Tag Archives: Tips

How to tell if your Wi-Fi network has been hacked

Wi-Fi networking is absolutely essential to the modern home. From smartphones to games consoles to intelligent thermostats like Nest, virtually every appliance now requires a wireless internet connection.

As a result, there is all kinds of valuable information being transmitted across your Wi-Fi network – credit card numbers, passwords and sensitive photos and files. Which makes your network a natural target for cybercriminals.

Introducing drive-by hacking

Because you can’t see wireless network signals, you cannot easily tell how far they reach. It is not unusual for your network to extend into the street outside your house – which provides an opportunity for hackers to get connected.

Using basic cracking tools, it is possible to bypass Wi-Fi network security in as little as 10 minutes. It may be that these hackers simply want to use your internet connection to get online – not as serious as stealing your sensitive personal information, but still stealing nonetheless.

So how do you know if your Wi-Fi network has been hacked?

The first sign that your Wi-Fi network has been compromised will probably be a general decrease in internet speeds. The more people connected to your network, the more problems you will have loading webpages or streaming videos

If you notice anything strange happening on your network, you must investigate. The first thing to check will be the Wi-Fi router itself.

The connected devices list

Log into your router using the username and password supplied when it was installed (they are often printed on a sticker on the rear of the unit). The specifics for each router are different, but you are looking for the Wi-Fi status page which lists all the devices that have connected, or are connected, to your network.

These details may be under a section called Attached Devices, Device List or Home Network for instance.

The list should look something like the image below (we’ve blocked out some of the most sensitive details):

pandasecurity-wifi-hacked

Have a look through the listing, looking for any devices that are unfamiliar. Any devices you don’t recognise indicate a hacker may have compromised your network security.

It is possible that some of the devices have “unfriendly” names that aren’t immediately recognisable, but which are completely legitimate. Make sure you check all of your Wi-Fi-attached devices before panicking!

Keeping Wi-Fi hackers out

There are a number of advanced techniques for improving your Wi-Fi network security, like locking down network access to pre-approved devices based on the unique MAC identifier. Far simpler, and almost as effective, is to simply choose a more robust security protocol.

The latest, most secure option is WPA2 as shown below:

pandasecurity-hacked-wifi

Just remember that if you do change the security protocol setting, you may have to reconnect all of your Wi-Fi devices – but that’s a small price to pay to prevent people cracking their way onto the network.

You should also add a second layer of security to deal with the eventuality that a hacker still manages to break in. A comprehensive security application installed on your PCs and Android phones will help prevent your personal data being stolen. This has the added benefit of blocking viruses and to protect younger members of your family from questionable web content.

Wi-Fi security is constantly evolving

you need to stay aware of what is happening on your network to keep the bad guys out. These tips will help you tell if something is wrong and help to formulate an effective response.

In the meantime, download a free trial of Panda Security to protect your PCs while you check your router.

The post How to tell if your Wi-Fi network has been hacked appeared first on Panda Security Mediacenter.

Spotify under fire: Are we entering a new era of malvertising?

pandasecurity-antivirus-spotify

Tips to protect your personal data on online music streaming platforms like Spotify

Malvertising – yet another offspring of the online advertising, has been around since 2008. However, in 2016 we’ve been observing more and more creative ways of hackers trying to compromise your system by injecting malicious or malware-laden advertisements.
They are getting so creative that infected adverts are no longer a threat that comes only from questionable torrent websites.

There are reported cases of malicious codes being able to sneak up into your devices from reputable online advertising networks and webpages. A few days ago even Google acknowledged a fault in their Chrome browser – as reported by Ars Technica, over a two-month span starting in August 2016, a malicious advertising campaign downloaded the Banker.AndroidOS.Svpeng banking trojan on about 318,000 android devices. Even though the malicious installation files were not automatically executed, they have been named names such last-browser-update.apk and WhatsApp.apk – file names that could have been easily mistaken for legitimate ones.

