MediaCenter Panda Security http://www.pandasecurity.com/mediacenter Just another WordPress site Wed, 28 Jan 2015 17:37:15 +0000 en-US hourly 1 http://wordpress.org/?v=4.0.1 Now we are simplexity!http://www.pandasecurity.com/mediacenter/panda-security/now-simplexity/ http://www.pandasecurity.com/mediacenter/panda-security/now-simplexity/#comments Wed, 28 Jan 2015 16:46:37 +0000 http://www.pandasecurity.com/mediacenter/?p=12851 Making complex things simple. That’s the meaning of simplexity, and the basis of the transformation Panda has undergone. An internal and external transformation of the way we do things, and which signals the beginning of an ambitious five-year strategic plan based on growth, technology and international expansion. This is the new Panda… Our new corporate […]

The post Now we are simplexity! appeared first on MediaCenter Panda Security.

]]>
Making complex things simple. That’s the meaning of simplexity, and the basis of the transformation Panda has undergone.

An internal and external transformation of the way we do things, and which signals the beginning of an ambitious five-year strategic plan based on growth, technology and international expansion.

This is the new Panda

panda logo

Our new corporate identity coincides with the company’s 25th anniversary and is the result of the participation of all Panda’s offices around the world.

The worldwide presentation of our new strategic plan took place yesterday in Madrid. This event, which was attended by numerous Panda employees as well as the media, gave us the opportunity to explain the company’s core values among many other things: non-conformist, people-centric and innovative.

Here are some pictures from the event!

panda security simplexity

 

diego navarrete panda security

Diego Navarrete, Panda Security CEO, during the event

 

Paula Quiros Panda Security

Paula Quirós, our CMO

 

Felipe Mejias Panda Security

#PandaSimplexity by Felipe Mejías

 

simplexity panda security

After almost a year of hard work we are finally proud to present to you the new Panda. What do you think? Will you join #PandaSimplexity?

The post Now we are simplexity! appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/panda-security/now-simplexity/feed/ 0
Panda Security announces new growth strategy and identity change #PandaSimplexityhttp://www.pandasecurity.com/mediacenter/press-releases/panda-security-announces-new-growth-strategy-identity-change-pandasimplexity/ http://www.pandasecurity.com/mediacenter/press-releases/panda-security-announces-new-growth-strategy-identity-change-pandasimplexity/#comments Wed, 28 Jan 2015 09:10:24 +0000 http://www.pandasecurity.com/mediacenter/?p=12846 Panda Security, The Cloud Security Company, celebrates its 25th anniversary with a brand new strategic plan and a new corporate identity that goes far beyond simply using a different logo or brand image. This initiative has brought about a comprehensive transformation, both external and internal, which affects all of the company’s values and processes and […]

The post Panda Security announces new growth strategy and identity change #PandaSimplexity appeared first on MediaCenter Panda Security.

]]>
panda logo

Panda Security, The Cloud Security Company, celebrates its 25th anniversary with a brand new strategic plan and a new corporate identity that goes far beyond simply using a different logo or brand image. This initiative has brought about a comprehensive transformation, both external and internal, which affects all of the company’s values and processes and reflects the company’s essence more accurately: innovation, vision and talent. This change represents the birth of a new Panda.

“We want to be perceived by the industry as we really are: challenging and innovative with deep human values. That’s why we have created a new corporate identity that we feel more identified with and which is closer, simpler and more modern. This transformation is based on the concept of “simplexity”: making complex things simple, simplifying the complexities faced by the computer security sector”, said Paula Quirós, CMO at Panda Security.

Panda Security has been working intensely on this project for more than a year, with participation from all of the company’s offices around the world. “This has been a very comprehensive project but also exciting at the same time. We have taken into account opinions from all the departments in Panda Security both in our headquarters in Spain and the rest of the world, as well as the insight offered by our customers and partners. Obviously, we have also closely tracked the competition and the computer security industry in general. The result? A completely renewed corporate image, fresh and simple, which differentiates us and positions us where we want to be. We are Panda, we are simplexity”, explained Panda Security’s CMO.

