Panda Security Mediacenter https://www.pandasecurity.com/en/mediacenter/ All the info about your cybersecurity Wed, 01 May 2024 23:55:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.pandasecurity.com/en/mediacenter/src/uploads/2016/11/cropped-favicon-1-32x32.png Panda Security Mediacenter https://www.pandasecurity.com/en/mediacenter/ 32 32 4 Easy Ways to Find Free Wi-Fi Anywhere You Go https://www.pandasecurity.com/en/mediacenter/free-wifi-connection-anywhere/ https://www.pandasecurity.com/en/mediacenter/free-wifi-connection-anywhere/#respond Wed, 01 May 2024 23:53:29 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31825

Whether you’re a remote worker who thrives in coffee shops or simply need a quick internet fix while you’re out, finding free Wi-Fi can be…

The post 4 Easy Ways to Find Free Wi-Fi Anywhere You Go appeared first on Panda Security Mediacenter.

]]>

Whether you’re a remote worker who thrives in coffee shops or simply need a quick internet fix while you’re out, finding free Wi-Fi can be a lifesaver. It can also be a challenge, especially when traveling to unfamiliar places. The good news is that there are a number of ways you can find a free Wi-Fi connection anywhere.

In this post, we’ll explore a variety of methods, including Wi-Fi finder apps, how to use your phone as a hotspot, using a portable router and more to help you find free Wi-Fi anywhere you go.

1. Find Somewhere With Public Wi-Fi

illustration showing a public place with Wi-Fi

When you’re on the go, free Wi-Fi can make life easier. Here are a few ways to find a free connection:

  • Chain businesses: Many restaurants and hotel chains around the world offer free Wi-Fi for their customers. The login process is usually simple, with a quick login page or occasional ads. Some chains might ask for an email address. It’s best to use a separate email address for these situations to keep your email clean and free from any promotional emails.
    • For example: Apple Store, Macy’s, Best Buy, Target
  • Public establishments: Public libraries are a classic free Wi-Fi resource, but many other shared spaces offer connections as well.
    • For example: Public libraries, metro stations, bus terminals, museums

illustration showing a metro station

  • Find Wi-Fi in your city: Many large cities offer free Wi-Fi within a designated central area. You can check the city’s website or tourism board for the exact location where you can find free Wi-Fi.
    • For example: Malmö, Sweden; Tel Aviv, Israel; New York City, USA; Bangalore, India

Pro tip: Loyalty programs are great ways to connect to free Wi-Fi when password-free connections are not available. Hotels like Hilton give free Wi-Fi to those who sign up for Hilton Honors Rewards, a free service that offers discounts and a points system for members.

2. Use Your Phone as a Hotspot

Illustration showing laptop connected to mobile hotspot

When in doubt, you can always use your phone as a hotspot device (also known as tethering), although this may be a costly choice unless you have an unlimited data plan. Some carriers have restrictions or fees associated with tethering, like only being able to use a certain amount of data, so be sure to check with your provider.

We’ll walk you through how to set up your mobile hotspot for both Android and iPhone. 

Setting up a Wi-Fi hotspot on an Android phone:

Note: We used a Google Pixel 6 Pro for this example.

Step 1: Open your phone’s settings. 

Step 2: Click on Network and Internet.

android settings

Step 3: Click on Hotspot and tethering.

android settings

Step 4: Turn on Wi-Fi hotspot.

android settings

Step 5: Go to your computer’s Wi-Fi settings and find the list of available Wi-Fi networks. You’ll see the mobile hotspot you want to connect to. In this case, we’ll connect to Pixel_5279 on an iMac. 

wifi hotspot on android phone

Step 6: Click on Wi-Fi hotspot on your phone settings, and you’ll see the password. Enter the hotspot password on your computer. 

wifi hotspot on android phone

Step 7: Once you enter the password and click OK, you’ll be connected to the mobile hotspot and all set to browse!

device connected to wifi

Setting up a hotspot on an iPhone:

Step 1: Go to Settings > Cellular. Confirm your Cellular Data is on. If you’re traveling, make sure your Cellular Data is set to Travel.

settings on iphone

Step 2: Navigate back to Settings and click on Personal Hotspot

Step 3: Turn on Allow Others to Join. You’ll also see the Wi-Fi password here to note for the next step.

wifi hotspot on iphone

Step 4: Go to your computer’s Wi-Fi settings and find the list of available Wi-Fi networks. You’ll see the mobile hotspot you want to connect to. In this case, we will connect iPhone 15 Pro Max to an iMac. 

list of available wifi networks

Step 5: Enter the hotspot password and connect your device.

wifi hotspot on iphone

3. Use Wi-Fi Hotspot Apps

illustration showing wifi hotspot apps

While finding free Wi-Fi is great, many question whether the network is safe to join. While we always advise that you use a VPN when accessing free Wi-Fi, you can also download Wi-Fi hotspot apps. These can pinpoint Wi-Fi locations you can connect to, including networks that are hidden from view. The apps can also show you Wi-Fi networks outside your vicinity.

Pro tip: With an app like Instabridge, you can find crowdsourced Wi-Fi connections all in one place. Wi-Fi communities help you connect with others who have been to your locations and rated the Wi-Fi quality. This is a good way to plan ahead if you’ll need Wi-Fi for more than a few hours.

This app offers free Wi-Fi connectivity in just about every city in the world. It contains an interactive map that pinpoints all the hotspots near you. By clicking on the Free Wi-Fi Near Me button, Wifinity will show you how far you are from the nearest Wi-Fi hotspot and how to get there. 

This Wefi app automatically connects your device to the best network in your location. It also contains a map showing Wi-Fi hotspots around you. Wefi delivers up to two times faster data transfer speeds on average than manual Wi-Fi selection.

4. Use a Portable Wi-Fi Router

Illustration showing portable wifi router

Imagine carrying your own internet access wherever you go. A portable Wi-Fi device, also known as a mobile hotspot, is a pocket-sized gadget that creates its own personal Wi-Fi network. 

Unlike relying on finding free public Wi-Fi, a mobile hotspot provides a secure and reliable connection. This is especially helpful in areas with limited or unreliable Wi-Fi availability, like remote locations or during travel. With a portable hotspot, you can connect your laptop, phone or tablet to the internet anytime, anywhere.

Here are a few of the best travel Wi-Fi devices: Tep, Roaming Man, TravelWifi and Google Fi Wireless.

Common Public Wi-Fi Threats

Public Wi-Fi offers a tempting connection to the internet, but it can be a breeding ground for security threats. Before you jump online at the coffee shop, be aware of the potential dangers lurking beneath the surface of that free signal. Here’s a breakdown of some common public Wi-Fi threats:

  • Fake Wi-Fi hotspots: These malicious networks disguise themselves with names that look legitimate, like “Free Airport Wi-Fi” or “Coffee Shop Guest.” You can spot a fake Wi-Fi hotspot if it asks for your credit card information or any other confidential information. If you connect to one, hackers can easily intercept your data, including passwords, emails and even credit card information.
  • Malware: Public Wi-Fi can be a breeding ground for malware, malicious software that can infect your device. Clicking on a suspicious link or downloading an unverified app can unleash a hidden threat. This malware can steal your data, track your activity or even take control of your device.
  • Unsecured connections: Many public Wi-Fi networks lack proper encryption, which scrambles your data as it travels between your device and the internet. Without this encryption, anyone lurking on the network can eavesdrop on your online activity, potentially exposing sensitive information.
  • Phishing attacks: Phishing emails or websites designed to trick you into revealing personal information are more prevalent on public Wi-Fi. Hackers can exploit the unsecured connection to send you emails that appear to be from legitimate sources, like your bank or a social media platform. Clicking on a link or entering your information on these fake websites can compromise your accounts.
  • Unsecure file sharing: Downloading files on public Wi-Fi can be risky. The file itself may be infected with malware, or the download process could be intercepted, exposing your device to vulnerabilities. This is especially true for peer-to-peer (P2P) file sharing, where you connect directly to other users’ devices.

How to Stay Safe on Public Wi-Fi

While public Wi-Fi offers undeniable convenience, it can expose your devices and data to a range of security vulnerabilities. However, by adhering to well-defined security protocols, you can mitigate these risks and utilize public Wi-Fi connections with greater confidence. tips on how to stay safe on public wifi

Tips to stay safe on public Wi-Fi:

  • Use HTTPS sites only
  • Refrain from accessing confidential data (ex. bank account)
  • Give a secondary “spam” email for sign-ups
  • Avoid performing online transactions
  • Cover your keyboard when entering any passwords or credentials
  • Install an antivirus that includes parental controls for kids accessing public Wi-Fi
  • Always make sure paid Wi-Fi is legitimate and use a third-party payment system
  • Keep antivirus up-to-date

Browsing on public Wi-Fi can be risky, but security doesn’t have to be complicated. A VPN encrypts your data like a virtual tunnel, shielding your online activity from prying eyes. Plus, a strong antivirus protects your devices from malware lurking on unsecured networks. 

Download Panda VPN and antivirus for complete peace of mind while you connect on the go.

Free Wi-Fi Connection FAQ

Here are some answers to the most common questions about unlocking the web anywhere you go.

