MediaCenter Panda Security http://www.pandasecurity.com/mediacenter Just another WordPress site Tue, 16 Sep 2014 16:04:54 +0000 en-US hourly 1 http://wordpress.org/?v=3.9.2 4 steps to avoid viruseshttp://www.pandasecurity.com/mediacenter/security/4-steps-avoid-viruses/ http://www.pandasecurity.com/mediacenter/security/4-steps-avoid-viruses/#comments Tue, 16 Sep 2014 16:03:35 +0000 http://www.pandasecurity.com/mediacenter/?p=12237 Protecting your computer is, very often, much easier than you might think. If you follow these four steps to prevent viruses, your computer won’t become infected again. Take care with Java, Adobe Flash and Acrobat Reader As we have seen in practically all the PandaLabs reports, these programs are a key target for cyber-criminals. That’s […]

The post 4 steps to avoid viruses appeared first on MediaCenter Panda Security.

]]>
security

Protecting your computer is, very often, much easier than you might think. If you follow these four steps to prevent viruses, your computer won’t become infected again.

Take care with Java, Adobe Flash and Acrobat Reader

As we have seen in practically all the PandaLabs reports, these programs are a key target for cyber-criminals. That’s why it’s best to ensure they are always up-to-date or, if you don’t use them, uninstalled.

Viruses and malware can slip past antivirus programs and infect PCs by exploiting programs that haven’t been kept up-to-date.

Take care which programs you install

It is essential to be aware of what you’re installing or running on your computer. Virus creators earn a lot of money from programs or applications which, at first glance, seem harmless but can infect your computer when they are run. That’s why you should:

  • Never open messages from unknown sources.
  • Avoid non-secure web pages. You can recognize secure pages as the address begins with ‘https://’ and they display a padlock icon.
  • Use secure passwords.
  • Not provide confidential information via email.

Keep your Windows operating system up-to-date

Malware and viruses exploit security holes in outdated versions of Windows. To prevent this, you must install the latest security patches.

Windows makes this easy for you, so you can enable automatic updates so you don’t have to worry about it.

Use a good antivirus

A good antivirus can do much more than keep your computer virus-free. It can protect your identity and that of your business and can also prevent fraud when you shop online.

Find out what is the best antivirus for your needs from our new 2014 product range.

What’s more, if you have an antivirus with parental control, you can protect your children from danger on the Internet.

The post 4 steps to avoid viruses appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/security/4-steps-avoid-viruses/feed/ 0
Fed up with CAPTCHA? How to avoid it?http://www.pandasecurity.com/mediacenter/panda-security/avoid-captcha/ http://www.pandasecurity.com/mediacenter/panda-security/avoid-captcha/#comments Mon, 15 Sep 2014 14:25:27 +0000 http://www.pandasecurity.com/mediacenter/?p=12230 It is always annoying. You enter a website and suddenly, a CAPTCHA assaults you in doubt over whether you are human or a robot with, generally, malicious intentions. Some crossed out or distorted characters that you must decipher so that the system is sure that you do not have the slightest intention of exploiting the […]

The post Fed up with CAPTCHA? How to avoid it? appeared first on MediaCenter Panda Security.

]]>
avoid captcha

It is always annoying. You enter a website and suddenly, a CAPTCHA assaults you in doubt over whether you are human or a robot with, generally, malicious intentions. Some crossed out or distorted characters that you must decipher so that the system is sure that you do not have the slightest intention of exploiting the website’s resources beyond your possibilities. However, it is extremely tiresome because it is not easy to make out the combination of letters and numbers they show you in order to prove that you are not an intruder.

At last, after many years someone has set out to implement new methods that are not so much hassle. However, we will not be able to get away with not proving that we are made of flesh and bone and do not have any bad intentions but they thought that it would be better to do it in a more fun and entertaining way than wasting time trying to decipher completely illegible letters and numbers.

With this goal in mind, a group of researchers at the University of Alabama at Birmingham got down to work. Tired of the pesky CAPTCHAs, they decided to create a new method so that the websites that considered it necessary could check whether a human or robot was on the other side of the screen. Their plans also included finding a system that was more entertaining for users who have good intentions and setting up more barriers for those who program a bot to act like a human.