Five-year strategic plan

Panda’s rebranding initiative signals the beginning of an ambitious five-year strategic plan based on growth, technology and international expansion. “The objective for the next five years is to grow at twice the rate of the computer security industry, as well as integrating and unifying technologies to provide our customers with a global security service that includes elements such as mobility or the Internet of Things under the concepts of simplexity and peace of mind. Additionally, we will continue to expand our international presence, with special emphasis on the European, North American and Latin American markets”, explained Diego Navarrete, Panda Security CEO.

New identity

The agency selected to assist Panda in such an ambitious project was Saffron Brand Consultants. Panda and Saffron worked closely together in 2014 to shape a new, closer and more modern Panda, with a new design that conveys the sharp, honest and optimistic spirit of the brand.

“In short, with this new identity we want our customers to perceive us as we really are. A close, friendly, innovative company capable of successfully facing the present and future challenges,” concluded Paula Quiros.

You can see the new brand video here.

The post Panda Security announces new growth strategy and identity change #PandaSimplexity appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/press-releases/panda-security-announces-new-growth-strategy-identity-change-pandasimplexity/feed/ 0
It only took a few photos to copy the fingerprint of the Minister of Defense: Could the same happen to you?http://www.pandasecurity.com/mediacenter/mobile-security/took-photos-copy-fingerprint-minister-defense-happen/ http://www.pandasecurity.com/mediacenter/mobile-security/took-photos-copy-fingerprint-minister-defense-happen/#comments Tue, 27 Jan 2015 15:39:14 +0000 http://www.pandasecurity.com/mediacenter/?p=12839 The papillary ridges of our fingers define us as unique in the universe. That is why our fingerprints are being used more in the biometric security field; our finger conceals a password that is difficult to steal. Computers and smartphones are already adopting this technology. The iPhone 6 and Samsung Galaxy S5 incorporate a fingerprint […]

The post It only took a few photos to copy the fingerprint of the Minister of Defense: Could the same happen to you? appeared first on MediaCenter Panda Security.

]]>
smartphone fingerprintThe papillary ridges of our fingers define us as unique in the universe. That is why our fingerprints are being used more in the biometric security field; our finger conceals a password that is difficult to steal.

Computers and smartphones are already adopting this technology. The iPhone 6 and Samsung Galaxy S5 incorporate a fingerprint scanner so that you are the only one who can unlock your phone. With this system, you can supposedly rest easy in the knowledge that if your phone is stolen, the thief will be left flabbergasted when he realizes that he cannot access the valuable data stored on it.

However, we are sorry to tell you that there is a way of getting your fingerprint and don’t think that we are going to talk about amputating one of your limbs. A few photos of your finger can now be used to copy every tiniest detail of your fingerprint and impersonate you, as demonstrated by security expert Jan Krissler, alias “Starburg”, in a conference organized by the Chaos Computer Club, one of Europe’s largest hacker communities.

Last year, the Chaos Computer Club announced that it had managed to hack the iPhone 5S fingerprint scanner. Now, they have moved on from hacking the security of the device to hacking the security of a finger, without even needing to have physical contact.

Krissler explained that he had copied the fingerprint of German Defense Minister, Ursula von der Leyen, without needing an object that the politician had touched. All he needed was a few photos taken with a standard camera (one of them from her press office) to discover all of the data that the minister has in her fingerprint. In order to carry out the experiment, he combined various images showing von der Leyen’s finger from different angles.

German Defense Minister

This hacker used Verifinger, a commercial fingerprint identification software, to clone the minister’s thumbprint using the photos. A simple method for getting the fingerprint of anyone you want.

“After this talk, politicians will presumably wear gloves when talking in public,” said the hacker during the presentation. We do not know if the minister will be as happy about this cloning and will now be obsessed with hiding her hands in future public appearances.

Jan Krissler, who has researched weakness in biometric security systems at the Technical University of Berlin, demonstrated the effectiveness of his method during the conference. This is not the first time that the hacker has demonstrated that the famous biometric techniques, which base their security on unique features of our body (the fingerprint, retina, iris or facial features), are not as secure as we thought. This hacker reproduced in 2008 the fingerprint of the German Minister of the Interior at the time, now Minister of Finance, Wolfgang Schäuble.

fingerprint

According to Krissler, iris, facial and fingerprint scanners can be fooled easily. “I consider my password safer than my fingerprint… My password is in my head, and if I’m careful when typing, I remain the only one who knows it”. 

