel chain a few weeks ago or the one against oil tankers.

Our conclusion after studying these attacks is that If those banks would have had Panda Adaptive Defense in their SWIFT connected terminals, the heist could have been stopped in time.

The post Billion Dollar Sting: A Financial Corporation’s Worst Nightmare appeared first on Panda Security Mediacenter.

Most company training programs leave out important IT security information. Are you at risk?

formacion_FOTO1

Workers are the first and the weakest link in the security chain (including your boss), especially if they have not received adequate training to defend themselves against cyber-attackers. Sadly, if malware were to sieve into an employee’s Smartphone or mobile device it could potentially cost a company more than 8,000 euros. This is the beginning of the end, and opens the door for cyber-thieves to steal massive amounts of sensitive information from your company.

 

There are some basic tips that every company should give their employees to keep their personal data and computers protected against cybercriminals, like: confirming the identity of anyone requesting information, keeping passwords secure, and backing up their computer. Alarmingly, organizations are neglecting to share this security-related knowledge with their employees, as seen in a recent study.

 

46% of the companies who participated in the study assumed that this type of preparation or formation would be obligatory for all employees. But in fact, only 60% of the companies that have fallen victim to information theft oblige their workers to go through a learning period, which would educate them on internet security and ensure that confidential data will not be compromised.

 

As shown in a study, less than half of companies assumed that IT security training is obligatory for businesses

 

Sadly, for the companies who do have “training” programs, there is a lot of important information left out. In fact, many security training periods only educate workers about basic IT procedures. Approximately 43% of the surveyed companies offer a basic course for their employees, and usually they do not address many of the risks that often lead to cyber-attacks.

 

Phishing and social engineering are two main threats in our cyber-sphere, but only a small fraction (49%) of companies review them in their security courses. In addition, two significant topics that are barely talked about (if they’re talked about at all) at these training programs are: mobile device security (38% of courses include this subject) and Cloud security accounts (29%).

 

Knowledge is power. It is the greatest barrier against these type of internet-related attacks; the nightmare of a cyber-attack can be easily prevented if employees are taught how to use the internet in a responsible manner. Bots or no bots, when it comes to cyber-security strategies, humans are still a company’s greatest weakness or their greatest strength. Everything depends on the level of training that is available to them.

The post Most company training programs leave out important IT security information. Are you at risk? appeared first on Panda Security Mediacenter.

Have they hijacked your browser? Here’s how to fix it

hijacking2We’re sure your browser has been hijacked before. Say you decide to download a program you need from a seemingly reliable website (like Softonic), and you click “install” to begin downloading without really thinking about it. When it finishes downloading, you go back to the browser and you realize that one or more toolbars have appeared or that the home page is no longer Google. The search engine hasn’t changed too much in appearance, but it is not the same one as before.

This is very common and is called browser hijacking. Why has the start-up browser page changed and how can I fix it? A malicious program—or at least an unwanted one—has corrupted your computer. Another example: While installing part of the software, your browser’s options change without your permission. The way it changes varies, but the end result is usually the same: more advertisements.

You have changed the start page or have toolbars that you have not installed voluntarily.

The “kidnapper” is earning money thanks to this practice (which is sometimes harmless but always very bothersome). Depending on the malware that is installed on your machine, it can be more or less difficult to get rid of. Don’t forget to take precautions.

In this case, there is a measure that almost never fails: installing antivirus software and keeping it updated. Good security solutions are able to recognize the malicious programs and prevent them from getting into your computer.

What if it’s too late?

If it is too late and your browser has been kidnapped (ex. it runs slower than usual, displays advertising for unusual sites, you see toolbars that you didn’t install, the home page has changed or your searches are redirected), then you have no other option than to restore the configuration to get everything back to normal.

For the most popular browsers, including Google Chrome, Mozilla Firefox or Internet Explorer, you can restore the configuration using the simple instructions online.

The post Have they hijacked your browser? Here’s how to fix it appeared first on Panda Security Mediacenter.

Happy Geek Pride Day! Here are Five Security Gadgets for your SME…

PandaGeekPride_ENG_800x800gif

Happy Geek Pride Day!  To celebrate our special day, we’re sharing with you some of the most innovative security gadgets to help your businesses stay protected and grow.  Technology is fundamental for any modern business. You might be thinking that IT security is far out of reach for your small to medium-size enterprise because of a limited budget. Wrong! You can protect against the constant threats that lurk in the web without breaking your budget.

