Tag Archives: Internet Security

What is Net Neutrality and How to Voice Your Opinion?

What happens when cable and phone companies are left to their own devices?

Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and researching the topic, so we wanted to give you the cold facts hoping you will make an educated decision.

What is Net Neutrality?

As you may remember before 2015 ISPs were not heavily regulated and were using tactics that are against the current policies of Net Neutrality. The years between 2005 to 2014, in particular, were like the wild west of broadband providers. There were cases of ISPs banning P2P usage, VOIP blockages, and at some point, ATT pressured Apple to ban Skype. People started voicing their opinion against the corporate practices, so Net Neutrality was born. New rules started being enforced on June 12, 2015, and ISPs were no longer able to execute similar methods without the risk of having to pay a hefty fine.

Earlier this year, Ajit Pai was appointed to govern FCC. He is an avid opponent of Net Neutrality and his “Restoring Internet Freedom” proceeding is getting close to repealing it.

What happens when Net Neutrality gets repealed?

If the new proceeding gets accepted, corporations such as Comcast, Verizon, ATT, Frontier, and Cox will have their control back, and they will again have the ability to act as content gatekeepers. They will even be able to impose new fees so paying $10 a month for accessing Facebook from your phone might happen sooner than later. You may have to upgrade to a ‘business account’ if you want to use Outlook from your home Wi-Fi. It will be similar to Vladimir Putin’s recent war on VPNs. North Korea and China have similar laws too. In your case, you won’t be blocked from accessing content as this decision would violate the 1st Amendment. However, millions of Americans who have access to only one ISP may have to choose to either pay an extra fee or give up on their favorite app or a TV show. Repealing Net Neutrality means that ISPs will stop being treated like utility providers. Some of the major internet providers in the US have already begun violating the current rules.

There are only a few more days left until FCC stops accepting comments about the planned repeal of Net Neutrality. The end date is scheduled for August 30th, 2017. Feel free to make your voice heard by leaving a comment in the “Restoring Internet Freedom” proceeding here.

The post What is Net Neutrality and How to Voice Your Opinion? appeared first on Panda Security Mediacenter.

Read More

Internet for everyone with Facebook’s drone Aquila

Last month Facebook announced the second successful test of Aquila – a giant sun powered drone. Even though the technology is still in the makes and has a long way to go, Mark Zuckerberg has been very serious about connecting the world– Facebook recently surpassed the 2 billion users mark.  There is an opportunity for Facebook to continue its path of success as the number of people globally with access to the internet is currently about 4 billion.

Can Facebook evade the Chinese censorship?

However, even though it seems like Facebook are half way there on their quest to connect the world, a vast majority of internet users are not on Facebook yet solely because they live in China where Facebook is blocked by the ruling communist party. Some Chinese people can evade the censorship by the use of VPN. However, the ruling party is certainly not happy about it as they are constantly trying to prevent its citizens from having unmonitored Internet access. Unless Facebook miraculously manages to find a way to sweet talk China into unblocking them, the continuous growth of new users will start to gradually decrease as we don’t see China’s way of government changing anytime soon. And this is not the news shareholders want to hear!

To keep the company’s steady growth, Mark Zuckerberg needed to find a solution for keeping the continuous flow of new users. At the end of the day, there are more than 7 billion people currently living on Earth, having 2 billion users is a great milestone, but it also shows the vast amount of work that needs to be done in the future. This is how Facebook’s Aquila drone was born. Aquila is a technology developed by Facebook that eventually will be integrated into a fleet of sophisticated atmospheric satellites that will provide the internet to undeveloped regions around the world.

What are Facebook’s intentions with this drone?

The first Aquila powered drone had a rough start last year as it crashed in the Arizona desert during landing. According to Facebook, the second testing couple months back was a success.  So what are the positives and the negatives of Facebook’s intentions? Assuming people will likely register to Facebook, this surely is a smart way to maintain company’ s growth while making the world a better place but how is this going to affect the regular people?

The first and foremost, people from undeveloped countries from all over the world will be provided with an opportunity to have access to more information that includes better education opportunities, news, and job postings, as well as funny cat videos. They will also be able to communicate on a much more affordable price and express opinions to a broader audience.