Even our body is no longer a safe place if a hacker has the brilliant idea of copying our features. So, if you have an iPhone, perhaps the next time you use the fingerprint sensor, you will bear in mind that someone could copy your beautiful finger using a few Facebook pictures that show your fingers from different angles. However, you can rest more easily knowing that your data is not as interesting as that of a politician and no hacker is going to take the trouble to copy your fingerprint. Anyone who is not content with that does not want to be.

The post It only took a few photos to copy the fingerprint of the Minister of Defense: Could the same happen to you? appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/mobile-security/took-photos-copy-fingerprint-minister-defense-happen/feed/ 0
Security tools that are safe from the NSAhttp://www.pandasecurity.com/mediacenter/security/security-tools-safe-nsa/ http://www.pandasecurity.com/mediacenter/security/security-tools-safe-nsa/#comments Mon, 26 Jan 2015 16:41:30 +0000 http://www.pandasecurity.com/mediacenter/?p=12827 U.S. Intelligence services have shown on numerous occasions how adept they are at accessing our data without permission. Nevertheless, there is still hope that you can keep your confidential information safe from the prying eyes of the NSA: Its expert spies still haven’t been able to crack all encryption systems. Encryption tools are frequently used […]

The post Security tools that are safe from the NSA appeared first on MediaCenter Panda Security.

]]>
U.S. Intelligence services have shown on numerous occasions how adept they are at accessing our data without permission. Nevertheless, there is still hope that you can keep your confidential information safe from the prying eyes of the NSA: Its expert spies still haven’t been able to crack all encryption systems.

Security tools NSA

Encryption tools are frequently used to safeguard the privacy of all types of confidential information, from simple chats to personal data. Yet no matter how careful we are with the data we transmit across the Internet, it is important to bear in mind that a supposedly private conversation may not be quite so private (whether you like it or not), particularly if your chat touches upon certain delicate issues.

Skype is a good example. Despite their reassurances that their video calls were the most secure, the documents leaked by Edward Snowden confirmed that the NSA had been accessing this tool since before 2011.

Luckily for many, or perhaps for everyone, a recent report published by Der Spiegel thanks to the Snowden leaks has revealed that, at least two years ago, there were still programs and security tools that could resist the technological weapons of the US security agency. Tools like Zoho, TOR, TrueCrypt and Off-the-Record are some of those causing headaches for the NSA, which has been unable to crack their encryption or at least encountered major problems in doing so.

zoho NSA

According to the German newspaper, US spies normally classify attempts to breach the security of a program from “trivial” to “catastrophic”. Decrypting email messages sent with Zoho is defined by the NSA as a “major” task, and users can rest assured as the agency has not yet been able to crack its security.

The US spy agency also found it difficult to break TOR encryption, the free and open source software that allows users to surf the Web through a network of thousands of linked volunteer computers. One of the benefits offered by TOR is that it is difficult to trace the location of a user visiting a specific website, making it an essential tool for activists in countries with strong censorship.

tor NSA

TrueCrypt on the other hand is a useful program for encrypting and hiding data and files. It uses algorithms like AES, Serpent and Twofish -either on their own or in combination- keeping it safe, according to Der Spiegel, from the prying eyes of the NSA.

While the NSA rated the breaking of the encryption of these tools as a “major” task, it defined as “catastrophic” its attempts to crack the combination of TOR with the CSpace secure instant messaging system, and a system for Internet telephony (voice over IP) called SRTP (a security protocol that adds confidentiality to voice messages).

Security tools that are safe from the NSA

The Pretty Good Privacy (PGP) program is also NSA-proof. This program was developed in 1991 to ensure secure conversations between its creator (Phil Zimmermann) and other intellectuals of a similar political leaning. Given it has now been twenty years since the creation of the program, it’s quite a surprise that experts from one of the world’s most advanced security agencies are yet to penetrate its defenses.

Although the information in this report talks about the data analyzed in 2012, experts believe that it is unlikely that the spies have progressed much since then, and that it is quite possible that these tools are yet to be breached.