With just a few bucks and some basic knowledge, there are many things us geeks can do to ensure the safety of our SMEs. Today is the day we rejoice in our shared love for technology and innovation.  Here are five cheap tools that will reinforce your company’s security:

Access Control

…the key that opens the doors of tomorrow.  The future of password identification is biometrics.  We’re sure you have noticed that it has been  increasingly popular for offices to use fingerprint readers, especially for entrances, to make sure that only the employees, and those invited, have access to the facilities. Protect entry to your business, or geek lair, with a smart lock.  Gadgets using Bluetooth, NFC, RFID or even Photonics Technology – can fulfill the same purpose.

Security Cables

Are you a geek that isn’t fluent in computer?  No problem.  Here’s a more hands-on solution.  Look to see if your laptop has a round slot, possibly close to the USB ports or the charger socket.  Maybe you’ve never noticed it but its more possible that you’ve been wondering what it is used for.  This is a Kensington Security Slot, a small hole that allows you to install a lock to block access to your machine.  Your roomie won’t be able to “borrow” your laptop anymore.  Although they won’t exactly strengthen the security of your laptop, security cables are cheap, tried and true.  They will definitely prevent future annoyances for your SME.

Cheap Alternatives for Video Surveillance Systems

The Internet of Things has opened up a world of possibilities for SMEs with small budgets. Now, we can set up surveillance systems using cameras that communicate with Smartphones. Piper, Canary or Nest Cam are some of the most popular and accessible systems.

The USB condom that protects your smartphone

Is your Smartphone your life? If your one of those entrepreneurs that sweats bullets as soon as you hit low-battery mode, then you’re probably accustomed to recharging your phone in public places like airports, cyber-cafes, or other similar charging stations, which in many instances, are massive hacking zones for cyber-criminals. A USB condom is inserted into the USB connector on your smartphone, tablet or computer, and disables the port’s data pins. The idea is that you insert it into your device before using free charging stations at less than trustworthy places. Once your charged-up, the device will eject and the USB port will operate as normal. You can find these devices in various models.

U2F

We have already chatted about two-step verification.  By now, you have probably grown tired of entering your password twice to confirm your identity for services or sites you access on the daily (like email accounts, for many of us). For less than €6, you can buy U2F Security Keys, which replace that second authentication factor.  As a safety guarantee, this special USB key does require you to enter on your computer that you, and only you, will try and access the computer.

USB KEY

The above-named gadgets can take your SME to a new level of protection, but you shouldn’t forget that hardware insurance is of little use if it is not accompanied by a good security software. With the Panda Antivirus, small and medium-sized enterprises won’t have to spend much time or money to defend their most valuable digital assets in the best possible way.

The post Happy Geek Pride Day! Here are Five Security Gadgets for your SME… appeared first on Panda Security Mediacenter.

How to Recover a Stolen Smartphone

recuperarmovil1You wake up to the beep-beep! ring of an alarm and, as you eat your breakfast, you comfortably read about the current events on your Smartphone screen without needing to listen to the radio, watch television or turn on the computer. On your way to work, while on public transportation, you take advantage of the time and play a game you’ve downloaded. You chat with your friends on WhatsApp at all hours of the day and even share photos of your outings on Facebook. Even checking emails from your boss has become a somewhat lighter task thanks to this thing that goes with you everywhere: your Smartphone.

 

Mobile phones and tablets have become part of our day-to-day. Most people argue that without them, our lives would be more complicated and boring. Their necessity makes it of upmost importance that we educate ourselves on how to protect these devices to ensure the privacy of the personal data they hold.

What if your Smartphone disappeared?

What would you do if you lost your Smartphone or it was stolen?

 

We have shared a multitude of tips that will help keep your terminal from disappearing into the reach of a cyber-criminal, but what if your Smartphone physically disappeared? What would you do if you lost it or had it stolen? Let us hope that you will never have to find out, but just in case, you should prepare yourself.  We have good news: we present to you a free App that will help you if your phone is stolen, and help you hunt the thief who took it.

 

The App, which you can test for free, allows you to locate the terminal in case of theft or loss. You can see the location of your mobile phone or tablet on a map and can even lock the device or erase data remotely. This will prevent a third party from using your phone and accessing your personal information.

What about Smartwatches?

 

Connecting Panda Security to your Android Wear Smartwatch is one of the simplest ways you can protect and recover your device. If you activate the anchor mode in your watch you will know where it is at all times.  If it’s too far away, an alarm will go off.  If it is stolen, you will be able to see its location on a map, block it from being used and delete information.

 

What are you waiting for? Protect your most precious technological goods with the best anti-theft application.

The post How to Recover a Stolen Smartphone appeared first on Panda Security Mediacenter.