Captcha

This is how what they called ‘dynamic cognitive game’ or DCG came about. The team, consisting of Manar Mohamed, Song Gao, Chengcui Zhang and led by Nitesh Saxena, have published a new way of checking whether someone is trying to enter a website to abuse the services it offers.

The new system challenges the user with a simple and good-natured game. A puzzle that, unlike CAPTCHA, will not try your patience getting it wrong time after time for not being able to clearly see the letters and numbers shown on screen. Now all you will have to do is select the object that is not a boat, for example. Or even easier, a straight-forward drag and drop task that involves dragging geometric figures to the space with the same shape.

As you can see, they are extremely easy actions for any Internet user but impede the action of bots programed to complete many CAPTCHA in the blink of any eye. Because while humans will just have to identify the object and drag it and can solve it first go, the programs used by spammers will need several attempts. So by trying so many times and getting it wrong, the mechanism will detect strange behavior and classify it as an intruder.

What’s more, this new method created by researchers at the University of Alabama at Birmingham, is also proposed as an alternative for dissuading those with malicious intentions who have moved from programs to new ways of exploiting website resources.

As crazy as it may seem, through extortion or money –usually a very small amount- there are people who work non-stop for someone who needs them to complete the forms on websites. These cognitive games will make it more difficult for them because this system is not as mechanical as the one used by the tiresome CAPTCHAs.

It’s not the first and it won’t be the last alternative

There have been many who, fed up with tedious verification processes of entering letters and numbers, have suggested alternatives to the system devised by Guatmalan Luis Von Ahn in 2000. A math puzzle, a task puzzle or even solving an audio message in which someone says something in a distorted voice.

However, it is going to be very difficult to completely do away with CAPTCHA. Not because the new systems are more or less reliable but because thanks to these and without having the slightest idea, we are working for Google. Without a contract or payment of any kind, whenever we complete a CAPTCHA or reCAPTCHA to prove that we are a human who wants to open a Gmail account, we are contributing to this company’s goal of digitalizing all of the books in the world. Did you know that?

The post Fed up with CAPTCHA? How to avoid it? appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/panda-security/avoid-captcha/feed/ 0
How Twitter aims to prevent your timeline from filling up with spamhttp://www.pandasecurity.com/mediacenter/social-media/twitter-spam/ http://www.pandasecurity.com/mediacenter/social-media/twitter-spam/#comments Fri, 12 Sep 2014 08:32:58 +0000 http://www.pandasecurity.com/mediacenter/?p=12205 As with so many of today’s technological tools, while many people use them to make their lives easier, or to keep in touch with friends and family, there are some that take advantage of them simply to annoy others. So while most of us use social networks to chat with friends, meet new people and […]

The post How Twitter aims to prevent your timeline from filling up with spam appeared first on MediaCenter Panda Security.

]]>
As with so many of today’s technological tools, while many people use them to make their lives easier, or to keep in touch with friends and family, there are some that take advantage of them simply to annoy others.

So while most of us use social networks to chat with friends, meet new people and keep abreast of what’s happening in the world, there are those that saturate our accounts with messages that are not just of no interest, they are downright annoying: the infamous ‘spam’.

Now, tired of users having to endure this continuous bombardment of unwanted advertising, those responsible for several social networks have decided to go on the offensive. One of these is Twitter, which has taken action as spammers have been increasing their unhindered presence on users’ timelines and direct message inboxes. Finally, those in charge of the social network have said enough is enough.

twitter spam

As the company has revealed on its blog, over the last six months its developers have been working on the design of a system that can detect and block the actions of these annoying spammers. They have called it ‘BotMaker’ and its objective is to counter the actions of those who, whether for commercial reasons or otherwise, are dedicated to annoying other users of the social network.

The plan that Twitter has come up with to prevent these unwelcome users from doing whatever they please has three objectives.

  1. Firstly, it aims to reduce the options for spammers to create content.
  2. Secondly, it wants to restrict the visibility of spam messages launched on the social network.
  3. Finally, the most difficult objective is to reduce reaction times between spam attacks and the system’s ability to detect and stop them.