What Is the Difference Between Hotspot and Wi-Fi?

Wi-Fi and hotspots might seem interchangeable, but there’s a key distinction. Wi-Fi is a wireless networking technology that allows devices to connect to the internet. It acts like an invisible bridge between your device and a router or access point, which provides an internet connection.

On the other hand, a hotspot is a device or location that creates a Wi-Fi network. Think of it as a source that broadcasts the Wi-Fi signal. Your phone can use Wi-Fi to connect to a hotspot and access the internet through that connection.

What Is a Wi-Fi Hotspot?

A Wi-Fi hotspot is essentially a location or device that broadcasts a Wi-Fi signal, providing internet access to nearby devices equipped with Wi-Fi capabilities. For example, Wi-Fi at a coffee shop, public library and airports are all considered Wi-Fi hotspots.

Can I Get Free Wi-Fi at home?

Yes, you can get free Wi-Fi at home, but it can be a bit tricky. While options like using your phone’s data as a hotspot or finding open networks exist, they have drawbacks like data limitations or security risks. For reliable and secure internet access, a traditional home internet plan might be a better solution in the long run.

list of ways to find Wi-Fi wherever you go

 

The post 4 Easy Ways to Find Free Wi-Fi Anywhere You Go appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/free-wifi-connection-anywhere/feed/ 0
PGP Encryption: The Email Security Standard https://www.pandasecurity.com/en/mediacenter/pgp-encryption/ https://www.pandasecurity.com/en/mediacenter/pgp-encryption/#respond Tue, 30 Apr 2024 20:16:08 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29567 Cybersecurity IT engineer protecting network against cyberattack

Are you OK with a stranger reading your emails? Most people would answer that question with a resounding “no” — but unfortunately, in this modern…

The post PGP Encryption: The Email Security Standard appeared first on Panda Security Mediacenter.

]]>

Are you OK with a stranger reading your emails?

Most people would answer that question with a resounding “no” — but unfortunately, in this modern technological age, it’s far too easy for cybercriminals to gain access to your email accounts or the messages themselves. To guarantee your information is safe from prying eyes, you need Pretty Good Privacy (PGP) encryption. 

So what is PGP? In short, it is an encryption system that scrambles your data, making it unreadable to anyone who doesn’t have the means of decoding it. By coordinating and sharing virtual keys, email senders and receivers can ensure their information stays private and secure.

In this article, we’ll detail the basics of PGP encryption: what it is, how you can use it and if this technology is right for you.

What Is PGP Encryption?

PGP is an encryption system that’s used to safely send sensitive or private information. First developed in 1991, this technology has become one of the most popular encryption methods on the market due to its security and accessibility.

PGP encryption is most commonly used for sending and receiving confidential emails. Cybercriminals can easily intercept messages and access email accounts, and PGP ensures that the user’s information remains secure.

In an age where cyberthreats lurk around every virtual corner, this type of encryption is an essential tool for anyone who wants guaranteed privacy in their digital communications.

How Does PGP Encryption Work?

PGP encryption works by scrambling, or encrypting, a message in a way that makes it unreadable to anyone who lacks the means to decode it. In order to fully understand PGP encryption, we will look at it from a technical perspective and provide a practical analogy.

At a high technical level, PGP encryption protects data by using a combination of public keys, private keys and session keys.

When a user wants to send a private email or message, they’ll encrypt it using the receiver’s public key — an encryption key that’s known to everyone. Once the receiver gets the email, they’ll decrypt it using their private key — an encryption key that is only known by one user. This ensures that the message gets where it needs to go and that the recipient is the only one who can decrypt the message. 

To sum it up, PGP encryption works in a three-step process:

  • Step 1: PGP generates an extremely complex single-use random session key that cannot be guessed.
  • Step 2: This session key is encrypted using the recipient’s public key. This public key is associated with the individual, and they can share it with anyone they wish to receive messages from.
  • Step 3: The sender passes along their session key, and the recipient can use their private key to decrypt and read the message.

Now that we’ve walked through the technical aspects of PGP, let’s look at an analogy to reinforce the concept:

  1. Michael wants to send Beth a private message.
  2. In response, Beth sends Michael an open box (her public key) as well as an open padlock (that only she has the key for).
  3. Michael puts the message in the box, closes it and locks it with the padlock. Now that the padlock has been closed, no one but Beth (the owner of the private key) can open it.
  4. Michael sends the box to Beth, who opens it with her private key.

As you can see, with PGP encryption, Michael won’t have to worry about the box getting lost or stolen in transit because only Beth has the means to open the lock.

At the end of the day, that’s what makes PGP encryption so secure — and also why it’s critical you don’t lose or share your private key if you’re sending encrypted files regularly.

PGP encryption process

How to Use PGP Encryption

You can use PGP encryption wherever you need an assurance of technological privacy. That said, the three most popular ways of using it are email and file encryption and digital signature verification.

Encrypting Emails

Email messaging has become one of the most common ways of exchanging information, but this communication method comes with risks. Both email accounts and the messages themselves can easily be intercepted by cybercriminals and other unauthorized individuals, leading to potential data leaks. 

PGP encryption solves this problem by engaging in the secure information exchange process we outlined above. Protecting emails is the most common reason people use PGP encryption. Here’s what it looks like in action:

PGP encryption process

Encrypting Files

Because the complexity of the PGP algorithm makes it virtually unbreakable, this encryption method is also useful for securing personal files.

Individuals can use PGP to encrypt files on their computer, flash drive, external hard drive or other storage devices. Paired with threat detection and response tools, PGP file encryption helps keep your personal information private.

Digital Signature Verification

Through PGP, individuals can also ensure the authenticity of electronic documents by verifying the identity of the sender and confirming that the information in the message has not been tampered with.

These digital signatures work by generating and encrypting a hash of the message, or a fixed block of data, when it is sent. The recipient of the message can access this data through the use of public and private keys, and they will be able to see if the message has been altered or otherwise manipulated.

uses of PGP encryption

Is PGP Encryption Right for You?

PGP encryption is a powerful tool, but is it right for you? Below, we highlight the pros and cons of this technology.

Pros Cons
Unbreakable encryption Software can be complex
Enhances cloud security Requires training
Cheap and free options Not anonymous

Pros of PGP Encryption

PGP encryption is a popular method to keep information secure — and for good reason. A few of the top benefits of this technology include:

  • Unbreakable algorithm: PGP’s algorithm is virtually unbreakable, meaning your communications, files and other information is guaranteed to be safe from unauthorized users. 
  • Enhanced security: Consistently using PGP in communications will enhance cloud security, leading to a more secure online experience for individuals and businesses.
  • Inexpensive: PGP software is affordable, with a multitude of cheap yet effective options on the market.

Cons of PGP Encryption

While this technology is extremely effective, there are still a few downsides users should be aware of. A few of the cons of PGP encryption include:

  • Complex: PGP encryption is a complicated software that can be difficult and time-consuming to learn.
  • Requires training: To guarantee security, all users must safeguard their private keys. If an individual misplaces or accidentally gives away this information, there is real potential for security breaches and exposed information.
  • Can’t be anonymous: All senders and recipients of information sent with PGP can be traced, meaning there is no ability for anonymity with this encryption method.

How to Set Up PGP Encryption

Now that you’re an expert on PGP, you may have decided to use the technology in your communications going forward. Luckily, setting up and using PGP is an easy process.

Choosing a PGP Provider

The first step is to select a PGP provider. There are plenty on the market — both free and paid options — that are compatible with Windows, Mac, Linux, iOS and more. OpenPGP and Gpg4win are two free options with good reviews. Alternatively, you can sign up for an email platform that utilizes PGP or install a PGP browser extension.

Setting Up PGP

Once you’ve downloaded the software, you will generate your public and private keys directly from the platform. From there, your email client will have a new option to easily encrypt the email message — and with that, you’ll be communicating securely with PGP.

PGP Encryption FAQ

Finally, we will wrap up with a few frequently asked questions about PGP encryption.

Is PGP Encryption Still Used?

Yes, PGP encryption is still used today. In fact, it is one of the most popular security methods when sending sensitive information over email.

What Is a PGP Key?

PGP keys come in three forms: public, private and session. The session key is a massive number that cannot be guessed, which is then encrypted by the public key. The private key decrypts the PGP-encrypted message once it has been delivered.

How Do I Get a PGP Key?

PGP keys can be generated using PGP encryption software. If you don’t want to download a program, some email platforms support PGP and can generate keys for you.

How Secure Is PGP?

PGP is very secure. PGP encryption is an extremely complex algorithm that cannot be cracked, guaranteeing the safety of your data, email communication and other information.

Is PGP Better Than AES?

PGP is just as effective as AES (Advanced Encryption Standard), and which one you choose depends on your preferences. The main difference is that AES uses the same key to encrypt and decrypt, while PGP uses two different keys.

Panda Security Can Help With Online Privacy

PGP encryption is a powerful tool you can use to protect emails, personal files and other sensitive information. That said, online privacy doesn’t start and end with PGP — to achieve comprehensive security, you need to make sure your devices and networks are safe.