Spotify was recently under fire too – multiple sources such as Engaged confirmed some listeners got not just free music but malicious code too. Some of the confirmed cases state files didn’t even have to be executed in order to cause damage. All three major platforms have been targeted – Linux, Mac and Windows. It is not yet confirmed if the code has been able to affect all three platforms.

How is this happening?

It’s not yet that hard to get unnoticed. All reputable advertising networks have strict guidelines for organizations interested on working with them. However, even though advertisers pass rigorous checks, in some cases advertisers can modify the ads after they have been approved. This is particularly easy when the ads are hosted on their own servers. Therefore, seeing a malicious ad should not surprise you and you will have to be prepared.

How do we stop it?

There is a simple way to not be a victim – remain vigilant. Hackers are after your credit card information, social security number, address and personal information. Just don’t share this information with them! Phishing tactics are getting more and more advanced and you need to stay on top of your game – here’s how;

  • Don’t be afraid to install antivirus software on your device. You don’t drive your car without a car insurance, do you? Why would you leave your cell phone, PC and/or Mac vulnerable to threads without any type of backup? The best way to know if you are being targeted is to have the software that would sound the alarm if there is any suspicious behaviour around your connected devices. Panda’s Internet Security is a must and it comes with 1 month free trial.
  • Remain vigilant – even if you are protected, phishing emails could be so well done and could take you to spoof sites that may look as good as the original ones. Always check the URL you are on and make sure you double and triple check the page location if you are being asked to provide your login details or to reset a password. You may be in the wrong place!
  • Don’t use the same password over and over again – as we reported, millions of passwords have been stolen over the last years that it is very likely your username and password are in someone’s database already. Using the same password is similar to not changing the lock after purchasing a condo, you literally don’t know who else already has a key. Don’t test it, better be safe than sorry!

The post Spotify under fire: Are we entering a new era of malvertising? appeared first on Panda Security Mediacenter.

How to keep your kids away from dangerous websites

When used correctly, the Internet is an amazing learning resource for your children. But just like any other “open” communications platform, there’s a lot of unsuitable content out there.

As a parent, you want your kids to get the most enjoyment and education from their time online. But you also want to limit access to illegal or undesirable content – at least until you are sure they have the skills needed to protect themselves online.

So which sites present a danger to your kids, and what can you do about them?

Social networking sites

Social media has taken the world by storm – and your kids want to get involved too. But there’s a reason that Facebook, Twitter and Instagram insist that their users must be aged at least 14 – there’s a lot of unsavoury content out there.

Despite this age restriction, many kids are lying about their age and signing up anyway. Which means they are opening themselves to unsuitable content or approaches by criminals.

The most effective way to prevent these problems is to simply block access to social network sites. The Panda Gold Protection antivirus allows you to do just this on your family’s computers.

Warez and torrents

Software piracy is a major problem as criminals share games, videos and software online illegally. Downloading these files – sometimes called ‘warez’ – is completely illegal and could see you prosecuted in court.

It is not unusual for these files to be compromised with malware either. Malware that can steal your personal data, or destroy your computer.

It is vitally important that you prevent access to warez sites, as well as those listing torrents – the tool used to download these files. Your

You should seriously consider blocking access to illegal content for the adults in your house as well the children!

Chat and unrestricted message boards

Online communities aimed at kids, like Club Penguin and Minecraft, tend to be very proactive at detecting and blocking adults who attempt to use the platform for grooming and exploitation. Other “open” forums are not so well managed.

Sites like Omegle and ChatRoulette are notorious for problems for instance. Users are connected randomly for text and video chat – so you have no idea who your kids are talking to – or what they might see. And the same is true of virtually any open chat forum.

Again, you should help your kids understand where to find “safe” online communities, and to avoid those that could be dangerous. You can back this up by blocking access to unmoderated sites, or which are simply unsuitable for children.

Managing access isn’t as hard as it sounds

Blocking access to dangerous sites sounds time consuming and difficult – but with the right internet security tool, the process is actually very easy.

Panda Gold Protection gives you a number of topics, and you simply select the list that applies. So if you want to stop kids accessing sites about tobacco and smoking, you apply that list to your account.