To achieve its aims, BotMaker has been designed to apply a series of rules that allow it to determine who is annoying other users with spam. When there is a suspicion that a tweet breaks the rules on spam, Twitter’s new platform will activate a protocol to ensure that either the message is deleted immediately or the user that sent it is vetoed to prevent them from further annoying users.

twitter no interest messages

Moreover, to prevent any unwanted messages from bothering other tweeters by trying to sell something, Twitter’s newly devised anti-spam system includes different bots that act at different stages of the hunt for spammers. The first to come into play is Scarecrow, which intervenes immediately in real time. Sniper comes next, eliminating any spam messages that have slipped past the previous filter. It also carries out a second appraisal and makes a record of suspicious users. If this weren’t enough, BotMaker also sets certain controls on users over long periods of time to prevent them from getting around the rules.

Nevertheless, the main advantage of Twitter’s new system is that it can detect spam even before the account in question can send junk mail to other users. This was the biggest challenge that the team at the social network faced because, whereas with email the delivery is delayed for a few seconds while Google or Microsoft robots check it to ensure it is not spam, with tweets this isn’t the case. These messages are sent and, theoretically, should arrive on your timeline immediately.

Users are also involved in the successful operation of BotMaker as they have the chance to identify those accounts that are flooding their timelines with spam. In this regard, the cookies that users have to accept to use Twitter also play an important role, by analyzing the traces left by tweeters. Despite this, BotMaker has no negative effects on users whatsoever. In fact, the system has been configured not to interfere with the bots that users install to automatically tweet on those topics that they have previously selected.

twitter unwanted messages

Trails carried out by the company with BotMaker have shown it to work efficiently. In the six months that Twitter tested its own invention, it managed to reduce by 40 percent the billions of unwanted messages aimed at selling or promoting products to other users of the social network.

Yet although these results may seem encouraging for those who regularly use Twitter, the truth is that all is not what it seems. Beyond its firm desire to counter the intentions of spammers, the social network is also striving to improve its own targeting of advertising.

As the epicenter of thousands upon thousands of comments about all types of events taking place around the world, the filters that BotMaker uses can also be used to select users who may be interested in advertising of one product or another.

More | How to protect your Twitter account

The post How Twitter aims to prevent your timeline from filling up with spam appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/social-media/twitter-spam/feed/ 0
Winners of the ‘Betatester 2015′ competitionhttp://www.pandasecurity.com/mediacenter/products/winners-betatester-2015-competition/ http://www.pandasecurity.com/mediacenter/products/winners-betatester-2015-competition/#comments Thu, 11 Sep 2014 14:34:24 +0000 http://www.pandasecurity.com/mediacenter/?p=12197 At last we can announce the names of the winners of the Panda Global Protection 2015 beta competition! Our Betatester of the Year and winner of €600 is: Saravana Kumar S., India The winners of €200 are: Anil Kumar E.S, India Jayakrishnan P., India Alex Molina, Spain Binshad Shahul, India HUANG JING-KAI, Taiwan Andreas Ntonas, de Greece Kevin Appel, Switzerland Lauri Säde, Estonia Saqiya Maghisla, […]

The post Winners of the ‘Betatester 2015′ competition appeared first on MediaCenter Panda Security.

]]>
best antivirus

At last we can announce the names of the winners of the Panda Global Protection 2015 beta competition! :)

Our Betatester of the Year and winner of €600 is:

  • Saravana Kumar S., India

The winners of €200 are:

  • Anil Kumar E.S, India
  • Jayakrishnan P., India
  • Alex Molina, Spain
  • Binshad Shahul, India
  • HUANG JING-KAI, Taiwan
  • Andreas Ntonas, de Greece
  • Kevin Appel, Switzerland
  • Lauri Säde, Estonia
  • Saqiya Maghisla, India

We have also awarded another 250 prizes of a one-year Panda Global Protection 2015 licence for three devices.

Thank you very much to all those who entered for your comments and suggestions!