For the moment, if you use any of these programs, you can breathe easy. If not, perhaps now is a good time to think again about your security.

The post Security tools that are safe from the NSA appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/security/security-tools-safe-nsa/feed/ 0
A new strain of ransomware is on the loose! Watch out!http://www.pandasecurity.com/mediacenter/malware/new-strain-ransomware-loose-watch/ http://www.pandasecurity.com/mediacenter/malware/new-strain-ransomware-loose-watch/#comments Fri, 23 Jan 2015 11:31:56 +0000 http://www.pandasecurity.com/mediacenter/?p=12816 Our colleagues at PandaLabs have detected a new strain of ransomware: Trj/RansomCrypt.B. Known as CTB-Locker, what is different about this example is that if you pay, you can access all the locked files. This type of malware normally reaches users via email, convincing the user that it’s a legitimate message and getting them to run the file. When run, […]

The post A new strain of ransomware is on the loose! Watch out! appeared first on MediaCenter Panda Security.

]]>
Our colleagues at PandaLabs have detected a new strain of ransomware: Trj/RansomCrypt.B. Known as CTB-Locker, what is different about this example is that if you pay, you can access all the locked files.

This type of malware normally reaches users via email, convincing the user that it’s a legitimate message and getting them to run the file. When run, the malware encrypts image files and documents on the victim’s computer and changes the desktop wallpaper for the following image. It also creates a text file with the same information.

However, if you have any of our Internet security software, you can rest assured, as Panda Security detects and blocks this threat.

RansomCryptB

The following screen then appears, demanding a ransom before the specified time. If the ransom is not paid in time, the amount of money demanded increases.

files encrypted

Clicking ‘Next’ leads to the following window informing victims that if they pay, the files will be unlocked. To demonstrate that this is true, five documents are released.

CTB Locker ransomware

personal file encrypted

How to recognize CTB-Locker?

  • This malware comes in an email with an attachment. This is either a Word file with a .doc or .rtf extension, or a compressed file (.zip) containing a .scr file.
  • Some variants, in addition to encrypting files on the computer, also steal the address book to identify new potential victims. Worse still, they fake the address of the sender so the message may appear to have been sent from a known contact.
  • You can see some examples of these emails here.

How to avoid Ransomware?

  • Keep your operating system up-to-dateto prevent security flaws.

Make sure you have antivirus software installed and up-to-date.

  • Don’t open emails or files from unknown sources.
  • Don’t browse suspect web pagesor those with unverified content.

The post A new strain of ransomware is on the loose! Watch out! appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/malware/new-strain-ransomware-loose-watch/feed/ 0
WhatsApp blocks WhatsApp Plus usershttp://www.pandasecurity.com/mediacenter/news/whatsapp-blocks-whatsapp-plus-users/ http://www.pandasecurity.com/mediacenter/news/whatsapp-blocks-whatsapp-plus-users/#comments Wed, 21 Jan 2015 13:08:09 +0000 http://www.pandasecurity.com/mediacenter/?p=12811 “You’re temporarily banned from WhatsApp because you may have violated our terms of service. You’ll be able to use WhatsApp again in:” Maybe this text sounds you familiar… WhatsApp has blocked the accounts of all WhatsApp Plus users. The reason? It cannot guarantee the security of the service. The block will last 24 hours and […]

The post WhatsApp blocks WhatsApp Plus users appeared first on MediaCenter Panda Security.

]]>
whatsapp plus

“You’re temporarily banned from WhatsApp because you may have violated our terms of service. You’ll be able to use WhatsApp again in:” Maybe this text sounds you familiar…

WhatsApp has blocked the accounts of all WhatsApp Plus users. The reason? It cannot guarantee the security of the service.

The block will last 24 hours and WhatsApp explains it as follows:

whatsapp banned

WhatsApp Plus is an Android app developed by a Spanish programmer, based on WhatsApp but unofficial and unauthorized by it. It allows users to access WhatsApp and customize the look, use other emoticons, send songs…

However, WhatsApp warned that using unauthorized apps was a violation of its Terms of Service, and those who use them will be banned and that is what has happened.