These block lists are centrally managed, and updated regularly. So as new sites and services become available, they are blocked automatically. And once you are sure your kids are mature enough, you simply deselect the lists to restore access.

Need to know more? Ask us a question.

The post How to keep your kids away from dangerous websites appeared first on Panda Security Mediacenter.

Which are the best mobile messaging apps?

pandasecurity-best-mobile-messaging-apps
There are dozens of messaging apps available for your smartphone, each with its own strong points. This guide will help you understand which are the best – and how to use each one securely.

Best for – Apple users

Built into every iPhone and iPad as standard, Apple’s iMessage app is a safe and secure tool for staying in touch with friends and family. You can send text, photos and videos quickly and easily – and your messages are encrypted to prevent people snooping on them.

The only drawback is that iMessage only works on Apple devices. So if your friends have Android handsets, you won’t be able to contact them this way.

Staying safe: Make sure you have a passcode enabled on your phone. You should also consider disabling the message preview on your lock screen.

Best for – picture messages

Despite the controversy about how teens may be using the app to send inappropriate pictures, Snapchat remains a useful tool for picture messaging. You can add sketches or text to your photos to make sure people understand your messages.

Snapchat is available on iOS and Android, so you can stay in touch with all your friends.

Staying safe: Just because Snapchat deletes your pictures automatically, don’t assume that they cannot be recovered or saved. Think very carefully about the potential consequences before sending explicit or embarrassing snaps.

Best for – the most users

An add-on service to the social network, Facebook Messenger boasts well over a million users. So if your friends have a Facebook account, they will also be available on Messenger.

Facebook Messenger is available on iOS, Android, Windows Mobile and Blackberry smartphones, as well as any internet connected PC. You can also make voice and video calls using the app.

If you really need the message to get through, Facebook Messenger is a great option.

Staying safe: Facebook has added end-to-end encryption to Messenger, but it is not enabled by default. You must switch this feature on to prevent your messages being intercepted – and to stop Facebook snooping on your conversations.

Best for all-round connections

It may seem like it sometimes, but not everyone has a smartphone. Although you can always rely on traditional SMS, the messaging cost can quickly escalate.

WhatsApp uses your phone’s data connection, allowing you to message with your data allowance, or when connected to a WiFi network. As well as being available on all the major smartphone platforms, the app can also be installed on older/less powerful devices running Symbian. Which means you can message even more people – for free.

So if your friends are resistant to technology, WhatsApp could be what you need to stay in touch.

Staying safe: WhatsApp has struggled with security problems in the past, so you will need to have an additional tool to identify potential problems and block malware/loopholes. Panda’s Mobile Security toolkit can help provide that cover. You should also check to make sure that end-to-end encryption has been enabled, and that you have disabled data sharing with Facebook to protect your privacy.

Staying connected – and safe

These messaging apps will help you stay connected. And when it comes to staying safe, a little common sense goes a long way:

• Always make sure your phone is protected with a pass code.
• Never share information that is sensitive or embarrassing.
• Install a security app to prevent malware or hackers from stealing your data

And that’s it. Have fun!

The post Which are the best mobile messaging apps? appeared first on Panda Security Mediacenter.

No password? You’re asking to be hacked.

75 million smartphones in the US don’t have their passwords set on

TransUnion’s latest Cyber Security Survey confirmed that Americans who feel extremely or very concerned about cyber threats have increased 20 percent since last year – from 46 percent in 2015 to 55 percent in 2016. Fears are legitimate – hacking and cyber security have even become one of the main topics in the presidential debates between Donald Trump and Hillary Clinton.

If you think this is surprising keep reading, the most shocking part of the survey is not the fact that its’ findings confirm the notion that we are constantly under cyber danger/attack – we already know that. The most shocking part is the facts that despite the increasing fear, nearly 50% of the participants admit that they don’t take actions to protect their content.

Nearly half of the people who participated in the survey admitted they don’t lock their phones with a password.