More | Maximum protection with Panda Security’s new 2015 consumer solutions

The post Winners of the ‘Betatester 2015′ competition appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/products/winners-betatester-2015-competition/feed/ 0
5 million Gmail passwords leakedhttp://www.pandasecurity.com/mediacenter/news/5-million-gmail-passwords-leaked/ http://www.pandasecurity.com/mediacenter/news/5-million-gmail-passwords-leaked/#comments Thu, 11 Sep 2014 14:08:58 +0000 http://www.pandasecurity.com/mediacenter/?p=12193 Do you have a Gmail account? This may interest you! A Russian cybersecurity forum has published a file containing more than 5 million Gmail accounts. According to several experts, more than 60% of the username and password combinations were valid. However, Google says that the information is “outdated“, that is, these accounts have been suspended […]

The post 5 million Gmail passwords leaked appeared first on MediaCenter Panda Security.

]]>
gmail

Do you have a Gmail account? This may interest you! A Russian cybersecurity forum has published a file containing more than 5 million Gmail accounts.

According to several experts, more than 60% of the username and password combinations were valid. However, Google says that the information is “outdated“, that is, these accounts have been suspended or the users no longer access them.

In a statement, Google said that it has no evidence that its systems have been compromised, but explains that “whenever we become aware that accounts may have been compromised, we take steps to help those users secure their accounts.

The file published mainly contains British, Spanish and Russian accounts. If you want to know whether your account is on the list of those affected, you can do so here.

Panda Security recommends you increase the security of your passwords and use two-step verification of your Gmail account.

More | How to increase the privacy of your Gmail account

The post 5 million Gmail passwords leaked appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/news/5-million-gmail-passwords-leaked/feed/ 0
Facebook offers a new tool for configuring privacyhttp://www.pandasecurity.com/mediacenter/social-media/facebook-privacy/ http://www.pandasecurity.com/mediacenter/social-media/facebook-privacy/#comments Wed, 10 Sep 2014 15:16:24 +0000 http://www.pandasecurity.com/mediacenter/?p=12180 As Facebook is always changing, keeping your profile private and secure is a complicated and time consuming task. The social network therefore, aware that this could put many users off sharing their news with contacts, has developed a new tool to simplify the job. With this new feature, a friendly blue dinosaur helps you to […]

The post Facebook offers a new tool for configuring privacy appeared first on MediaCenter Panda Security.

]]>
privacy facebook

As Facebook is always changing, keeping your profile private and secure is a complicated and time consuming task. The social network therefore, aware that this could put many users off sharing their news with contacts, has developed a new tool to simplify the job.

With this new feature, a friendly blue dinosaur helps you to quickly and simply check which of your contacts can see your latest posts.

To access it you have to click the padlock symbol in the top right of the screen and select “Privacy checkup

facebook privacy check - up

A dialog box then opens with three simple steps.

How to configure privacy settings in Facebook

  1. The first option lets you control who can see your posts when you update your status from the news section or from the wall. As well as telling you the current settings, you can also change them to suit your preferences

facebook privacy check - up posts

  1. The next step displays a list of all the applications that can access your profile and information. Here you can also prevent this access if you no longer use the application in question. What’s more you can see which of your contacts can see posts that the applications publish ​​in your name.

facebook privacy check - up apps

  1. Finally, Facebook helps you check which personal information you’re sharing on your profile: your job, school and college background, where you live … you can add or delete data and restrict access to it.

facebook privacy check - up profile

Although none of these settings prevent Facebook from using your personal information for advertising, it can help you know which contacts can see which posts.

At present this help feature does not include settings for albums or photos as a profile or homepage, which you will have to check directly.

If after meeting Facebook’s new dinosaur you still have questions about the privacy settings of your profile, you can always check our guide.

More | Facebook Privacy Guide

 

The post Facebook offers a new tool for configuring privacy appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/social-media/facebook-privacy/feed/ 0
A website set up to shame the guilty: the list of companies that don’t protect customers’ datahttp://www.pandasecurity.com/mediacenter/security/website-set-shame-guilty-list-companies-dont-protect-customers-data/ http://www.pandasecurity.com/mediacenter/security/website-set-shame-guilty-list-companies-dont-protect-customers-data/#comments Mon, 08 Sep 2014 10:08:15 +0000 http://www.pandasecurity.com/mediacenter/?p=12165 There is an ever increasing amount of personal data circulating on the Internet, yet the security in place to safeguard this data is not evolving at the same rate. Many applications and Web services jeopardize user information by not employing any encryption system to protect it. Given this situation, IT engineer Tony Webster has set […]

The post A website set up to shame the guilty: the list of companies that don’t protect customers’ data appeared first on MediaCenter Panda Security.