The post WhatsApp blocks WhatsApp Plus users appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/news/whatsapp-blocks-whatsapp-plus-users/feed/ 0
10 Tips for protecting your company’s emailhttp://www.pandasecurity.com/mediacenter/security/10-tips-protecting-companys-email/ http://www.pandasecurity.com/mediacenter/security/10-tips-protecting-companys-email/#comments Tue, 20 Jan 2015 11:45:29 +0000 http://www.pandasecurity.com/mediacenter/?p=12799 Practically all important information that we work with nowadays reaches us via corporate email. That’s why email security is so important for companies. Here we offer some advice to bear in mind to prevent unauthorized people from accessing your email – and the information it contains. 10 Tips for protecting your company’s email Many of […]

The post 10 Tips for protecting your company’s email appeared first on MediaCenter Panda Security.

]]>
Practically all important information that we work with nowadays reaches us via corporate email. That’s why email security is so important for companies. Here we offer some advice to bear in mind to prevent unauthorized people from accessing your email – and the information it contains.

keys

10 Tips for protecting your company’s email

Many of the cyber-attacks that target large companies can be traced back to email. When all’s said and done, this is the place where a company’s most useful information can be found; where employees chat; where credit card details -even passwords- are sent. Read on if you want to know how to look after this information.

  1. The first thing you should be thinking about as a company owner is training your staff in IT security, to eliminate dangerous behavior when using company email.
  2. Employees can counter risks by deleting old emails. You accumulate hundreds (even thousands) of messages in the belief that the information is really important (it could be for a cyber-criminal!). If you genuinely regard the information as vital, you could always save it to an external hard drive or data base and then delete the original emails.smartphone email
  3. Encrypt your email. One of the main features of corporate email is that it gives companies control over sensitive information, and prevents it from being circulated through employees’ personal email accounts. The best way to ensure such control and keep it from falling into the wrong hands is to encrypt it.
  4. When you have to create a password make sure it’s complex and that nobody could guess it. That said, make sure you can easily remember it too.
  5. You should also be careful when starting a corporate email session from public computers in libraries, Internet cafes and the like. Make sure you close the session before leaving the computer, though even then you can leave traces of your activity that are easily detected by cyber-criminals. Better only to access your company email on trusted networks.
  6. Don’t give your email address to everyone, and don’t post it on public Internet sites, remember that scammers are always on the lookout for new victims. inbox
  7. Careful with fake emails that try to trick you into resetting passwords as part of a supposed security check. These are normally scams designed to steal your passwords and access your email account. If you really need to change your password, go to your email provider’s website and make any changes from there, but don’t click on links sent to you via email.
  8. On a similar note: don’t even open emails sent from unknown sources.
  9. And of course don’t forget that company email is a working tool, it’s not for exchanging messages with friends and family. Remembering this will also help keep information from falling into the wrong hands.
  10. Last but not least, a good tool for protecting email from malware and other dangerous content is Panda GateDefender, which can prevent unwanted files from entering into contact with your company’s most sensitive data. This software filters spam to safeguard employee productivity, and also enables the secure and centralized storage and administration of your network’s users’ messages, ensuring flexibility and complete connectivity.

 

The post 10 Tips for protecting your company’s email appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/security/10-tips-protecting-companys-email/feed/ 0
Careful with FileZilla! There is malware that imitates it perfectlyhttp://www.pandasecurity.com/mediacenter/malware/careful-filezilla-malware-imitates-perfectly/ http://www.pandasecurity.com/mediacenter/malware/careful-filezilla-malware-imitates-perfectly/#comments Tue, 20 Jan 2015 09:36:40 +0000 http://www.pandasecurity.com/mediacenter/?p=12790 Anyone who has a website will be familiar with the term FTP (File Transfer Protocol), a protocol for transferring files over the Internet. When designing a website, you will have to use this quick method for storing the files that you want users to see (pages, pictures, documents, etc.) on a server. There are also […]

The post Careful with FileZilla! There is malware that imitates it perfectly appeared first on MediaCenter Panda Security.

]]>
filezilla

Anyone who has a website will be familiar with the term FTP (File Transfer Protocol), a protocol for transferring files over the Internet. When designing a website, you will have to use this quick method for storing the files that you want users to see (pages, pictures, documents, etc.) on a server.