On the contrary, citizens of undeveloped countries will be provided with a window to the world. While inspirational for some, this might be simply yet another way to see the contrast between them and the developed countries. We are sure people who do not have access to clean water would not appreciate the angry comment of a hipster whose name was misspelled on a Starbucks paper coffee mug. Or the latest news about the Kardashians. More information could lead to the start of the sub-Saharan “Arab spring” – united and connected, people might be able to possibly bring down current world dictators such as Robert Mugabe, President of Zimbabwe who has been a head of state, with no intentions to step down, for more than 30 years. People fighting for their rights is not bad news at all, but unfortunately many may get hurt in the process.

Overall, we are years apart from having 11,000 unmanned drones simultaneously flying over Africa. We sincerely believe the positives will outrun the negatives. We hope they will make them secure, as the last thing we want is someone being able to control a fleet of 11,000 flying objects because… let’s face it; drones can be hacked. Good luck to Facebook!

The post Internet for everyone with Facebook’s drone Aquila appeared first on Panda Security Mediacenter.

Read More

Robert W. Taylor, Who Helped Create the Internet, Dies at 85

Image by New York Times

The Internet just lost one of its most prominent innovators.

Robert W Taylor, a computer scientist who was instrumental in creating the Internet as well as the modern personal computer, has died at the age of 85.

Mr. Taylor, who is best known as the mastermind of ARPAnet (precursor of the Internet), had Parkinson’s disease and died on Thursday at his home in Woodside

Read More

Don’t Let Yahoo Happen To You: How to Protect Your Business from Large-Scale Data Theft


In 2016, the theft of passwords from internet titans is no longer an exception. Just when it seemed like the year was winding down, having left us with the surprising news of what until yesterday was considered the highest magnitude cyberattack in history suffered by Yahoo and reported three months ago, this same company returns to headlines after announcing the theft of data from 1 billion accounts.

This comes on the tail of some revealing figures. For example, massive data breaches have, amazingly, affected 97% of the 1000 largest companies in the world.

After admitting last September that in 2014 they had suffered a large-scale theft that affected 500 million users, Yahoo revealed today that in 2013 it suffered what is now considered the worst incident of information piracy in history with the theft of 1 billion accounts.

There’s a strong resemblance between this attack and the ones we’ve been analyzing over the past months. These recent attacks showcase the way cybercriminals gain access to names, email addresses, phone numbers, dates of birth, passwords, and in some cases clients’ encrypted and unencrypted security questions. The dimensions of the incident are truly staggering.

Yahoo disclosed that “an unauthorized third party” accessed the data and that at this time the culprit remains unnamed.

Economic repercussions aside, these incidents also call into question the issue of deteriorating user confidence. For example, Verizon’s initiative to integrate Yahoo into the AOL platform will certainly come under scrutiny.

How Should You Keep Your Business Safe?

There’s a legitimate reason to fear for your business’s confidential information. An outsider capable of getting the key to your company’s data, as happened at Yahoo, is a latent risk. Prevention has become the greatest asset in combating Black Hats and avoiding some of the dire consequences of these attacks.

To that end, we encourage you to turn to the advanced cybersecurity solution best suited to your company’s needs. Our Adaptive Defense 360 can offer you:

visbilidad- adVisibility: Traceability and visibility of every action taken by running applications.


deteccion- adDetection: Constant monitoring of all running processes and real-time blocking of targeted and zero-day attacks, and other advanced threats designed to slip past traditional antivirus solutions.


respuesta- adResponse: Providing forensic information for in-depth analysis of every attempted attack as well as remediation tools.


prevencion- adPrevention: Preventing future attacks by blocking programs that do not behave as goodware and using advanced anti-exploit technologies.


This is the only advanced cybersecurity system that combines latest generation protection and the latest detection and remediation technology with the ability to classify 100% of running processes.

The post Don’t Let Yahoo Happen To You: How to Protect Your Business from Large-Scale Data Theft appeared first on Panda Security Mediacenter.

Read More

Tor Project Releases Sandboxed Tor Browser 0.0.2

The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – has launched an early alpha version of Sandboxed Tor Browser 0.0.2.

Yes, the Tor Project is working on a sandboxed version of the Tor Browser that would isolate the Tor Browser from other processes of the operating system and limit its ability to interact or

Read More

What is a VPN and how it Works?


