Category Archives: Antivirus Vendors

Antivirus Vendors

Avira wins “Advanced+” rating in the latest “Whole-Product Dynamic Test” from AV-Comparatives

Avira wins “Advanced+” rating in the latest “Whole-Product Dynamic Test” from AV-Comparatives - Antivirus

Avira Antivirus Pro has won another “Advanced+” seal for its performance throughout the July to November 2017 “Whole Product Dynamic Test” from AV-Comparatives. This independent test recreates the conditions faced by the average users – and their antivirus app – as they go online. Over a period of five months, researchers threw five separate batches […]

The post Avira wins “Advanced+” rating in the latest “Whole-Product Dynamic Test” from AV-Comparatives appeared first on Avira Blog.

Read More

Business Email Compromise scammer sentenced to 41 months in prison

A US judge has sentenced a Nigerian man to three years and five months in a federal prison after he pleaded guilty to taking part in a business email compromise scam that targeted organisations around the world.

The post Business Email Compromise scammer sentenced to 41 months in prison appeared first on WeLiveSecurity

Read More

The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017

In order to help consumers get a better idea about the state of the market in cybersecurity, and in turn make the right decision when it comes to shielding their digital life, the independent laboratory AV-Comparatives regularly publishes the results of its “Real-World” Protection Test. Their latest edition, called the Whole Product Dynamic “Real-World” Protection Test, is especially relevant for having compiled results over a five-month span. In this edition, Panda Security received the maximum possible score, outperforming every one of the 20 other vendors that underwent testing.

In the words of AV-Comparatives: “In this test, all protection features of the product can be used to prevent infection” “This means that the test achieves the most realistic way of determining how well the security product protects the PC”. In fact, the methodology they used for this test has itself received numerous awards and recognitions.

Thanks to the innovative technologies that were developed in response to malwares rapid evolution over the last few years, Panda Security offers the most efficient defense against threats such as ransomware and has positioned itself as the strongest ally in prevention, protection, and response in the face of today’s attack trends.

The Test, in Detail

The Real-World Test is recognized by the industry for being the most complete and rigorous of the tests performed by AV-Comparatives, since it provides the most accurate reflection of the protection offered by antivirus solutions available on the market.

Each cybersecurity solution was subjected to a total of 1769 real-time tests between July and November, consisting, for example, in exposure to malicious URLs with drive-by exploits (malware attacks that take effect just by visiting the page) and URLs that linked directly to the malware.

The analysis focused on each software’s ability to “protect systems against infection by malicious files before, during, or after execution”, the authors explain. Observing the security systems in each of these stages gives a more holistic approach to the test, allowing assessors and users to better calibrate the overall effectiveness of security solutions.

In the malware protection test, Panda successfully blocked 100% of samples in the test bench, leading in efficiency and detection ratios, followed by Bitdefender, F-Secure, Tencent, and Trend Micro with 99.9%.

These good results, which have been consistently repeated in recent months, speak to the high protection ratios offered by Panda’s solutions.

Luis Corrons, Technical Director of PandaLabs, had this to say: “We are truly proud of the results that we earned. They are the fruit of years of labor, and seeing how we were able to outperform each and every one of our competitors is a huge reward that is dwarfed only by the greatest reward of all: protecting our clients as no one else is able to do.”

The post The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017 appeared first on Panda Security Mediacenter.

Read More

Bitcoin: definition, hacks and frauds

Despite being around for several years, Bitcoin is suddenly all over the news. You probably already know it is something to do with money, so this article will help to explain what this cyrptocurrency is, why it matters, and how to use it safely.

What is Bitcoin?

Bitcoin works pretty much like every other currency – people can buy goods and services, and money can be traded on the foreign exchange market too. Coins are held in a digital wallet – and encrypted set of files on your computer – and act just like cash when making a payment.

There are some key differences however:

  • Bitcoin is entirely digital – there are no bank notes or coins – so all transactions take place electronically.
  • It is not managed by a central bank like the US Federal Reserve, instead its users maintain a shared control.
  • It uses heavy encryption to verify “money” is genuine, and to protect the identities of buyers and sellers making a transaction.

Why does Bitcoin matter?