Let us translate this for you – currently there are nearly 320 million people legally living in the USA with about 225 million of them being adults. More than two thirds of the adults living in the US have smartphones. If the statistics are right, a quick math shows there are more than 75 million people in the US whose smartphones don’t have their passcodes set on. This is scary! This means two out of the three Kardashians don’t have passcodes on their phones! What could go wrong? We will let Kim and Kanye tell you.

What should you do?

Setup a password on your cell phone.

We all know what the consequences of identity theft are – unless you want a stranger buying a car in your name, or leasing a property in a city you’ve never heard of using your SSN, you should go find your phone and setup your password on, right now. Then add a recurring reminder on your calendar to change it frequently!

Admit the problem.

The threat is real and hundreds of thousands of peoples’ lives are being ruined by hackers stealing their precious information. Having a lock on your phone might be a good beginning but it does not solve your problem entirely.

Find a solution that works best for you.

The option we recommend is Panda Security Antivirus.Downloading your copy of Panda Security antivirus will protect you from getting your email hacked, and it will keep your credit cards, personal information and cell phone safe.

According to TransUnion about 1 million people will call TransUnion Fraud Victim Assistance Department in 2016. Let’s hold hands together, be more protective of our personal information and decrease the number of calls they get by practicing common sense. It’s natural to want to protect ourselves, but it is hard to wish to protect what we have if we don’t realize that the threat is real. The most astonishing results come from taking practical, protective actions before things go wrong. Let’s not get to the point where we are in need of calling the fraud department by acting now and protecting our personal information early rather than late.

The post No password? You’re asking to be hacked. appeared first on Panda Security Mediacenter.

They can remotely access and control my computer?

trojans panda security

We are always talking about ransomware and the importance of keeping your corporate network protected, and we want to warn our readers about the popular Trojan attacks that are going after small and medium sized businesses. But how do you know when it’s a Trojan? How can you secure yourself against Trojans?

5 Things You Should Know

  1. They are malicious software programs designed to rob information or take control of the computer. These attacks target businesses that manage top-secret information.
  2. Trojans are the most popular type of malware and have been for years. Running closely behind them is Ransomware.
  3. Trojans seem harmless but as soon as they are executed they will damage systems and steal information.
  4. Most of them create backdoors and give unauthorized users remote access and control over your system…but they go unnoticed!
  5. Trojan horse: The professional trickster. It disguises itself as something its not.

trojans infographicTrojans: Topping the Charts

Trojans make up the majority of the 227,000 malware samples that are detected daily by PandaLabs. Month after month, they continue to be in first place as the most created malware.

Increasing since the second quarter of 2016, Trojans currently make up 66.81% of the new malware samples created this quarter. Viruses make up 15.98% (Worms 11.01%, PUPs 4.22% and Adware/Spyware at 1.98%).

What do their creators want to achieve?

  • Steal personal and corporate information: bank information, passwords, security codes, etc.
  • Take photos with webcams, if there are any!
  • Erase the hard-drive.
  • Capture incoming and outgoing text messages.
  • Seize the call registry.
  • Access (consult, eliminate and modify) the address book.
  • Make calls and send SMS messages.
  • Use the GPS to figure out the geographic location of the device.

How can we protect ourselves from Trojans?

 Avoid downloading content from unfamiliar websites or sites with dubious reputations.

– Monitor downloads from p2p applications.

– Keep your advanced security solution updated. Install one of the Panda Solutions for Companies that best adapts to you and protect yourself from these dangers.

– Analyze your computer for free and make sure it’s Trojan free.

The post They can remotely access and control my computer? appeared first on Panda Security Mediacenter.

New WhatsApp updates: how to keep your privacy.

pandasecurity-whatsapp-updates-privacy

As the World’s most popular messaging application, WhatsApp is constantly adding new features designed to delight their 1 billion registered users. And the latest update contains a number of goodies that will delight fans of picture messaging.

This all looks very familiar…
For anyone who uses the Snapchat app, the new WhatsApp features will seem very familiar. In fact, you might say that they are identical.