At Panda Security, we have a variety of tools such as password managers, antivirus tools and dark web scanners to ensure you stay safe no matter where you virtually visit. Let us help you on your tech journey today.

The post PGP Encryption: The Email Security Standard appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/pgp-encryption/feed/ 0
Hackers outsmart smart locks https://www.pandasecurity.com/en/mediacenter/hackers-outsmart-smart-locks/ https://www.pandasecurity.com/en/mediacenter/hackers-outsmart-smart-locks/#respond Fri, 26 Apr 2024 10:26:51 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31860 hackers-outsmart-smart-locks

A group of security researchers has uncovered a concerning security flaw in certain hotel keycard systems. Nicknamed ‘Unsaflok’, their technique uses vulnerabilities in a specific…

The post Hackers outsmart smart locks appeared first on Panda Security Mediacenter.

]]>

A group of security researchers has uncovered a concerning security flaw in certain hotel keycard systems. Nicknamed ‘Unsaflok’, their technique uses vulnerabilities in a specific brand of RFID-based keycard locks commonly used in hotels worldwide to ‘trick’ a smartlock into opening for an unauthorized user. Exploiting this security weakness means that anyone with the right equipment could break in and rob hotel guests.

How does the hack work?

The Unsaflok technique exploits weaknesses in encryption protocols and RFID technology used by these keycard systems. By obtaining any keycard from a target hotel and using a relatively affordable RFID read-write device, hackers create two keycards. Tapping the first card overwrites certain settings stored in the target lock itself. The second then unlocks the door, allowing the hacker to gain access. Shockingly, this process takes less than 30 seconds.

Even more concerning is that the compromised cards will also unlock the door’s deadbolt.

Am I in danger?

Clearly this is a serious problem, particularly when you realize that the affected locks are installed on millions of hotel room doors across the world. The security of guest rooms, hotel property, and guest safety could be threatened. And all it takes is two taps of compromised keycards.

The hacking group who ‘discovered’ this technique have chosen not to publicly disclose full details of the exploit. Instead they have worked with the manufacturer of the affected door locks to develop a fix which has proven to be effective.

There is one potential problem however – every single door lock must be visited and updated. Each affected hotel will also need to upgrade their keycard management system software.

While the manufacturer is actively working on mitigating these vulnerabilities, only a fraction of installed systems have been updated. Hotels and their guests continue to be at risk until the updates have been rolled out.

How can I protect myself against Unsaflok?

Whenever you check into a hotel for the first time, take a look at the lock on your door. If there is a wavy line across the round RFID reader, the lock may be vulnerable. You may also consider using a security tool like the NFC Taginfo app which can “read” your keycard and identify if it is still vulnerable to Unsaflok-like attacks. 

You should also follow the usual precautionary measures such as securing valuables in the hotel safe. When you are inside your room, use any additional door locks and chains if they are provided. And if your keycard is lost or stolen, report the incident to hotel reception as soon as possible.

The Unsaflok revelation serves as a reminder of the evolving nature of cybersecurity threats. It should also remind travelers of the importance of remaining vigilant to avoid becoming the victim of crime.

Read also: Data Privacy: A Guide for Individuals & Families

The post Hackers outsmart smart locks appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/hackers-outsmart-smart-locks/feed/ 0
Is the UK about to ban ransomware payments? https://www.pandasecurity.com/en/mediacenter/is-the-uk-about-to-ban-ransomware-payments/ https://www.pandasecurity.com/en/mediacenter/is-the-uk-about-to-ban-ransomware-payments/#respond Fri, 19 Apr 2024 12:28:53 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31820 is-the-uk-about-to-ban-ransomware-payments

A British cybersecurity expert has called for a ban on ransomware payments to hackers. In an article for The Times, Ciaran Martin, former CEO of…

The post Is the UK about to ban ransomware payments? appeared first on Panda Security Mediacenter.

]]>

A British cybersecurity expert has called for a ban on ransomware payments to hackers. In an article for The Times, Ciaran Martin, former CEO of the UK’s National Cyber Security Centre (NCSC), has called for the government to outlaw the practice.

Under Martin’s proposal, ransom payments would be made illegal. Any businesses making a payment to ransomware scammers would be prosecuted.

Why should ransom payments be made illegal?

Ransomware is one of the most significant cybersecurity threats today. According to one report, more than $1bn was paid in ransoms in 2023 – and they expect that figure to rise again this year. For hackers, ransomware is a cheap, easy way to generate a lot of money – fast.

Seeing so many ransoms being paid encourages other cybercriminals to launch their own digital extortion campaigns. But Martin believes that if businesses are banned from making payments, financially-motivated ransomware attacks will stop because criminals will no longer be able to receive payment.

As one threat analyst commented, “For as long as ransomware payments remain lawful, cybercriminals will do whatever it takes to collect them. The only solution is to financially disincentivize attacks by completely prohibiting the payment of demands. At this point, a ban is the only approach that is likely to work.”

With no way to pay, and no prospect of receiving payment, criminals will stop using ransomware.

Does everyone agree?

Official UK government advice already states that victims should not pay any ransoms. But the reality is that many businesses could collapse if they are unable to access their IT systems. There is an implicit understanding that in some cases, paying a ransom is the only way out of the situation.

Experts believe that making it illegal to pay ransoms will simply accelerate this trend, bankrupting victims who have no other way of recovering their data. It will take time for new laws to take effect. And ransomware attacks are likely to continue for some time afterwards.

Other sources suggest that victims will simply continue to pay ransoms illegally. Should this happen, both victim and attacker become criminals. Any company paying an illegal ransom also opens themselves to becoming a target for blackmail.

Will anything change?

For the moment, no. Facing pressure from those for and against banning ransom payments, the UK government does not currently have any plans to address the situation in law. It is also worth noting that any such ban would only apply to British companies. Leaving ransomware criminals to target organizations anywhere else.

However, should one nation take a step towards banning ransom payments, it is likely that others follow. Stamping out cybercrime will take coordinated cooperation, but we have seen in the recent past that it can be made to work.

Whether ransom payments are outlawed or not, our advice remains the same. Always ensure that all your devices are properly protected with an antimalware solution like Panda Dome.

The post Is the UK about to ban ransomware payments? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/is-the-uk-about-to-ban-ransomware-payments/feed/ 0
What is the U.S. Cyber Trust Mark? https://www.pandasecurity.com/en/mediacenter/what-is-the-us-cyber-trust-mark/ https://www.pandasecurity.com/en/mediacenter/what-is-the-us-cyber-trust-mark/#respond Wed, 17 Apr 2024 07:46:33 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31815 what-is-the-us-cyber-trust-mark

Consumers in the U.S. will soon see IoT devices sold with a strange little logo on the box called the U.S. Cyber Trust Mark. The…

The post What is the U.S. Cyber Trust Mark? appeared first on Panda Security Mediacenter.

]]>

Consumers in the U.S. will soon see IoT devices sold with a strange little logo on the box called the U.S. Cyber Trust Mark. The label will be the equivalent of the Energy Star logo but for cybersecurity-conscious customers. It will be in the shape of a midlevel shield with a string of connected squares on it.  

While the Energy Star logo gives confidence to buyers who care about the environment, the U.S. Cyber Trust Mark will aim to provide the same peace of mind for tech junkies who want to make sure that the products they buy are built to the highest cyber security standards. 

The need for trustworthy products

Differentiating trustworthy products in the marketplace has never been more critical. As experts believe there will be approximately 30 billion connected devices globally by the end of this decade.

Implementation and standards

The first logo appearances will be on wireless consumer IoT products that meet the program’s cybersecurity standards. Also will be accompanied by a QR code explaining the details of the security of the product they are purchasing. 

Connected devices that have met the robust FCC cyber security standards will proudly display the U.S. Cyber Trust Mark on their packaging, with the first logo sightings expected this year. The government hopes this will protect hard-working families from buying products that are not cyber-secure enough. 

Government initiatives and industry participation

The new label program encourages large manufacturers of connected devices, retailers, and federal partners to take advantage of the new logo and proudly display it on products that meet FCC’s cyber security standards. The logo display is voluntary. But the FCC hopes that with time, more and more consumers will demand it from manufacturers. And the program will get mass adoption. Compliance testing, which would allow manufacturers to legally include the cyber security logo on products, will be done by accredited labs.

Combatting Cyber Threats

Over the last few years, many high-profile attacks have come from armies of unsecured IoT devices. Mainly consisting of compromised home security cameras, WiFi routers, fitness trackers, and other connected devices released to consumers with cyber security holes and inadequate tech support. 

Hackers use IoT botnets of infected devices to launch DDoS attacks that often disrupt federal and private business organizations. In most cases, consumers don’t even know that the products they use at home or work are infected.  And part of bot armies terrorizing different targets worldwide. 

The U.S. government hopes that the new logo and companies’ efforts to obtain it will tackle botnets and decrease the number of devices with weak cyber security reaching the hands of U.S. consumers.