“Complete security does not exist in any part of life and definitely does not exist on the Internet”

Ten years ago we started celebrating World Information Society Day on May 17th. On this day, we honor the Information Society and the importance of telecommunications by raising awareness about the Internet and its possibilities, as well as other information and communication technologies (ICT). Luis Corrons, technical director of PandaLabs, pointed out some of the Internet’s capabilities for society and business, and gave us some information on how we can reduce digital divide.

 

Panda Security– The majority of traditional media outlets are already on the Internet, what advice do you have for them regarding computer security?

 

Luis Corrons Internet is a communication tool. Online media sites do not differ much from the rest of other websites, so really, the security measures are similar to those of any website belonging to a company in another sector. What they need are reliable systems that provide availability and are fast, but also take safety measures to protect them against possible server attacks. Also, businesses must be extra careful with personal information belonging to their users and/or subscribers.

 

PS– Social Networks are the main catalyst for change when it comes to the way we communicate, also affecting the personal world of an individual. Are privacy and cyber-security connected?

 

LC No, privacy and cyber-security go hand in hand. Social networks and privacy are connected, because they encourage that we abandon our privacy by asking us to share personal information that would have never been public prior to their existence.

There are always those who violate the law by taking advantage of the Internet’s benefits.

 

PS– Internet Day celebrates everyone’s digital freedom: we can decide what to do in a digital environment, how to do it, and to whom. Is this a way for cyber-criminals to intervene?

 

LC– This is similar to the freedom we have walking through the streets of a city. But we are not going to prohibit walking down the street, or allocate pedestrian licenses, or make people check in on every corner so that the authorities know where they are at all times. It is clear that in a free environment there are always those who violate the law by taking advantage of the benefits, like those on the Internet, but we cannot let that be an excuse.

 

PSThe use of the Internet is increasingly widespread. One of the best examples is the number of mobile phones in our country. Do you think we should remind users that their security is in constant danger when browsing the Internet, or do you think that many times it is an exaggeration?

 

LC– Complete security does not exist in any part of life and definitely does not exist on the Internet. But we must not be paranoid. Just as we know that when driving a vehicle the probability of an accident is lower if we follow the rules, we can be reasonably safe if we have taken appropriate measures prior to surfing the web: have software updated and use a dependable security solution for all devices like computers, tablets and Smartphones.

 

PS– Internet is linked to technology. It is connected to TVs, online videos, the Internet of Things… do we communicate better or worse thanks to these technological developments?

 

LC– We communicate easier. Never in the history of mankind have we enjoyed so many options like the ones at our disposal today. With those options we can communicate better or worse… it is debatable. It can be said that there are people who are very faithful to the online world, and are much more isolated from the real world than they would be without the Internet. Do we communicate worse or better? It depends on each person.

 

If security is not present during a company’s digital transformation, it can ruin them.

 

PS– Digital transformation is a mandatory process for companies. What guidelines must be followed to complete this process safely?

 

LC– For those companies who have not already adopted digital transformation, it is probably too late. In any case it is essential that we take into account a company’s security when undertaking a digital project. We can have the best idea in the world, run the project perfectly, and make it a great success, but if security is not present our businesses will sink. Let us remember the damage that was suffered by companies for these type of attacks. Last year, the website Ashley Madison and the Italian company Hacking Team are clear examples of the damage these cyber-attacks can have.

 

PS– “Cloud” services group customer information into a network of specific servers. Do you need extra security to protect them?

 

LC– The fact is, for both the user and for the business, using cloud services actually decreases the work we have to do to protect the information. As much as a company wants to protect their users’ information, who is going to be able to devote more resources to do so than companies like Google or Microsoft? From this point of view it is clear that the information is more secure in the Cloud. However, there are other risks that we cannot forget: if someone were to steal one’s identity they would have access to those services that can be accessed remotely.

 

Remembering to update, protect and distrust are key for navigating the web safely.

 

PS– What minimum precautions should a user take for a safe experience?

 

LC– There are some guidelines that apply to all devices (computers, tablets, Smartphones)

  • Update: always have applications and the operating system updated, in order to patch any known security holes.
  • Protect: Use a security solution to protect us from the millions of attacks that occur on a daily basis.
  • Distrust: Many times, the users themselves cause security problems. We are very confident when we are on the Internet, and cyber-criminals take advantage of this by using the so-called “social engineering techniques”, where they trick us and infect our companies.

 

PS– Technology and cyber-security: what do we see for them in the future?

 

LC– A lot. The Internet of Things are going to fundamentally change the world of cyber-security, with more devices that need protecting every day, from domestic appliances to vehicles, all of them are connected to the Internet. The greatest risk is that many of these newly connected devices were designed without taking into account that they would be connected to the Internet one day. Their manufacturers do not make security a priority. Just imagine that someone “kidnapped” your house using ransomware and does not allow you to leave or enter the house until the ransom is paid. Although this seems like science fiction, we must be well prepared for what lies ahead.