Free from the control of central banks Bitcoin is, theoretically, affected less by interest rate rises, or ‘quantitative easing. This makes it very attractive to foreign currency investors.

The fact that this cryptocurrency works exactly like cash makes it very attractive to criminals. Police cannot trace a payment made with a physical £5 in a physical store – and the same is true of its transactions. This is why ransomware demands typically specify payment in Bitcoin.

Bitcoin – a valuable target for theft

Currently this digital currency is not widely used by consumers – but with the increased level of attention being given to the currency, more of us may be tempted to get on board. But there are some important security issues you need to be aware of first.

The digital wallet used to store Bitcoin acts just like your real-world wallet. So if someone steals your digital wallet from your computer, they also steal all the contents – your Bitcoins. Because it is virtually untraceable, there is little chance that the thief will be caught, which is why its theft and fraud is becoming increasingly popular.

On the 7th December, hackers were able to steal 4700 Bitcoin (worth £56 million!) from an online exchange. The criminals were able to break into an employee’s computer and steal crucial data that allowed them to make off with the money – early indications suggest that malware installed on the PC provided the necessary access.

In November, another Bitcoin banking service, Tether, was compromised. Hackers managed to steal nearly $31 million worth of Bitcoin belonging to service users from the bank’s virtual account. The bank has not released details of how the attack was carried out, but again it appears that the issue was caused by one of their computers being compromised.

How to protect yourself

Your digital wallet is key to protecting your digital money. If cybercriminals can steal your digital wallet, or trick you into handing over user names, passwords or encryption keys, you could be robbed.

In reality the principles for staying safe when using cryptocurrency are exactly the same as shopping online. Never give a stranger your Bitcoin account details. And always ensure that your computer is properly protected against hacking and malware using a security solution like Panda Gold Protection. Ready to learn more? Check out our Bitcoin archive.

Download your Antivirus

The post Bitcoin: definition, hacks and frauds appeared first on Panda Security Mediacenter.

Read More

Christmas 2017: how to protect your online purchases

Online Shopping zu Weihnachten – Mehr Sicherheit und beste Deals, Natale 2017: come proteggere gli acquisti online, Christmas 2017: how to protect your online purchases, Noël 2017 : comment protéger vos achats en ligne ?

By now, making purchases on e-commerce sites has become a habit for Americans, but without the proper precautions, there are still many risks. Christmas shopping is now in full swing. And for us Americans, our favorite store is the internet. At this point, it’s pretty much a habit to go to the actual store, check out […]

The post Christmas 2017: how to protect your online purchases appeared first on Avira Blog.

Read More

HP laptop owners – act now to avoid being hacked

HP owners need to take immediate action after it was discovered “keylogging” software has been installed by default on more than 460 models of laptop. When enabled, this function could allow hackers to monitor and steal sensitive information like user names and passwords.

What is a keylogger?

A keylogger is a small application that runs in the background, monitoring and recording every pressed on your keyboard. The version installed on affected HP laptops has been bundled with the drivers needed to make the Synaptics touchpad work.

Keyloggers are a very popular form of malware, used by criminals to capture logon details from infected computers. They can then use those details to hack into online accounts to steal money or commit other fraudulent activities.

An honest mistake

Keyloggers do have a legitimate purpose too however. In the case of the HP bug, the keylogging function is used by the Synaptics development team to run various tests and ensure that hardware and software is operating correctly as it is being created.

Normally the keylogging functionality is removed before drivers are released to laptop manufacturers, but in this case it was not. So every machine issued with the buggy drivers also has the keylogger installed.

Don’t panic, but act now

Fortunately, the keylogging function is disabled by default – so your laptop is not currently collecting your sensitive personal data. However, should a hacker gain access to your machine, they can probably enable the logging software.

HP has released an updated set of drivers for laptop owners that removes the keylogging component completely. If you have one of the machines, you should download and install these new drivers (called softpaqs) as soon as possible. There is a list of affected models and download links here.

Increasing personal protection

Normally cybercriminals have to be more creative when installing keyloggers, using the same techniques they rely on for distributing malware and Trojans. These efforts can usually be detected and blocked with a good antimalware solution like Panda Gold.