]]>
data company

There is an ever increasing amount of personal data circulating on the Internet, yet the security in place to safeguard this data is not evolving at the same rate. Many applications and Web services jeopardize user information by not employing any encryption system to protect it.

Given this situation, IT engineer Tony Webster has set up a website to draw attention to those who are reckless in their approach to safeguarding data. At HTTP Shaming you can find the names of the ‘guilty’ websites and how they are violating users’ privacy. If they abuse the trust of their users, it’s only fair that the users should know.

One of the names that appears on the website is Mashable. According to Webster, this news website enables users to connect using their social networks accounts and interact through them. The problem however is that all this activity is happening on an HTTP address, instead of the secure HTTPS internet protocol, which encrypts the information transmitted with the SSL (‘Secure Sockets Layer’) system.

SSL system
An SSL certificate, which guarantees the security of Internet communications, works by assigning keys to files exchanged between a client computer and the server of the company providing the service, so that only the company can access the file content.

If however you use the service offered by Mashable while connected to an open WiFi network, as with many public sites, your email address, alias and passwords could be stolen by cyber-criminals (those you use for Mashable as well as the social networks you use to access the page).

mashable
The TripIt travel planning site, where you can manage bookings, check timetables and flight schedules, and share all of this with other users, is another similar case.

In both the Tripit versions for smartphones and for websites, users are first asked to enter an email address and password. Webster highlighted this site as it does not encrypt the information displayed to others through the calendar feature. As is the case with Mashable, a criminal could discover your full name, phone number, email address and the last four digits of your credit card.

Those responsible for the website have reported this summer that the problem is now fixed and that security measures are now applied to all communications.

Such poor security practices also occur on other e-commerce sites where companies and customers exchange more sensitive information. Research by the IT security consultants High-Tech Bridge showed that 73% of the top 100 online stores don’t use the HTTPS protocol for data they consider less sensitive, and only two of them apply it in all cases.

The same applies to apps running on mobile devices. In a recent study by HP, a group of IT experts analyzed the security measures in place on 2,107 apps and found that 75% of them do not encrypt stored data. Some 18% didn’t even encrypt data exchanged across the Internet.

Webster’s list of shame now has 19 names, many of these put forward by others who wanted to take part in the project. These names include Creative Cloud, VLC and Adobe Flash Player. Even the Tumblr microblogging site, where the HTTP Shaming page is hosted, doesn’t have a secure protocol. In the worst cases, the IT engineer has directly contacted companies to let them know the error of their ways.

tumblr
Webster fails to understand why some companies are subjecting customers to unnecessary risks, as there is no reason not to use HTTPS, which is available to anyone offering services on the Internet.

The post A website set up to shame the guilty: the list of companies that don’t protect customers’ data appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/security/website-set-shame-guilty-list-companies-dont-protect-customers-data/feed/ 0
Fernando Andrés appointed Global PAPS General Manager at Panda Securityhttp://www.pandasecurity.com/mediacenter/press-releases/12159/ http://www.pandasecurity.com/mediacenter/press-releases/12159/#comments Thu, 04 Sep 2014 12:02:40 +0000 http://www.pandasecurity.com/mediacenter/?p=12159 Panda Security today announced that Fernando Andrés has been appointed as the company’s new Global PAPS General Manager. Andrés’ mission will be to lead the global development of the PAPS business line, one of the flagships in the security vendor’s corporate strategy. During his professional career, spanning over 20 years in companies such asSaleforce.com and […]

The post Fernando Andrés appointed Global PAPS General Manager at Panda Security appeared first on MediaCenter Panda Security.

]]>
Panda Security today announced that Fernando Andrés has been appointed as the company’s new Global PAPS General Manager. Andrés’ mission will be to lead the global development of the PAPS business line, one of the flagships in the security vendor’s corporate strategy.

During his professional career, spanning over 20 years in companies such asSaleforce.com and Microsoft, Andrés has held key executive positions in the sales management, business development and channel development areas in the cloud computing, Internet services and applications sectors.

Fernando Andrés holds a Bachelor’s Degree in Computer Science from the University of Castilla La Mancha (Spain), and completed the IESE Business School’s Advanced Management Program in Business Administration.