The post “Complete security does not exist in any part of life and definitely does not exist on the Internet” appeared first on Panda Security Mediacenter.

Eight everyday security tips for the whole family

family-EN

From the youngest to the oldest in your household, every member of the family uses the Internet and apps to inform, entertain and maintain contact with their loved ones. This Sunday, May 15th, is International Day of Families and to celebrate, here are some basic tips to keep your family safe while navigating the web.

Updates

Make sure that your operating system and programs or applications are updated properly. Manufacturers often fix vulnerabilities that are appearing, but the only way to make sure your software is “patched-up” is by using the latest version.

Email Attachments

If you get an email that looks suspicious, do not open it until you are sure that the sender is who he claims to be. If you receive unknown messages, do not download the attachments! Even those documents that appear harmless (such as a Word or a spreadsheet) can hide malware. A simple photo might not be what it seems.

Public Wi-Fi

Prevent connecting to public Wi-Fi networks.  Any cyber-delincuent  could use the network as a trap to access your device and steal your information.  If you must use a public network, you should follow these basic security tips.

Online Shopping

While searching for the “best deals” online, we can end up on some unreliable and unknown websites.  Stay away from them! Always verify that the website address matches the webite you are trying to access and that it starts with “https”.  If you always buy on reputable website you will avoid greater evils.

Social Networks

Do not accept friend requests from strangers or allow your children to do so. Try not to share your personal data (like your phone number or address)across platforms like Facebook, Twitter or Instagram, because you can never be certain who is on the other side or spying your conversations. It’s better to be safe than sorry.

Anti-virus

A good anti-virus is the best barrier that you can put between your computer and possible cyber-attackers. Each day, new vulnerabilities are discovered. Only the security experts are aware of them and can update the protection measures when there is a threat.

Parental Control

There are always threats on the network targeted towards young internet users.  Educate the children in your family about proper internet usage and how to recognize unusual behavior.  Teach them what they should do in a difficult situations and always install a good parental control system, like Panda solutions.

Keep Them Little

It is normal, if not inevitable, that your children use social networks or messaging programs like WhatsApp, Snapchat, and Facebook Messenger to speak with their friends. These services can be beneficial or entertaining, but are not 100% danger-free.  Beware of cyber-bullying and the danger-strangers that lurk behind the disguise of a screenname. And for those older members of your family, you should educate them about the dangers of sexting.

 

The post Eight everyday security tips for the whole family appeared first on Panda Security Mediacenter.

The Best Free Tools for your PC

Panda Free

From fashion and flights to technology and innovation, we love to get a good deal.  We get a thrill out of saving money, and it’s even better when it’s free.

There’s a world of freedoms, thanks to popular software and licenses that are offered for free, depending on what interests you. Whether you are a photo-fanatic, music-junkie, or just love a good deal, there are tons of resources at your disposal. There is even software that turns your phone into a digital wallet, in case you want to go wallet less!

The Down Low on the free Downloads

You can perfect and share a multitude of photos using free photo editing software. One of those freebies, PhotoScape, allows us to retouch and perfect all of our digital images in just a couple clicks. Once they’re fixed up, go ahead and share them on your favorite Social Network.

Because of their accessibility, we have become over-consumers of music, TV and movies. We want to use them whenever we want. You can organize and play all of your media using VLC media player, a free and open-source multimedia player that is available for different operating systems in several versions. You are able to watch movies and TV shows, and listen to music. It can be downloaded in the following formats: OGG, FLAC, MKV, MP3, MP4, WMV, MOV.

But, even freebies have imperfections. Companies have been battling to be the internet’s “most downloaded”, as seen with Google Chrome and Internet Explorer´s back and forth battle.  Explorer was recently dethroned as the most-used browser. Regardless of who is in first place, both of these web browsers continue to trail the rest, like Firefox and Safari.

Take care of your PC on a low-cost budget

If we want to take advantage of these tools we must make sure our PCs are running at optimal levels. The free software CCleaner helps us delete useless files, while keeping our PCs clean, optimizing it, and speeding it up!

What about cyber-security? Let’s not forget that hackers take advantage of large security holes in order to attack Internet users. To protect ourselves from the 227,000 new malware samples that have been detected each day this year, we have free solutions like Panda Free Antivirus 2016a great value with Panda´s guarantee. Quality isn´t always costly!

Who said it was expensive to keep your system up-to-date?

The post The Best Free Tools for your PC appeared first on Panda Security Mediacenter.