There are also various types of programs for transporting data: these are called FTP clients, which connect your computer to the machine on which the information will be stored. One of the most widely-used is FileZilla, open and free software used by amateurs to professional web developers.

The first program, developed by Tim Kosse, was launched in 2001. Now it can be run on the most common operating systems (Windows, Linux and Mac OS X).

If you use this tool regularly, be on the lookout: malware has been detected in some versions (Filezilla v3.5.3 and Filezilla v3.7.3). The false application is installed in exactly the same way as the official version; it simulates the wizard interface perfectly and runs without any hitches.

The functioning of programs like FileZilla is simple: they allow web files to be arranged as if they were just another directory on your computer. In fact, you are managing a space in the memory of another computer (or several, if you work with various servers). You can save the data in different folders and arrange them as you please.

filezilla-malware

As you add more documents, they are transferred to this hard drive, which could be located in another country. This is where the activity of the malicious software comes in, which acts like a Trojan. It identifies each connection you establish with your server and communicates with another computer to which it sends the address where the information is housed and your FTP account login credentials.

Some addresses have been detected to which the malware transfers the stolen data, both with a Russian domain. These are ‘aliserv2013.ru’ and ‘go-upload.ru’, created in the domain register Naunet.ru, associated to fraudulent activity such as spamming. This platform hides its customers’ details and ignores demands to suspend its illegal domains.

Although this fraudulent version seems to work like the secure programs, certain characteristics give it away.

The main difference lies in the information in the About window in the program’s menu.

malware-filezilla

In this section you will find different references in the ‘Linked against’ option. In the malformed software, the versions of GnuTLS and SQLite are earlier versions than in the official program. In addition, you will find that the program does not allow you to update them.

GnuTLS (GNU Transport layer Security Library) and SQLite are two systems that guarantee that an application uses a secure transport layer (encrypted) to send data. These two systems are also open and free.

By using an outdated version of these programs, you risk a cybercriminal being able to monitor the login credentials used by FileZilla and decrypt the supposedly secure connections established.

Another difference with the flaw-free version is the presence of two additional libraries (ibgcc_s_dw2-1.dll and libstdc++-6.dll), although these do not seem to have any malicious effects.

Just follow these clues in order to check if the version you have installed is a spoof or the official program. In any case, make sure that you only download freeware like FileZilla from a website that offers security guarantees.

The post Careful with FileZilla! There is malware that imitates it perfectly appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/malware/careful-filezilla-malware-imitates-perfectly/feed/ 0
#XMASPANDA contest winners!http://www.pandasecurity.com/mediacenter/panda-security/xmaspanda-contest-winners/ http://www.pandasecurity.com/mediacenter/panda-security/xmaspanda-contest-winners/#comments Tue, 13 Jan 2015 14:54:54 +0000 http://www.pandasecurity.com/mediacenter/?p=12782 We finally can communicate our #XMASPANDA contest winners. If you are one of our Twitter winners, send us a Direct Message. Then if you are the one from Facebook , you can send us a Private Message too. We need the following details: Name Address Mobile Phone Email Address Panda Mobile Security License Ramon Jarque […]

The post #XMASPANDA contest winners! appeared first on MediaCenter Panda Security.

]]>
Christmas contest

We finally can communicate our #XMASPANDA contest winners.

If you are one of our Twitter winners, send us a Direct Message. Then if you are the one from Facebook , you can send us a Private Message too.

We need the following details:

  1. Name
  2. Address
  3. Mobile Phone
  4. Email Address

Panda Mobile Security License

  • Ramon Jarque Anton
  • Diana de Felipe Tenorio
  • Adrian Aguilera Quesada
  • Robert Mcdonald
  • Liz Schneider
  • Carol Foxx
  • Rob Diggle
  • Aleksey Apasov
  • Tomas Domingo Catalan
  • Francisco Dominguez Moreno
  • @javiermargarit
  • @nabil_freedom
  • @markes5d
  • @glenhilts
  • @p_sandhal
  • @_utdfan
  • @mnvikes40
  • @cathleen_ming
  • @avenue25
  • @hilbournetony