Read also: Cybersecurity survey: 36% of Europeans don’t even have an IoT device

The post What is the U.S. Cyber Trust Mark? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/what-is-the-us-cyber-trust-mark/feed/ 0
How to Remove Malware From a Mac or PC https://www.pandasecurity.com/en/mediacenter/malware-removal/ https://www.pandasecurity.com/en/mediacenter/malware-removal/#comments Tue, 16 Apr 2024 18:07:14 +0000 https://www.pandasecurity.com/en/mediacenter/?p=24347 How to Remove Malware From a Mac or PC

To remove malware from a PC or Mac, follow these steps: 1. Disconnect from the internet. 2. Boot your computer in safe mode. 3. Delete…

The post How to Remove Malware From a Mac or PC appeared first on Panda Security Mediacenter.

]]>

To remove malware from a PC or Mac, follow these steps:

1. Disconnect from the internet.
2. Boot your computer in safe mode.
3. Delete temporary files.
4. Check activity monitor for suspicious programs.
5. Run a malware scan.
6. Repair your web browser.
7. Clear your cache.

Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC of malware. 

graphic of computer with bugs on screen

If you think your PC or Mac has a malware infection, follow the steps below to remove it.

Table of contents:

  • How to Remove Malware From a Mac
  • How to Remove Malware From a PC
  • What Is Malware?
  • How Your Devices Become Infected With Malware
  • What If Malware Removal Doesn’t Work?
  • How to Protect Your Devices From Malware
  • Malware Removal FAQ

How to Remove Malware From a Mac 

Step 1: Disconnect From Wi-Fi 

Before you do anything else on your Mac, you must disconnect from Wi-Fi to keep it from transmitting any of your information back to the malware server or infecting other devices. 

To do so, click the Wi-Fi symbol in the top right corner of the screen and toggle the Wi-Fi switch to off.

If you need to go online to download a tool, immediately disconnect once it finishes and stay offline from that point forward. It may help to print these instructions before disconnecting. 

screenshot showing PC is disconnected from Wi-Fi

Step 2: Engage Safe Mode 

Isolate any issues with your Mac by entering safe mode. Do this by starting or restarting your device, then immediately hold the shift key. The Apple logo should appear on your screen. If this doesn’t work, defer to Apple support

Step 3: Refrain From Logging Into Accounts 

Many forms of malware aim to access your sensitive information. They do this by poaching your login credentials after tracking your keystrokes or lifting your password from your screen or clipboard. Prevent losing any login info by avoiding logging in at all. 

Step 4: Delete Temporary Files

Before you erase temporary files that may have been installed by malware, close any apps you have open by right-clicking them and selecting “Quit.”

Step 1: Open Finder from the dock.

Step 2: From Finder, select Go in the top bar, then Go to Folder.

Step 3: In the Go to Folder box, type or copy and paste ~/Library/ and open the Library.

Step 4: Go to the Caches folder.

Step 5: Select all cache files by pressing Command + A, then right-click and Move to Trash.

Step 6: Empty the trash.

Step-wise instructions showing how to delete temporary files on MAC

Step 5: Check Your Activity Monitor 

If you think you have malicious software on your Mac, then you must find it in the Activity Monitor and stop it. Through the Activity Monitor, you can see all the applications running on your computer and how each one affects its performance. Locate the malicious software and delete it through the Finder. 

Step 1: In Finder, select Applications.

Step 2: Select Utilities

Step 3: Go to the Activity Monitor.

Step 4: Double-click suspicious or unknown applications and then click Quit.

steps showing how to check activity monitor on a Mac

Step 6: Run a Malware Scanner

Now you’re ready to actually cure your Mac of its malware infection. Luckily, running a malware scanner is usually enough to get rid of most standard infections. If you already have an antivirus program on your device, you should download an on-demand malware scanner that’s different from what you’re using for antivirus. 

Download a scanner from a reliable source, such as Panda’s Cloud Cleaner, run it and then install security software that works constantly in the background to protect you from existing and emerging security threats. Programs like Panda’s Antivirus for Mac work great for this. 

Step 7: Fix Your Web Browser 

In many cases, malware will modify the homepage of your internet browser so that it can reinfect your device, show you lots of ads and slow down your browsing. Verify that the homepage address is legitimate and then move on to check your browser for malicious extensions. We cover this in our guide to removing the Chromium Virus, but you can review the basics below. 

Fix your web browser on Safari 

Step 1: In the Safari dropdown menu at the top left of your screen, select Settings.

Step 2: Select Extensions.

Step 3: Find recent suspicious extensions and click Uninstall.

steps showing how to remove extensions on Safari

Fix your web browser on Chrome

Step 1: Click the menu icon on Chrome (three little dots in the top right-hand corner).

Step 2: Hover over Extensions and select Manage Extensions.

Step 3: Locate unknown or suspicious browser extensions and select Remove.

steps showing hot to remove extension on Chrome

Step 8: Clear Your Cache

After you’ve checked your browser’s homepage and removed any suspicious extensions, clear your cache of any downloads that may have infected your computer in the first place. 

Clear your cache on Safari 

Step 1: Open Safari Settings.

Step 2: Click Privacy

Step 3: Select Manage Website Data

Step 4: Select Remove All.

how to clear your cache on Safari

How to clear your cache on Chrome

Step 1: Go to the menu dropdown on Chrome and click History.

Step 2: Click Clear Browsing Data.

Step 3: In Time Range check All Time

Step 4: Select Clear Data.

how to clear cache on chrome

How to Remove Malware From a PC

Step 1: Disconnect Your PC From the Internet

Before you do anything else, disconnect your PC from the internet so your computer can communicate with the malware server that might be controlling it, and so it can’t transmit any of your personal information it may have collected. If you have to download a tool to help remove the malware, do it quickly and immediately disconnect from the internet when it’s finished. Do your best to stay offline.

PC disconnected from Wi-Fi

Step 2: Enter Safe Mode 

Isolate any issues with your PC by rebooting it in safe mode. This allows your computer to perform checks while it runs on the minimum number of programs it needs to operate. 

Step 1: Restart your PC.

Step 2: When you see the sign-in screen, hold down the Shift key and select PowerRestart.

Step 3: After your PC restarts, go to the Choose an option screen and select Troubleshoot, then Advanced Options and then Startup Settings.

Step 4: On the next screen, click Restart and wait for the next screen to load.

Step 5: A menu will appear with numbered startup options. Select number 4 or F4 to start your PC in safe mode.

Step 3: Refrain From Logging Into Accounts 

The goal of many forms of malware is to gain access to your sensitive information. They do this by poaching your login credentials by tracking your keystrokes or lifting your password from your screen or clipboard. Prevent the loss of any login info by avoiding logging in at all. 

Step 4: Delete Temporary Files

Speed up your scan for viruses and free up some disc space by deleting temporary files. 

Step 1: Search for the Disk Cleanup app and run it.

Step 2: Select the drive you want to clean up.

Step 3: Click Clean up system files to select the file types you want to delete.

how to delete temporary files on PC

Step 5: Check Your Task Manager 

If you think you have malicious software on your PC, then you need to find it in the Activity Monitor and stop it from running. Through the Activity Monitor, you can see all of the applications running on your computer and how each one affects its performance.

Step 1: Go to your search bar and type in Task Manager to find the app.

Step 2: Locate unknown or suspicious apps under Processes.

Step 3: Right-click on the apps you want to close and select End task.

how to check task manager on a PC

Step 6: Run a Malware Scanner

Now you’re ready to actually cure your PC of its malware infection. Luckily, running a malware scanner is usually enough to rid your computer of standard infections. If you already have an antivirus program on your device, you should download an on-demand malware scanner on top of what you’re using for antivirus. 

Download a scanner from a reliable source, such as Panda’s Cloud Cleaner, run it, and then install security software that works constantly in the background and protects you against existing and emerging security threats. Programs like Panda’s Antivirus for PC work great for this. 

Step 7: Fix Your Web Browser 

If you’ve been infected with malware, it may try to modify your internet browser so that it can reinfect your device, show you pop-up ads and slow down your browsing. Check that the homepage address is the right one, and then move on to check your internet browser for malicious extensions. We covered this before in our guide to removing the Chromium Virus, but you can review the basics below:

How to fix your web browser on Google Chrome

Step 1: In the Chrome menu, select Manage Extensions.

Step 2: Remove suspicious or unknown extensions. 

Step 3: Locate unknown or suspicious browser extensions suspicious and select Remove.

How to remove extension on Chrome

Step 8: Clear Your Cache

How to clear your cache on Chrome

Step 1: Go to the menu dropdown on Chrome and click History.

Step 2: Click Clear Browsing Data.

Step 3: In Time Range check All Time.

Step 4: Select Clear Data.

how to clear your cache on a PC

What Is Malware?

Malware (short for malicious software) can manifest in various forms: spyware, legitimate programs bundled with viruses, backdoors, worms, adware, ransomware, trojans and more. No matter what form it takes, malware aims to profit from your misfortune, either by stealing your personal information and selling it on the dark web or by encrypting your data, locking you out until you pay a ransom to regain access. 

Malware can find its way onto your devices — both PCs and Macs are vulnerable — in several ways, potentially exposing your social security numbers, debit and credit card information, login information, and bank account data. This is why being able to recognize the symptoms of an infected device is vital to protecting your personally identifiable information and fending off identity theft

How Your Devices Become Infected With Malware

So how does malware infect a computer? There are plenty of ways to fall victim to a malware infection. Sometimes it can be as simple as visiting a malicious website or clicking a fake link in an email scam. Oftentimes, these infection attempts will try to instill a sense of urgency to install software or download a file containing a hidden virus. Be sure to exercise caution online and be wary of clicking any unfamiliar links or emails. 