WhatsApp users can now take a photo, and quickly add a sketch or some text, before sending it as a message – just like Snapchat. Or they can add emojis – that look exactly the same as those in Snapchat. There’s even several navigation gestures (zooming in an out, or switching between cameras) that are exactly the same as those used in the Snapchat app.

The reason WhatsApp have borrowed so much from Snapchat is simple – to keep people engaged with their platform. The more that people use the platform, the better able WhatsApp (and their parent company Facebook) is to profile them for advertising purposes.

And obviously people want entertaining picture messaging services – so these new features are sure to be incredibly popular

Is there a potential security risk with the new WhatsApp app?

Because of its popularity, WhatsApp has been targeted by cybercriminals many times over the years. Several times researchers and hackers have uncovered flaws in the software that allow accounts to be compromised.

Every one of these breaches has the potential to expose personal information – or to give criminals useful information for identity theft.

WhatsApp has made significant efforts to improve security, although privacy still remains doubtful because of the new data sharing agreement with Facebook. However end-to-end encryption of messages – including the new photo options – should prevent people from “listening in”.

Better safe than sorry

No matter how trusted the developer may be, you should always treat each new app (or update) with some caution. Installing an antivirus and security tool will help you see what is going on behind the scenes, how the app is using your personal data.

The WhatsApp service is known to take a copy of your entire address book and upload it to their servers for instance. WhatsApp are relatively transparent about this (they can better identify your friends who are also using their service) – but other developers are not. You should always use a tool like Panda Mobile Security to monitor exactly what’s happening on your phone.

Otherwise you might be installing software that accesses much more personal data than you expect.

You can prevent data stored on your handset from being accessed by thieves too. Panda Mobile Security allows you to lock each app with a PIN, so if you don’t enter the right code, the app cannot be opened. If someone steals your phone, they cannot view your messages and pictures.

No less secure, but a useful reminder

Because the latest update is still very new, no one has yet exposed any new WhatsApp security vulnerabilities. And even if there aren’t any problems, the release is a useful reminder of the importance of scanning new apps from malware, loopholes and suspicious data access permissions.

Download your free copy of Panda Mobile Security now – then go get creative with the new WhatsApp picture features. Have fun!

The post New WhatsApp updates: how to keep your privacy. appeared first on Panda Security Mediacenter.

Is it safe to connect to a public Wi-Fi hotspot?

Is it safe to connect to a public Wi-Fi hotspot?

Enjoy going for a drink at your local coffee store whilst getting some work done or browsing the web? With more and more cafes, bars and libraries these days resembling public workspaces and free Wi-Fi feeling like an essential part of daily life, it is very easy to go to a local café and feel at home.

But are public Wi-fi hotspots really safe places to browse the Internet or do we have to be on high alert anytime we’re online in a public place?

Let’s have a look at some of the dangers one faces when connecting to a public network:

Page Spoofing

 It’s easy to take for granted that a venue’s network actually belongs to that specific venue.

How many times have you sat down at a cafe and connected to the venue’s network at the click of a button? It’s this simplicity that hackers take advantage of when creating a malicious access point.

It’s very easy for an attacker to create a fake page that looks very much like the real thing. For example, when you sign up to the network you may be redirected to a Facebook sign in page. This could potentially be a fake, and entering your details would send them straight to the cyber attacker.

Luckily there are small indicators that can help us, on most occasions, to know if a page is definitely a fake.

Facebook for example, encrypts all data sent to its pages by connecting its users via SSL.

If any page that typically connects through SSL doesn’t show a padlock next to the page address it’s best not to give personal details!

Sniffing Apps

In an open network it is very easy for an attacker to capture the data traffic sent from your device. In fact, there are free easy to use apps, called “sniffing apps”, dedicated to this very purpose.

Although the common WPA2 routers do encrypt connections, these apps are capable of sniffing out the PSK (password). If an attacker does this they can then decrypt all traffic connected from a device to the network.