Panda Security Cup

  • Jesús Montes
  • Oscar Luis Maiso Pavia
  • David Escobar
  • Gayle L Johnson
  • Paulo Bispo
  • Iñaky Aion
  • Conceiçäo Carvalho
  • Victor Jiménez Rodríguez
  • Jamie RollerGirl Garland
  • Lisa Middleton
  • Joey Harden
  • @mariasedeo1
  • @travellermind1
  • @tannis91
  • @novairt
  • @ilorcisoft
  • @fabin_ferreira
  • @fer_cantillo
  • @iwantyourstuff
  • @dlrcorn

Panda Security Headphones

  • Ele Velasco Sastre
  • Carlos Martinez Rivero
  • Tina Loucks
  • Christine Gordon
  • Brad Belden
  • @carlosdefuentes
  • @elgrangeniofamy
  • @ybarralde
  • @aprilhaddock
  • @gasteiztarrabat

Thanks for taking part of our Christmas contest! :)

* Winners, please, send us your details before 21st January.

The post #XMASPANDA contest winners! appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/panda-security/xmaspanda-contest-winners/feed/ 2
Be careful if you use Linux in your company: It is not immunehttp://www.pandasecurity.com/mediacenter/malware/careful-use-linux-company-immune/ http://www.pandasecurity.com/mediacenter/malware/careful-use-linux-company-immune/#comments Mon, 12 Jan 2015 11:29:43 +0000 http://www.pandasecurity.com/mediacenter/?p=12776 The most common open operating systems are often seen, and not without its reasons, as a good option for companies. Unlike Windows, installation is free or costs very little and they do not need constant upgrading. Another benefit is security. Viruses often target Windows computers and there is no place for them on devices running […]

The post Be careful if you use Linux in your company: It is not immune appeared first on MediaCenter Panda Security.

]]>
linux malware

The most common open operating systems are often seen, and not without its reasons, as a good option for companies. Unlike Windows, installation is free or costs very little and they do not need constant upgrading.

Another benefit is security. Viruses often target Windows computers and there is no place for them on devices running this software. Therefore, many IT departments choose open operating systems. However, despite their many strong points, they are not immune (if anyone thought otherwise).

2014 was not a good year for Linux. During the year, different types of malware and vulnerabilities affecting this software were detected, ending its reputation as unbreachable and giving its followers something else to worry about; from now on, they will have to pay more attention to the security of their computers.

Linux

One of these concerns comes in the form of Turla, malicious software that is also known as Snake or Ouroboros. It is believed to have come from Russia but it has been infecting Windows computers worldwide for years. Recently, a version of this Trojan targeting Linux was also detected.

Turla uses a backdoor to give cyber-criminals access to the computer, as if they were just another user, without needing to use the ‘root’ account (the account that has all rights and permissions). As a result, the restrictions that the operating system puts on this type of entry are bypassed.

Home users, in principle, do not need to worry, but the same does not apply to companies. Those who use the aforementioned malware usually do so for corporate espionage or surveillance, not for stealing credit card numbers.

In addition, X.org, a server on which open-source graphic interfaces can be run (including Linux), is also vulnerable. Several vulnerabilities have been published that make its users an easy target for cybercriminals.

Another security flaw that has been on the operating system for years is Shellshock, which does not affect Windows. The bug lies in the program that parses the open software commands (Bash). When a Linux device connects to an insecure Wi-Fi network, this window allows a Trojan to get into the device without any problems. Fortunately, the security patches released have fixed the hole.

But security flaws and malware are not the only headaches of open operating system users. It is not always easy to get the security patches prepared by developers. Whereas access to modifications to search engines and other important programs is guaranteed, the same does not occur with other components.

Linux-firefox

An example is what happened with Owncloud, an application for storing files online in open format (an alternative to the well-known Dropbox). When installed under Ubuntu, one of the most popular Linux distributions, it did not execute any security updates. The developer had stopped working on the tool, leaving it at the mercy of cyber-criminals.

Something similar happens with other open-source programs that are not widely used or distributed, such as the user interface Manjaro, which has not received any security modification for a long time either.

Do you use Linux at home or on your computer at work?

The post Be careful if you use Linux in your company: It is not immune appeared first on MediaCenter Panda Security.

]]>
http://www.pandasecurity.com/mediacenter/malware/careful-use-linux-company-immune/feed/ 0