Malware can infect both Macs and PCs. Although PCs are more commonly known for this vulnerability, Macs can be just as susceptible. No matter which type of device you have, it’s important to be aware of the threat of malware.

If your Mac or PC has malware, it may show symptoms such as:

  • Slower than usual performance
  • A tool or plug-in in your browser that you didn’t install 
  • Pop-up ads that are hard to close, contain offensive content, or are generally annoying, even outside your internet browser
  • General out-of-the-ordinary function 

What If Malware Removal Doesn’t Work?

Sometimes malware infections can be present even after all these steps. If you believe your device is still infected, you’ll need to completely wipe your hard drive and reinstall your operating system. Before doing this, it’s a good idea to consult the Apple or Microsoft support teams to ensure you take the correct steps. 

How to Protect Your Devices From Malware

Developing a keen eye for suspicious activity online is the best way to protect yourself and your devices from a malware infection or other viruses. There are already plenty of ways that malware can find its way onto your computer, and there are more types of malware being created all the time. Some best practices to defend your computer and your information against a breach are:

  • Create stronger passwords 
  • Delete files from your downloads and trash often 
  • Update your operating system and applications when prompted 
  • Avoid suspicious emails, links and websites
  • Upgrade your antivirus 

Malware is a threat to any device connected to the internet and hackers are getting more creative with how they infect them. Exercising your best judgment online, knowing the signs of a malware infection and acting quickly when you think your device is infected are some of the best ways to protect your information online in addition to strong malware detection and antivirus software. Be sure to check out how Panda Security helps protect your devices and your information online with great tools like free antivirus software.  

Malware Removal FAQ

Still have questions about how to tackle a malware infection? Keep reading for answers to common questions.

What Is the Best Way to Remove Malware for Free?

To remove malware for free, start by downloading and running a free malware scanner. If it can’t detect a virus, you’ll have to remove it yourself. To do so, delete suspicious applications and extensions, clear your cache and erase temporary files from your device. 

Can Malware Be Deleted?

If malware can be detected, it can often be deleted using the steps listed in this article. In rare cases, you may need to wipe your hard drive and reinstall your operating system to rid your device of viruses. 

What Should Be Used to Remove Malware?

Malware can be removed by deleting suspicious programs, files, extensions or applications that may have infected your computer. You can also use a malware scanner to locate and remove certain viruses. 

How Do I Check for Malware?

To check for malware, disconnect from the internet and search your computer for any programs, applications or browser extensions you don’t recognize. If nothing turns up, install and run a safe, reliable malware scanner. 

Sources:

PC Mag I PC World I MalwareTips I Apple

 

The post How to Remove Malware From a Mac or PC appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/malware-removal/feed/ 2
What Is a DDoS Attack? DDoS Meaning + 5 Prevention Tips https://www.pandasecurity.com/en/mediacenter/ddos/ https://www.pandasecurity.com/en/mediacenter/ddos/#respond Mon, 15 Apr 2024 17:19:15 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29025 Women sitting in a dark room while typing on a computer.

A distributed denial-of-service (DDoS) attack is like a digital traffic jam aimed at a website. Attackers flood the site with junk internet traffic, overwhelming it…

The post What Is a DDoS Attack? DDoS Meaning + 5 Prevention Tips appeared first on Panda Security Mediacenter.

]]>

A distributed denial-of-service (DDoS) attack is like a digital traffic jam aimed at a website. Attackers flood the site with junk internet traffic, overwhelming it and making it slow or inaccessible to real users.

In today’s interconnected digital world, distributed denial-of-service (DDoS) attacks pose a serious threat to online services and businesses, disrupting operations and causing significant financial losses.

By understanding DDoS attacks and learning about effective mitigation strategies, you can better protect your online assets and ensure the uninterrupted availability of your services. 

In this post, we’ll explore the insidious nature of DDoS attacks, how they work and learn some prevention tips to stay safe.

What Is a DDoS Attack?

A DDoS attack is a malicious attempt to shut down a website or online service. The attacker does this by flooding the target with a massive amount of internet requests, like fake website visits or data downloads. 

These requests come from a network of hacked devices controlled by the attacker, making them appear like legitimate traffic and difficult to distinguish from real users. This overwhelming flood of requests jams the target’s system, preventing real users from accessing the website or service.

Think of it like a mall on a busy shopping day. Normally, the mall can handle the crowd of shoppers coming in and out of the stores. But if a group of people decide to target one specific store at the same time and overwhelm the entrance with shopping carts, deliveries and fake purchase orders, that store would be unable to function properly and serve its real customers.

How Does a DDoS Attack Work?

DDoS attacks cripple websites and services by leveraging a massive army of compromised devices. Unlike a denial-of-service (DoS) attack that floods a target with traffic from a single source, a DDoS attack utilizes a botnet — a network of hacked devices secretly controlled by the attacker.


    
    Illustration depicting DoS vs. DDos attacks

These devices, ranging from computers to smartphones, become the attacker’s “soldiers” and bombard the target with requests simultaneously. This distributed assault overwhelms the target system’s capacity, preventing real users from accessing the website or service.

How to Identify a DDoS Attack

If your website is slow, unresponsive or even crashes entirely, it might be under a DDoS attack! Here are some red flags to watch out for:

  • Slow upload or download speeds
  • Unavailable websites
  • Lost internet connections
  • Pop-up ads or unusual media
  • Excessive spam
  • Traffic originating from a single IP address
  • A surge in requests to a single page
  • Spikes of traffic at odd hours of the day

Each type of attack has more specific signs, but these common DDoS attack symptoms could alert you to an attack before it’s in full force.


    
    Illustration depicting DoS vs. DDos attacks

Many of these distributed denial-of-service attacks are also difficult to prevent, identify and mitigate. DDoS attackers avoid detection in a number of ways, particularly by:

  • Spoofing: Spoofing — including DNS spoofing — is when an attacker replicates source addresses and sends legitimate traffic to illegitimate sites or destinations.
  • Reflecting: Reflecting refers to when an attacker changes the normal behavior of internet services to hide their malicious actions.
  • Amplifying: Amplifying is when an attacker uses a source modifier to create large amounts of traffic that can then overwhelm a network or server.

Types of DDoS Attacks 

According to the open systems interconnection (OSI) model, a network has seven different connection layers that help networks communicate with each other. Because these layers individually determine the behaviors, tools and techniques needed to invade it, each type of DDoS attack is classified based on the layers it targets and the behaviors it needs to replicate.

Application Layer Attacks

Application layer attacks target vulnerabilities within the software applications running on a system, bypassing network security measures. Unlike network attacks that disrupt overall traffic flow, these attacks exploit weaknesses in the code itself. This can involve manipulating databases (SQL injection) or injecting malicious scripts (XSS) to steal data, disrupt functionality or compromise user devices.


    
    Example of application layer attack

Protocol or Network Layer Attacks

Protocol attacks, also called network layer attacks, usually target levels three and four of a network’s communication system. Networks have communication protocols, like a highway with lanes and traffic lights. Hackers exploit weaknesses in these protocols to disrupt communication.

These attacks overwhelm the capacity of the resources in these layers, like firewalls, which causes a state of exhaustion to overtake the system. SYN floods and smurf attacks are examples of protocol attacks that target the third or fourth OSI layers.


    
    Example of a protocol layer attack

Volumetric Attacks

Volumetric attacks attempt to overwhelm a network and its connection to the internet. Attackers will amplify data and other communication requests to the extent that a system is unable to operate successfully. DNS attacks, including DNS amplification attacks, are commonly used to increase the volume of traffic for volumetric attacks.


    
    Example of a volumetric attack

Each of these types of DDoS attacks can be broken down further based on the duration of the attack:

  • Long-term attacks: A long-term DDoS attack is any attack that lasts hours, days, weeks, months or longer.
  • Burst attacks: A burst DDoS attack will usually only last a few seconds to a few minutes.

No matter how long an attack lasts, the damage can be crippling to each targeted connection layer.


Preventing a DDoS Attack

While there is no one-stop shop for DDoS protection, there are a few ways you can prepare your systems for a potential attack. Being aware of the possibility of a DDoS attack is the first step, and these five tips are the next best ways to prevent a possible system attack.

1. Vulnerability Assessments 

If you run an organization with an information and security infrastructure system, it’s important to perform regular vulnerability assessments. In addition to simply finding system vulnerabilities, a vulnerability assessment can also document these findings and provide guidance for threat solutions. Penetration tests are also recommended, and white hat hackers can be hired to help run these tests and find and alert you to possible weaknesses or entry points.  

2. Black Hole Routing

Black hole routing is a more extreme prevention and protection tactic. If you have reason to assume that you may fall victim to a DDoS attack, a black hole route can send all of your traffic on a neutral route away from your systems. This will remove all legitimate traffic — both good and bad — which can lead to business loss. 