Global PAPS General Manager  at Panda Security

Fernando Andrés

Extensive experience in the IT sector

From 2009 to 2014, Andrés held a number of management positions at Salesforce.com, including Corporate Sales Director for South Europe at Salesforce.com EMEA and Director of Channel Business Development at Salesforce.com Spain.

Prior to that, he held different positions at Microsoft for more than a decade, ultimately serving as SaaS Sales Director from 2004 to 2009.

Prior to joining Microsoft, Andrés was employed at ICL Fujitsu and Kodak.

“PAPS (Panda Advanced Protection Service) is a revolutionary product in the industry. It is a next-generation security solution with a completely new, disruptive approach that ensures maximum malware detection and security through an integrated management service. It is very exciting to be part of such an innovative, effective and successful project which will represent a huge leap forward not only for Panda Security, but also for the entire IT security sector,” said Fernando Andrés.

The post Fernando Andrés appointed Global PAPS General Manager at Panda Security appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/press-releases/12159/feed/ 0
WhatsApp could confirm when messages have been readhttp://www.pandasecurity.com/mediacenter/social-media/whatsapp-confirm-messages-read/ http://www.pandasecurity.com/mediacenter/social-media/whatsapp-confirm-messages-read/#comments Thu, 04 Sep 2014 08:31:03 +0000 http://www.pandasecurity.com/mediacenter/?p=12139   The dream of some and the nightmare of others may soon come true. WhatsApp is apparently considering a system for notifying users when the messages they have sent have been read. When the app first came out, many thought that the double check symbol meant the message had been read. However, it was made […]

The post WhatsApp could confirm when messages have been read appeared first on MediaCenter Panda Security.

]]>
 

whatsapp doble check

The dream of some and the nightmare of others may soon come true. WhatsApp is apparently considering a system for notifying users when the messages they have sent have been read.

When the app first came out, many thought that the double check symbol meant the message had been read. However, it was made clear that the only thing that the two ticks represent is that the message has been delivered successfully.

The news was leaked after WhatsApp asked a user to translate some terms into Italian. These included: «reproduced by», «sent by», «delivered» and «birthday», though suspicions were raised by the phrase «read by» which has led to all sorts of speculation.

whatsapp read by

This feature is similar to the D (Delivered) and R (Read) messages in BlackBerry Messenger although it appears it is still in trial phase.

What do you think? Would you be in favor of WhatsApp telling you if a message had been read? Or would that be infringing on your privacy?

The post WhatsApp could confirm when messages have been read appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/social-media/whatsapp-confirm-messages-read/feed/ 0
Apple denies its services were hackedhttp://www.pandasecurity.com/mediacenter/news/apple-denies-services-hacked/ http://www.pandasecurity.com/mediacenter/news/apple-denies-services-hacked/#comments Wed, 03 Sep 2014 15:41:33 +0000 http://www.pandasecurity.com/mediacenter/?p=12144   “Celebgate” -as the theft and publication of private photos of more than 100 actresses and models has come to be known – is not only affecting the direct victims of the theft but also the companies that have been implicated in the affair. Initially, it was thought that the leaks could be due to […]

The post Apple denies its services were hacked appeared first on MediaCenter Panda Security.

]]>
apple

 

Celebgate” -as the theft and publication of private photos of more than 100 actresses and models has come to be known – is not only affecting the direct victims of the theft but also the companies that have been implicated in the affair.

Initially, it was thought that the leaks could be due to a potential security hole in iCloud, Apple’s virtual storage platform, but the company has announced that, after a 40-hour investigation, they have discovered that the accounts of these celebrities “were compromised by a very targeted attack on user names, passwords and security questions.” Adding that these attacks have “become all too common on the Internet.”

Apple denies that the hacking of the accounts of actresses such as Jennifer Lawrence, Kirsten Dunst and Kate Upton was the consequence of a vulnerability in its iCloud or ‘Find my iPhone‘ services. Although some of the victims have already had their say on the issue.

kirsten dunst twitter

The company has also announced that it continues to work with the police to help identify the criminals involved and encourages all users to choose a strong password and double check their security systems.

More | How to create strong passwords

The post Apple denies its services were hacked appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/news/apple-denies-services-hacked/feed/ 0