Quantcast
Channel: Panda Security Mediacenter
Browsing all 177 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

A new strain of ransomware is on the loose! Watch out!

Our colleagues at PandaLabs have detected a new strain of ransomware: Trj/RansomCrypt.B. Known as CTB-Locker, what is different about this example is that if you pay, you can access all the locked...

View Article



Image may be NSFW.
Clik here to view.

Yet another ransomware variant!

Recently we caught what seems to be a new ransomware variant in our nets. The mail contained a file called “Transferencia devuelta pago erroneo” (translated: “Transfer back erroneous payment”) with the...

View Article

Image may be NSFW.
Clik here to view.

Skype worm reloaded  

Skype worms are not exactly new anymore (unfortunately). Scenario is simply: someone on your friends list got infected and is now sending you a link to a ‘funny image’ or pictures of you. In this...

View Article

Image may be NSFW.
Clik here to view.

New threats for Android phones, how do they work? Beware of your battery!

When buying a smartphone one of the first things we do is choosing an unlock pattern, trusting that by doing this our WhatsApp conversations will be protected from our nosy surroundings. If you are...

View Article

Image may be NSFW.
Clik here to view.

Cyber safety: one of the major companies concerns

I’m sure you have read about Sony’s latest leaks, the cyberattacks to Medias like The New York Times and the chaos created when cybercriminals paralyzed some banks payment networks. Nevertheless there...

View Article


Image may be NSFW.
Clik here to view.

The Pirate Bay has grown clones loaded with malware. Beware!

A few weeks ago, a court in Madrid issued a statement to block access to the home page of ‘The Pirate Bay’ and all associated domains. The court based on the premise of the Spanish “Ley Sinde” to...

View Article

Image may be NSFW.
Clik here to view.

The famous reversible USB could be a ‘malware’ loophole for your devices

Wouldn’t it be nice not having to turn around several times your USB before connecting it to the computer? You won’t remember that feeling, very soon. The new connector Type-C USB, better known as...

View Article

Image may be NSFW.
Clik here to view.

Virus in the name of WhatsApp! Now via email!

Profits are not the only thing brought by the voice calls in WhatsApp. We are sure that some of you are also worried about this. According to RedesZone, this new service has reactivated, and made more...

View Article


Image may be NSFW.
Clik here to view.

‘Macro virus’ are back: threats of the past that will haunt us in the future

Maybe you don’t remember, but in 1999 Melissa was an extremely popular name within cybersecurity. This cyber virus infected more than 100.000 computers in only three days. It was a macro type malware,...

View Article


Image may be NSFW.
Clik here to view.

CryptoLocker: What Is and How to Avoid it

CryptoLocker is a new family of ransomware whose business model (yes, malware is a business to some!) is based on extorting money from users. This continues the trend started by another infamous piece...

View Article

Image may be NSFW.
Clik here to view.

More than 50% of malware for Android is aimed at stealing from you. Keep an...

With the barrage of news about Hacking Team, the massive cyber espionage by governments, and the US intelligence raids, it might seem that cybercriminals are taking a different route compared to your...

View Article

Image may be NSFW.
Clik here to view.

A problem for Human Resources – some CVs can hold your computer at ransom

Just like sending greeting cards by post, physically presenting your CV for a prospective job offer is becoming extinct. The digital world in which we live has rendered the act of traditional post as...

View Article

Image may be NSFW.
Clik here to view.

PandaLabs detected more than 21 million new threats during the second quarter...

PandaLabs, the laboratory set up by Panda Security, has published its quarterly report where it shows the latest statistics on malware and cyberattacks that have been at the forefront of this year’s...

View Article


Image may be NSFW.
Clik here to view.

XcodeGhost: What it Is and How to Avoid it. The Sheen Comes off Apple’s...

In what is a timely reminder that even the largest, and seemingly controlled, companies can face a cyberattack, Apple revealed that its Chinese App Store had been attacked by malware. In what is...

View Article

Image may be NSFW.
Clik here to view.

10 Tips to Avoid Viruses on Halloween

  Halloween is one of the most celebrated holidays, and cybercriminals always want to be part of it. As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch...

View Article


Image may be NSFW.
Clik here to view.

The Most Famous Virus in History: Friday the 13th

Let’s keep remembering and recalling more viruses that have caused the biggest headaches for users. The virus Jerusalem, also known as Friday the 13th, was created in Israel in 1988 to celebrate the...

View Article

Image may be NSFW.
Clik here to view.

2015, the year of Cryptolocker

At the end of 2013 the first signs of what would eventually become one of the most lucrative attacks for cybercriminals were spotted. Cryptolocker is the name of the most popular family of ransomware,...

View Article


Image may be NSFW.
Clik here to view.

All you need to know about the worrying popularity of Malvertising

Every morning, without fail, you log onto your computer and check your emails, read the news, and have a look at your social media accounts. While you do this it is likely that you’ll come across a few...

View Article

Image may be NSFW.
Clik here to view.

Cryptolocker ‘Locky’. How it works

We don’t know if you’ve heard of the new Cryptolocker which is called ‘Locky’… It works as follows: It arrives by mail and the attachment is a Word document with macros. Upon opening the document the...

View Article

Image may be NSFW.
Clik here to view.

Locky malware report

The main objective of the Locky malware is to encrypt certain system files and network drives to coerce the affected user into paying a ransom to recover them. It renames all encrypted document as...

View Article
Browsing all 177 articles
Browse latest View live




Latest Images