3. Rate Limiting

Rate limiting is one way to prevent or mitigate a DDoS attack. This lowers the number of requests a server can accept based on a specific timeframe, which can stop a DDoS attack from damaging or overtaking your systems. While this prevention tactic may not work for all attacks, it can reduce the damage one may cause. 

4. Network Diffusion

Instead of allowing a DDoS attack to overwhelm and take over a network, network diffusion disperses traffic between a variety of distributed servers so it is absorbed by the network itself. This spreads the distributed denial-of-service attack’s impact so it becomes manageable instead of destructive. 

5. Firewalls

In the event of a seven-layer DDoS attack, it’s important to have a web application firewall in effect. This is a tool that separates the server from the internet and offers an additional layer of security protection from dangerous and overwhelming traffic. Additionally, firewalls can implement custom rules during an attack to better disperse or accept traffic.

While those carrying out a DDoS attack can be sneaky, there are ways to protect your business, your home and yourself. By investing in security protocols, including VPNs and protection plans, you can be prepared for a DDoS attack at any time.

Motives for DDoSing

DDoSing — the term used when someone executes a DDoS attack — can result from a variety of motives. While these motives are different for every hacker, they can range anywhere from political gain to social justice.

  • Hacktivism: Hacktivism is a form of digital activism. Hacktivists usually engage in hacktivism to reach social, political or religious justice, and they often fight for the greater good. Some hackers will use DDoS attacks during a hacktivism campaign. 
  • Cybervandalism: Cybervandalism is a cyberattack that often has no social, political, religious or criminal intentions. Most online vandalism acts are intended to show a hacker’s expertise, and vandals often pay a DDoS-for-hire fee to initiate DDoS booters and IP stressors
  • Cyberwarfare: Unlike cybervandalism, cyberwarfare has political or military intent and is often used to overtake or dismember organizational infrastructures. Many of these types of DDoS attacks are state-sanctioned and can disrupt finances, health care and government security.
  • Extortion: A cybercriminal may demand money or other resources while threatening a DDoS attack. If the victim complies, the attacker may not issue the attack. On the other hand, if the victim does not comply, organizations may be forced to go offline until the threat has passed or been mitigated.
  • Rivalries: DDoS attacks are sometimes used as competition tools for both personal and professional rivalries. These attacks can dissuade people from going to events, shut down online storefronts, cause reputational damage and more.

    
    Illustration showing the motives for DDoS attacks, including hacktivism, cybervandalism, cyberwarfare, extortion, and rivalries.

DDoS and application layer attacks can pose significant threats to websites and online services. By understanding these different attack methods and implementing the recommended security measures, organizations can significantly bolster their defenses. However, cyberthreats are constantly evolving.

Panda Free Antivirus offers comprehensive real-time protection against various online threats, including malware, phishing attempts and even botnet infections. And for an extra layer of security when using public Wi-Fi, consider using Panda Security VPN. It encrypts your internet traffic, making it unreadable to hackers and eavesdroppers, so you can browse safely on any network.

DDoS Attack FAQ

Let’s discuss some common queries related to DDoS attacks. 

What Does DDoS Attack Stand For?

DDoS stands for distributed denial-of-service attack. It’s a malicious attempt to overwhelm a website or online service with a flood of internet traffic, making it unavailable to legitimate users.

What Does a DDoS Attack Look Like?

You might experience a DDoS attack as:

  • Slow or unresponsive websites: The website might take a very long time to load or not load at all.
  • Error messages: You might see error messages about the server being overloaded.
  • Trouble using online services: Online games, streaming platforms, etc. might be difficult to connect to or use.

The post What Is a DDoS Attack? DDoS Meaning + 5 Prevention Tips appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/ddos/feed/ 0
Deepfake pornography explosion https://www.pandasecurity.com/en/mediacenter/deepfake-pornography-explosion/ https://www.pandasecurity.com/en/mediacenter/deepfake-pornography-explosion/#respond Mon, 15 Apr 2024 10:12:28 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31796 deepfake-pornography-explosion

Research conducted by Channel 4 News, a UK nightly news show, has uncovered a massive explosion in deepfake pornography. According to the program, more than…

The post Deepfake pornography explosion appeared first on Panda Security Mediacenter.

]]>

Research conducted by Channel 4 News, a UK nightly news show, has uncovered a massive explosion in deepfake pornography. According to the program, more than 4000 celebrities have had their likenesses used to create pornographic images and videos.

With generative artificial intelligence (AI) tools users are able to ‘map’ faces of well-known celebrities onto existing pornographic videos. This then gives the impression that the celebrity has participated willingly in the films.

What is going on?

As with all new technologies, someone, somewhere is always looking for a way to exploit it. Deepfake videos have been used to recreate concerts by music legends or resurrect long-dead movie stars. But the same technology can be used to create and share illegal content online – such as deepfake pornography.

Channel 4’s investigation into the five most popular deepfake websites discovered that more than 4000 individuals had had their likenesses stolen and reused in fabricated nude images. Of these, 252 were identified as coming from the UK, including female actors, TV stars, musicians and YouTubers.

The program also recounts how in 2016 there was just one deepfake pornography video posted online. In the first three-quarters of 2023, 143,733 new deepfake porn videos were uploaded to the 40 most used deepfake pornography sites – more than in all the previous years combined.

Are deepfakes legal?

Most experts agree that being a victim of deepfake pornography is deeply distressing, humiliating and dehumanizing. Unsurprisingly, governments across the world are working to better combat deepfakes and protect victims. 

In the UK, sharing deepfake porn without the permission of the person depicted is now illegal under the Online Safety Act. However, no one has yet been arrested or prosecuted for doing so. Notably, it is not illegal to create deepfake imagery – it is sharing that content which is banned.

What are the web giants doing about deepfakes?

Most web content hosts are still struggling to meet their obligations regarding detecting and removing deepfake content, but it seems that Google is leading the way. Speaking to Channel 4, a spokesperson said;

“Under our policies, people can have pages that feature this content and include their likeness removed from search. And while this is a technical challenge for search engines, we’re actively developing additional safeguards on Google search – including tools to help people protect themselves at scale, along with ranking improvements to address this content broadly.”

This offers victims some level of protection – but only after the deepfake content has begun circulate online. 

The battle against deepfake content continues to evolve, as does generative artificial intelligence. Legal frameworks like the Online Safety Act do provide some safeguards – and should help to deter some would be pornographers. But with so many different legal standards across the globe, it will remain difficult for service providers to properly police the content being uploaded and viewed by their users.

The post Deepfake pornography explosion appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/deepfake-pornography-explosion/feed/ 0
What Is AES Encryption? A Guide to the Advanced Encryption Standard https://www.pandasecurity.com/en/mediacenter/what-is-aes-encryption/ https://www.pandasecurity.com/en/mediacenter/what-is-aes-encryption/#respond Sun, 14 Apr 2024 18:12:09 +0000 https://www.pandasecurity.com/en/mediacenter/?p=29677 Hand hovering over a lit up lock connected to other icons.

The Advanced Encryption Standard (AES) is an algorithm that uses a strong password (secret key) to scramble your files and messages, making them unreadable to…

The post What Is AES Encryption? A Guide to the Advanced Encryption Standard appeared first on Panda Security Mediacenter.

]]>

The Advanced Encryption Standard (AES) is an algorithm that uses a strong password (secret key) to scramble your files and messages, making them unreadable to anyone who doesn’t have the key.

Whether it be sending and receiving emails, transferring files or simply browsing the web, data transfer exists everywhere in our technological world. 

In an age in which cybercriminals are trying to access that data at every turn, businesses and consumers alike need to be protected — and the first step is to learn what AES encryption is.

AES encryption is an encryption method that has become the industry standard due to its security, ease of use and speed. In this article, we will detail what AES encryption is, how it works and how Panda can equip you with this valuable security method via a VPN and password manager.

What Is AES Encryption?

The Advanced Encryption Standard (AES) is a powerful algorithm established by the U.S. government to electronically secure sensitive data. It utilizes a secret key to scramble information into an unreadable format, rendering it useless without authorized access. 

Widely adopted by the U.S. government, businesses and individuals, AES safeguards critical information during storage or transmission. This ensures confidentiality even if data is intercepted by unauthorized parties.

This method was first conceptualized in 1997 when the National Institute of Standards and Technology (NIST) became vulnerable to brute force attacks and needed a stronger encryption method. NIST enlisted a pair of developers to tackle the problem — Vincent Rijmen and Joan Daemen — who developed the eventually selected technology, AES, in 1998.

AES has been the encryption standard for the NIST since its full-scale adoption in 2002. Overall, there are three main types of AES encryption:

  • AES-128: This method uses a 128-bit key length for encryption and decryption, which results in 10 rounds of encryption with 3.4 x 1038 different potential combinations.
  • AES-192: This method uses a 192-bit key length for encryption and decryption, which results in 12 rounds of encryption with 6.2 x 1057 different potential combinations.
  • AES-256: This method uses a 256-bit key length for encryption and decryption, which results in 14 rounds of encryption with 1.1 x 1077 different potential combinations.
    
    Illustration depicting AES encryption 101.

What Is AES Used For?