Another useful tip is to avoid using your hardware keyboard whenever entering very sensitive data. Panda Security provide a ‘virtual keyboard’, where you click letters and numbers on the keyboard displayed on your screen, rather than tapping letters on the physical keyboard. Even if your machine does have an undetected keylogger installed, by avoiding the physical keyboard, it cannot capture anything entered on screen.

Keep your machine fully updated at all times

If your laptop has the option to accept and install manufacturer updates automatically, you should enable it immediately. That way, every software patch released by HP will be applied straight away, reducing the window of opportunity for hackers to compromise your machine – and your personal data.

Learn more about the Panda virtual keyboard and how to protect against keylogger malware by downloading a free trial of Panda Gold Protection today.

 

Download Panda Free Antivirus

The post HP laptop owners – act now to avoid being hacked appeared first on Panda Security Mediacenter.

Read More

What will change after Net Neutrality gets repealed on Thursday?

The potential Net Neutrality repeal is a trending topic in the US

The potential Net Neutrality repeal is continuing to be a trending topic here in the US, and more and more people are starting to realize how the FCC decision is going to affect their lives. We recently covered what Net Neutrality is and how you can cast your vote for or against it. While Net Neutrality repeal has been accompanied by predominantly negative media coverage and the topic has sparkled furious conversations amongst hundreds of thousands of people from all over the world, this Thursday the Republican-dominated FCC will repeal Net Neutrality. Rather than pouring gasoline on the fire, we decided to accept the democratic decision and put down a list of things that will most likely change after the repeal.

Small businesses and artists

When Net Neutrality gets repealed, internet providers will lawfully be able to give priority to specific sites over others. What this means for artists is that if Verizon and SoundCloud start disagreeing at some point in the future, you may not be able to access the music website from your devices. Mobile carriers and ISPs will have the power to render websites such as Netflix and SoundCloud useless. If you are a small business owner who relies massively on Facebook advertising, you may have to start looking for a different platform to promote your business as people may not be able to access it freely and its popularity will decrease. Verizon is pushing a video platform called go90, so you may have to move from YouTube to go90. You may have to start using the Aol search engine instead of Google. If you are a website owner, you may have to pay a premium to ISPs if you want them to allow users with normal internet speeds to your website.

Increased bills

While we keep in mind that tech giants such as Facebook and Google may have to end up forking some cash to sweeten their relationships with ISPs, this may have an impact on your pocket as they will have to find a way to justify the new expense. This can come in various forms, you may have to pay additional $5 to your wireless carrier if you want to be able to access Facebook, or Facebook may have to end up charging its users for the service. If Net Neutrality gets repealed on Thursday, your new home internet bill might start looking similar to your Verizon Wireless bill – ISPs will stop being treated as utility bills. This is an equivalent of giving SoCal Edison the ability to charge you more for electricity used by a Samsung fridge vs. a fridge manufactured by Whirlpool.

User experience

After the Net Neutrality repeal, loading an Amazon page may not be as easy as it is right now. Your connection will depend on the relationship between the two companies. The internet provider of your choice will have the power to slow down your connection to sites that are on their naughty list. You may be taking for granted the fast speeds that you have now – soon it may take you minutes to load your favorite online magazine. ISPs will not breach your first amendment; they will simply make you wait more unless you, or the website, pay them.

Monopoly

One of the perks of living in the free world is the fact that if a company decides to abuse their power over its clients, these clients are free to leave and look for a better solution. If you are lucky enough to live in densely populated areas, you most likely have access to a few ISPs so you can pick and choose. If you live in a place where there are just one or two broadband providers, then you most likely should not be happy to see the Net Neutrality repealed as you will not have other options but to pay what you are being asked. And we all know that nowadays, the internet is not a luxury but a necessity.

Twilight of modern Internet

Currently, there are many websites expressing their protest against the so-called ‘twilight of the modern internet’ and want ISPs to continue being treated as utility companies. Others are glorying the decision to repeal Net Neutrality as this will “restore the internet freedom” for Internet providers and telecom companies. Whatever their decision is, we all will have to respect it – tech companies such as Google, Amazon, and Facebook have been tracking your online steps and internet habits for years, now a few more big names such as Verizon Wireless and Comcast will simply join the crowd and get their piece of the pie.

The post What will change after Net Neutrality gets repealed on Thursday? appeared first on Panda Security Mediacenter.

Read More