These risks have actually led police in Derbyshire in the UK to release a statement this month on the growing dangers of cyber crime:

“The UK now has more than 300,000 public Wi-Fi hotspots, which means more people than ever before are potential targets for cyber criminals, simply because they don’t know how secure the networks they’re using are.”

Third-Party Data Gathering

Sadly, even when you’re connected to a venue’s actual network you have no guarantee of privacy. In fact, venues often use their public Wi-fi hotspots to gather information about consumers.

Though third-party data gathering isn’t likely to end up with your passwords or your identity being stolen, your personal details are often being taken without your consent.

Whilst most venues directly ask a customer for an email address or number in order to access their Wi-fi, some go the extra mile of injecting cookies into your device’s network in order to track your browser history, typically resulting in an onslaught of targeted ads.

A great way to protect yourself against these attacks as well as against sniffing apps is to use a VPN (Virtual Private Network) service. This will ensure that all data traffic from your device is encrypted, whether the page you’re visiting is secure or not.

Another step that can be taken is to use a personal mobile broadband dongle, which, though slower, can be used in public spaces and is less likely to be compromised.

The best bet always, however, is simply to avoid sharing personal information, especially bank details, when on a public network. Stick to that principal rule and you should be ok.

Happy browsing!

The post Is it safe to connect to a public Wi-Fi hotspot? appeared first on Panda Security Mediacenter.

Top 5 things you are revealing to the world when downloading torrents

Top 5 things you are revealing to the world when downloading torrents

Downloading torrents is certainly not as popular as it used to be but people still do it. The fact you may be able to watch a movie free of charge before it is even available in your town’s movie theatre may sound appealing, we wanted to highlight that this is illegal and your actions will have consequences.
In this blog post we are not going to focus on the consequences, we are sure you already know what happens to the bad guys. We want to stress on the type of information you are sharing with the world while downloading torrents;

Username and Password

Very often torrent websites require you to create a profile before you are able to download a torrent. Therefore you are forced to come up with a username and password. Having in mind people don’t enjoy using multiple passwords some folks end up literally giving their username and password without a fight. Imagine what hackers who crack software for fun could do with your personal information. It feels like getting a wolf pack to guard your sheep.

IP Address

You are sharing your IP address with both seeders and leechers. Almost every torrent client has the option to see details about the peers you are connecting with. Sharing your personal IP address with complete strangers is not the safest thing. Not all peers are there to help you, hackers masked as seeders/leechers are lurking around harvesting IP addresses.

ISP – Internet Service Providers

Your ISP knows what you are doing. Even though it is NOT in their interest, sometimes they are forced to share information with the law enforcement. Your ISP provider will not hesitate to share information about you when pressured by the authorities. After all torrents can be heavy and ISP providers are certainly not very happy when they see you abusing the unlimited data stream they offer you.

Traffic Information

Getting to download an actual torrent is not an easy task. You have to go through a whole bunch of shady websites so you can get to the point where you will download the torrent you want. There are a whole lot of ‘download’ buttons that download everything else to your device but the desired torrent. Even if the content you want to download may not be illegal, you share all your traffic information with the website admins. Remember what we discussed about the wolf packs.

Social Media channels

Torrent websites sometimes offer you perks when following them on social media. This immediately gives an idea to everyone interested about the type of people that support those websites. Even if you are not downloading or distributing any illegal content, engaging with them on social media channels and being active on torrent forums may drag you towards a group of people you don’t want to be in.
Peer to peer file sharing is not always illegal but you have to keep in mind that very often cheap things end up being expensive. You should be fully aware about what you exposing to the world on your journey to the next episode of the Big Bang Theory.

If you are in store you don’t just go and grab a DVD and walk out, you pay for it. The reason why you don’t steal is not only because you are a good person but also because you are afraid that your action may ruin your life. Nowadays, being on internet is similar to walking on the street or in the store, your actions are being monitored – let’s make sure you don’t embarrass yourself before the whole world.

The post Top 5 things you are revealing to the world when downloading torrents appeared first on Panda Security Mediacenter.