Even though AES was first formulated in conjunction with the United States government, this encryption method is now used in both governmental and civilian applications. A few of the most common uses of AES encryption include:

  • VPNs: The job of a virtual private network (VPN) is to provide secure and private online browsing. Since this process connects users to different servers, AES encryption is used to protect user data against leaks and cyberattacks.
  • Password managers: Password managers are used to safely store login credentials under a single master key. Given a single breach could compromise a user’s entire collection of passwords, AES is often used to secure this software.  
  • Wi-Fi: Wireless internet typically uses many encryption methods such as WPA2, and AES can often be found in these connections as well.
  • Mobile apps: Any app that involves messaging or photo sharing typically utilizes AES to aid in data security.
  • Internet browsers: When you visit a website that uses HTTPS, the communication between your browser and the website is encrypted using AES. This protects sensitive information you send or receive, such as credit card details or login credentials, from being intercepted by hackers.
  • Databases: Databases often store confidential information, like medical records or financial data. AES can be used to encrypt this data at rest (when stored on a server) or in transit (when transferred between systems). This ensures that even if someone gains access to the database, they cannot decipher the information without the decryption key.
  • Safeguarding sensitive files: You can use AES to encrypt individual files on your computer or other devices. This is particularly useful for protecting personal information such as documents, photos or financial records. Encryption ensures that even if someone steals your device or gains access to your storage, they cannot access the encrypted files without the decryption key.

How Does AES Work?

No matter the type of AES, the encryption process is similar and can be described in a series of steps:

  • Step 1: Data preparation: AES divides the initial message (plaintext) into fixed-size blocks (typically 128 bits) for efficient processing.
    
    Step 1 of AES encryption: data preparation
  • Step 2: Key expansion: A secret key, crucial for both encryption and decryption, is used to derive a series of unique round keys. This expansion process enhances the overall security of the encryption.
Image showcasing the first step of how AES encryption works
  • Step 3: Transformations: Each data block undergoes multiple rounds of intricate transformations. (The number of rounds depends on the key length.) These rounds aim to thoroughly confuse the data via:

    • SubBytes: A predefined table substitutes each byte in the block with a completely different byte.
    • ShiftRows: The rows of the data block are cyclically shifted to disrupt any patterns.
    • MixColumns: A specific mathematical operation mixes the data within each column, further enhancing obfuscation.

    Step 2 of AES encryption: Key expansion
  • Step 4: Adding round keys: In each round, a different round key (derived from the original secret key) is applied to the data block. This adds another layer of encryption with unique keys for each round.
    
    Step 2 of AES encryption: Key expansion
  • The result: Encrypted data (ciphertext): After all the rounds, the data blocks are transformed into an unreadable form called ciphertext. This ciphertext is what is securely stored or transmitted. Deciphering it requires the corresponding secret key.
    
    Step 2 of AES encryption: Key expansion

Advantages of AES Encryption

AES is the preferred encryption method because it excels in many key performance metrics. A few benefits of AES include:

  • Security: Even the lowest level of AES encryption, AES-128, would take an estimated 1 billion billion years (no, that extra billion isn’t a typo) to crack if using a brute force method. 
  • Cost: AES encryption is available for free, as it was originally developed to be released on a royalty-free basis.
  • Ease of use: The AES algorithm is easy to implement across a multitude of applications and is known for its simplicity and ability to conform across hardware and software platforms.

AES Encryption Attacks

AES is a robust encryption algorithm widely trusted for securing sensitive data. However, no security measure is foolproof, and AES encryption is still susceptible to attacks, including:

  • Side-channel attacks: These attacks exploit weaknesses in the implementation of AES rather than the algorithm itself. They might target information leaks during encryption, such as processing time fluctuations or power consumption. By analyzing these leaks, attackers could potentially glean clues about the secret key.
  • Brute force attacks: This attack involves trying every single possible key combination until the correct one is found.
  • Related-key attacks: These attacks are less common and require a specific scenario in which an attacker has access to multiple sets of data encrypted with related keys. By analyzing the relationships between the ciphertexts, they could theoretically gain insights into the key itself. However, this requires a very specific situation and is not a typical threat for most users.

How to Prevent AES Encryption Attacks

While AES encryption is powerful, a layered security approach is crucial. Here’s how you can minimize the risk of attacks:

  • Create strong passwords: When using AES encryption (often found in disk encryption software or password managers), choose long and complex passwords for your encryption keys. Imagine your key as a gatekeeper — the stronger and more intricate, the harder it is to break in.
  • Software updates matter: Keep your software up-to-date, especially security applications and disk encryption tools. Updates often include patches for vulnerabilities that could be exploited in AES implementations.
  • Secrecy is key: Never share your encryption keys with anyone, and be mindful of where you store them. Avoid keeping them on the same device you’re encrypting. Consider using a password manager with strong security features.
  • Use multi-factor authentication: Implement multi-factor authentication (MFA) whenever possible. MFA adds an extra step to the login process, requiring a second verification factor beyond your password. This makes it significantly harder for attackers to access your encrypted data, even if they obtain your password.

How Does AES Compare to Other Encryption?

While AES is an impressive encryption method, how does it compare to other options available? Here is how AES stacks up against similar systems.

AES vs other encryption methods

AES-128 vs. AES-256

AES-128 and AES-256 may seem like two different systems, but they are simply two variations of the same encryption method. 

AES-128 involves a 128-bit key length in which data goes through 10 rounds of encryption. While this method is extremely secure against brute force attacks, it has the lowest security specs of all AES variations. 

AES-256 involves a 256-bit key length in which data goes through 14 rounds of encryption, and has the highest security specs of all AES variations. 256 is slowly being adopted into everyday use due to continuous advancements in technology.

AES vs. RSA

RSA, or Rivest, Shamir and Adleman, is a type of encryption that uses an asymmetric algorithm to encrypt and decrypt data. This method can be paired with other encryption methods such as PGP encryption to generate a pair of related keys — otherwise known as public and private keys. 

While both algorithms are secure, the main difference between AES and RSA comes down to speed and complexity.

Since AES uses the same key to encrypt and decrypt data, it is more user-friendly, cheaper and more secure against brute force attacks due to the length of the password. RSA, on the other hand, is faster in processing data because the length of the keys are shorter.

Despite their differences, both AES and RSA are reliable methods to encrypt and secure data.

AES vs. DES

DES, or data encryption standard, is the now-outdated encryption method used by government agencies starting in the 1970s.

DES and AES are similar in functionality, but the difference is simply that AES is more efficient and secure. While DES uses a 56-bit key, AES uses 128-, 192-, and 256-bit keys which results in increased security. AES is also faster than DES, resulting in quicker encryption.

Overall, AES has replaced DES in nearly every capacity.

AES Encryption FAQ

Finally, we will wrap up with a few frequently asked questions about AES encryption.

Is AES Symmetric or Asymmetric?

AES is classified as a symmetric encryption algorithm. This means that the same secret key is used for both encrypting and decrypting data. This symmetric approach offers advantages in terms of speed and efficiency, especially when dealing with large data volumes. However, it also necessitates careful key management. Anyone who possesses the secret key can decrypt the data, making it crucial to keep the key secure.

What Is AES 128 vs. 192 vs. 256?

AES 128, 192 and 256 are all variations of the same algorithm, but the difference lies in the key length and rounds of encryption.

AES-128 uses a 128-bit key length for encryption and decryption, which results in 10 rounds of encryption; AES-192 uses a 192-bit key length for encryption and decryption, which results in 12 rounds of encryption; and AES-256 uses a 256-bit key length for encryption and decryption, which results in 14 rounds of encryption.

Is 128-Bit AES Secure?

Yes, 128-bit AES is secure. In fact, if using brute force methods, it would take 1 billion billion years to crack.

Is AES Free to Use?

Yes, AES is free to use. It was originally developed to be released on a royalty-free basis.

Is AES the Best Encryption Method?

The best encryption method for you depends on what’s important for your situation. That said, AES is one of the leading encryption methods on the market, trusted by the National Institute of Standards and Technology since 2002.

Panda Security Can Help With Encryption

AES encryption is an extremely secure and user-friendly algorithm that can protect your most sensitive data. Found in a number of everyday applications, this method is the go-to for defending sensitive data against brute force attacks.

If you want the power of AES encryption in your everyday cyber activity, enlist the help of Panda’s VPN and password manager services to expertly secure your data against cyberthreats.

The post What Is AES Encryption? A Guide to the Advanced Encryption Standard appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/what-is-aes-encryption/feed/ 0
How to Find WiFi Anywhere You Go https://www.pandasecurity.com/en/mediacenter/find-wifi/ https://www.pandasecurity.com/en/mediacenter/find-wifi/#comments Sat, 13 Apr 2024 19:13:08 +0000 https://www.pandasecurity.com/en/mediacenter/?p=22820

Going on a business trip or traveling for the holidays? Read on to discover our complete guide to finding WiFi anywhere you go.

The post How to Find WiFi Anywhere You Go appeared first on Panda Security Mediacenter.