Watch your favorite shows anywhere, and other useful VPN functions

In simple terms, a VPN, or Virtual Private Network, is a connection between a group of discrete networks that exchanges encrypted data between your computer and a distant server.

Sounds like boring technical jargon? Well, VPN’s can actually be used to perform some pretty neat tricks online that you’ll be missing out on if you don’t employ the services of these privacy boosting devices:

Safely access a work or home network from far away

VPN’s are an essential tool for professionals out there who travel and have to access important files from a distance. Individuals can use a VPN to access network resources even if they’re not physically connected to the same LAN (local area network).

Why are they perfect for dealing with important data from afar? Well, a VPN is also an efficient and easy way to maintain your privacy when you’re surfing the web. In fact, many experts recommend the use of a VPN when browsing the Internet on a public Wi-Fi hotspot as they guarantee that all the data you’re sending and receiving is encrypted and inaccessible to hackers.

If anyone tries to pry on your internet activity, all they’ll see is the VPN connection, all other data will remain anonymous.

Avoid censorship and detection online

A controversial function of the VPN for sure, they can be used to bypass government censorship anonymously. Whether you agree or not with censorship online, it’s an undeniable fact that certain websites are blocked for legal reasons, almost every government worldwide blocking certain websites within their country.

Meanwhile, the ability that a VPN gives its user to go undetected online has been highlighted in the news recently as police in Holland confiscated 2 servers from VPN provider Perfect Privacy without releasing a public statement.

The German and French governments also want to controversially force mobile operating systems, by law, to allow them to access encrypted content if they deem it necessary in federal investigations.

Watch your favorite shows online wherever you are

Here’s where the fun begins! Many, many people are using VPN’s merely for entertainment purposes. The reason for this? Companies like Netflix, Youtube and Hulu use geo-blocking mechanisms to make some of their content unavailable outside of certain countries due to legal requirements appertaining to arguably outdated content laws in this age of free information.

In fact some people argue that, though this is only speculation, the content laws being so outdated, recent attempts by companies like Netflix to crack down on VPN usage have only been for show. In other words, the streaming giant wants to keep Hollywood distribution companies, who are responsible for creating a great deal of the content shown on Netflix, happy whilst harboring no real desire for making it harder to access their shows worldwide.

As an example of the numbers, in the US, Netflix offers the full experience of roughly 7000 shows, whereas in the UK slightly more than 4000 are available. Countries that have only been reached by Netflix recently are far behind.

Netflix though, has recently been trying to crack down on VPN usage, whilst also admitting that it is almost impossible to do so effectively.

The company’s Chief Product officer recently said that “since the goal of the proxy guys is to hide the source, it’s not obvious how to stop VPN Users. It’s likely to always be a cat-and-mouse game.”

Though the streaming company have blocked certain VPN users from accessing the site, providers like Express VPN and Buffered VPN claim to have great success at getting around these measures.

The post What is a VPN and how it Works? appeared first on Panda Security Mediacenter.

Read More

'Web Of Trust' Browser Add-On Caught Selling Users' Data — Uninstall It Now

Browser extensions have become a standard part of the most popular browsers and essential part of our lives for surfing the Internet.

But not all extensions can be trusted.

One such innocent looking browser add-on has been caught collecting browsing history of millions of users and selling them to third-parties for making money.
<!– adsense –>
An investigation by German television channel

Read More

New Privacy Rules require ISPs to must Ask you before Sharing your Sensitive Data

Good News for privacy concerned people! Now, your online data will not be marketed for business; at least by your Internet Service Providers (ISPs).

Yes, it’s time for your ISPs to ask your permission in order to share your sensitive data for marketing or advertisement purposes, the FCC rules.

On Thursday, the United States Federal Communications Commission (FCC) has imposed new privacy

Read More

An Army of Million Hacked IoT Devices Almost Broke the Internet Today

A massive Distributed Denial of Service (DDoS) attack against Dyn, a major domain name system (DNS) provider, broke large portions of the Internet on Friday, causing a significant outage to a ton of websites and services, including Twitter, GitHub, PayPal, Amazon, Reddit, Netflix, and Spotify.

But how the attack happened? What’s the cause behind the attack?

Exact details of the attack remain

Read More