]]>

Finding WiFi in a foreign country can be a hassle. You may be unsure of which WiFi network to choose or give up and switch to LTE, incurring expensive fees. Though WiFi when traveling isn’t a necessity, it does make life a lot easier. That’s why we put together a comprehensive guide on how to find WiFi anywhere you go. From using WiFi hotspot apps to taking advantage of free loyalty programs, there are many ways you can stay connected.

1. Find a Chain Establishment

Maybe you are in a foreign land and need to message a family member or take a last minute business call. Many restaurants and hotel chains around the world offer free WiFi for your convenience. Most of the time, it’s a simple login page with perhaps an ad or two. Some chains ask for an email address — we suggest providing your “spam email” or an unimportant email address.

Retailers

  1. Apple Store
  2. Barnes and Noble
  3. Best Buy
  4. Bloomingdales
  5. Gap Inc.
  6. H&M
  7. IKEA
  8. Lowes
  9. Macy’s
  10. Michaels
  11. Microsoft Store
  12. Nordstrom
  13. Office Depot
  14. Safeway
  15. Sam’s Club
  16. Sephora
  17. Staples
  18. Target
  19. Urban Outfitters
  20. Whole Foods

Restaurants

  1. Applebee’s
  2. Arby’s
  3. Boston Market
  4. Buffalo Wild Wings
  5. Burger King
  6. Chick-Fil-A
  7. Denny’s
  8. Dunkin
  9. Einstein Bros.
  10. Jimmy John’s
  11. Hooters
  12. IHOP
  13. Krispy Kreme
  14. McDonalds
  15. Panera
  16. Peet’s Coffee
  17. Qdoba
  18. Quiznos
  19. Starbucks
  20. Subway
  21. Taco Bell
  22. The Coffee Bean & Tea Leaf
  23. Wendy’s

Hotel Chain

  1. Marriott (free for all rewards members)
  2. Hyatt (free for all guests)
  3. Extended Stay America
  4. Best Western
  5. Comfort Inn
  6. Crowne Plaza Hotels & Resorts
  7. Holiday Inn
  8. Ritz Carlton (free for reward members)
  9. Walt Disney Resorts
  10. Motel 6  

2. Use WiFi Hotspot Apps

While finding free WiFi is great, many question whether the network is safe to join. While we always advise that you use a VPN when accessing free WiFi, you can also download WiFi hotspot apps. These can pinpoint WiFi locations that you can connect to, including networks that are hidden from view. The apps can also show you WiFi networks that are outside your vicinity.

  1. Wiffinity

This app offers free WiFi connectivity in just about every city in the world. It contains an interactive map that pinpoints all the hotspots near you. By clicking on the Free WiFi Near Me button, Wiffinity will show you how far you are from the nearest WiFi hotspot and how to get there. Users can also add WiFi networks that are not in the database.

  1. WifiMapper

This WiFi app stores nearly half a billion WiFi networks in its database. It also can remove all hotspots that have a fee, time limit or require you to register using a filter system. Much like other apps, this app allows users to agree whether the hotspot is free or requires a paid subscription.

  1. Facebook

The Facebook mobile app is an easy way to find quick WiFi if you have already installed the app. To find free internet on the app, open the More menu and then tap Find Wi-Fi. You may need to select See More at the bottom to show it. If you cannot find WiFi networks where you are located, you can select a different area on the map and select Search this area to look there.  

  1. WeFi

This WiFi app automatically connects your device to the best network in your location. It also contains a map where it shows WiFi hotspots around you. WeFi delivers up to two times faster data transfer speeds on average in comparison to manual WiFi selection.

3. Go to a Public Shared Space

Sometimes you might not want to purchase something to gain access to free WiFi. That’s where public shared spaces come in handy. We listed some of the most popular public transit services and museums that offer free WiFi services.

Here are some popular public places that host free WiFi:

  • Most U.S. public libraries
  • US. Metro locations
  • Amtrak
  • Boltbus
  • Megabus
  • Art Institute of Chicago
  • National Mall
  • Museum of Modern Art
  • Louvre (certain hot spots)
  • Byzantine Museum
  • British Museum
  • National Museum of China

4. Rent a Travel WiFi Router

Depending on where you are headed, it may be worth it to rent travel WiFi. Free public WiFi can have slow connection speeds, unreliable security and a plethora of other travelers taking up signal. Mobile hotspots can offer reliable, fast internet that does not cause you to change your cell phone plan or purchase a travel router.

This is best for someone who will need strong, reliable WiFi that keeps data secure. It also charges in less than 3 hours and has about 6 hours of device usage. Renting travel WiFi starts at around $10 a day, but the longer you rent it for, the cheap the rate becomes. You can purchase most travel WiFi devices online.

A few of the best rent travel WiFi devices:

  1. TEP Wireless
  2. Roaming Man
  3. Travel WiFi
  4. Google Project Fi
  5. Keepgo
  6. Always Online Wireless
  7. Skyroam
  8. HooToo
  9. GlocalMe

5. Use Your Internet Service Provider’s Hotspots

One simple way to find travel WiFi? Use your home provider. If you’re a Comcast user, you will have access to Xfinity WiFi networks when traveling. For most ISP networks, check their WiFi page on the main site or download the hotspot app for your ISP. Find a hotspot by entering an address or form of location. Then connect to your ISP’s available hotspots.

Helpful ISP Hotspot pages:

6. Sign Up for a Loyalty Program

Maybe you are in a hotel that does not offer free WiFi or are in a store with a long line and want a quick distraction. Loyalty programs are great ways to connect to free WiFi when password-free connections are not available. Hotels like Hilton give free WiFi for those who sign up for Hilton Honors Rewards, a free service that offers discounts and a points system for members.

7. Use Your Phone As a Hotspot

When in doubt, you can always use your phone as a hotspot device (also known as tethering), although this may be a costly choice unless you have an unlimited data plan. Some carriers have restrictions or fees associated with tethering, like only being able to use a certain amount of data for tethering, so be sure to check with your provider.

Android Tethering

  1. Open Settings and tap the More option under Wireless & Networks.
  2. Tap Tethering & portable hotspot.
  3. Tap Hotspot & tethering and this is where you’ll be able to configure your phone’s WiFi hotspot. You can also change its SSID and password.
  4. Keep the security set to WPA2 PSK.
  5. Click Save.

iPhone Tethering

Note: iPhone must be 3G or later to support tethering.

  1. Go to Settings > General > Network.
  2. Tap the Personal Hotspot option.
  3. Select the WiFi password option to prevent unwanted devices from connecting.

8. Find WiFi in Your City

When you are exploring a new city or on a mission to find a location, internal city WiFi can be a big help. Many large cities around the globe offer free WiFi to those within a certain mile radius of the city’s center. These are some of the best cities on earth to pick up free WiFi.

  • Malmö, Sweden
  • Tel Aviv, Israel
  • NYC, U.S.
  • Seoul, South Korea
  • Bangladore, India
  • Osaka, Japan
  • London, U.K.
  • Dublin, Ireland
  • Paris, France
  • Florence, Italy
  • Vienna, Austria
  • Perth, Australia
  • Barcelona, Spain

9. Join a Community

Lastly, before embarking on your journey, you may want to consider joining a community. With an app like Instabridge, you can find crowdsourced WiFi connections all in one place. WiFi communities help you connect with others who have been to your locations and rated the WiFi quality. This is a good way to plan ahead if you’ll need WiFi for more than a few hours.

10. Connect to a Hidden Network

You can also use tools like NetSpot. Once a hidden network is identified and you’ve located the SSID, type of security used, and password, here’s how you connect to it:

Windows 10

  1. Open Settings.
  2. Choose Network and Internet.
  3. Select WiFi from the left menu.
  4. Choose Manage Known Networks.
  5. Select Add a new network.
  6. Enter the SSID, select the security tape and enter the password.
  7. Select Connect Automatically in order to connect this network whenever available.

Android

  1. Open WiFi application.
  2. Scroll to the bottom of the list and then click on Add WiFi.
  3. Add the WiFi network name from the router.
  4. Then select the encryption type in Security. Ie. WPA, PSKWPA2-PSK.
  5. Enter the password and click connect.

iPhone

  1. Go to Settings > Wi-Fi and toggle Wi-Fi on.
  2. Select Other and enter the SSID in the Name bar.
  3. Select the Security type. Ie. WEP, WPA.
  4. Tap Other Network to return to the previous screen.
  5. Enter the network password in the password field and click Join.

Apple

  1. Click on the WiFi icon at the top right of your screen next to the power icon.
  2. Select Join Other Network near the bottom.
  3. Type in the hidden network SSID in the Network Name field.
  4. Choose the Security type.
  5. Select Remember This Network if you’d like your computer to connect each time.
  6. Click Join.

How to Stay Safe on Public WiFi

As you can see, there are a variety of ways you can find yourself free WiFi. Whether you are on vacation, traveling to see family during the holidays or on a business trip, the internet is essential to stay connected. While public WiFi may be convenient, it’s important to be cautious when connecting. One of the most foolproof ways to stay safe on public WiFi is with a VPN. A VPN encrypts your data, hides your location and allows you to surf the web anonymously.

Other ways to stay safe:

  • Use HTTPS sites only
  • Refrain from accessing confidential data (ex. bank account)
  • Give a secondary “spam” email for sign-ups
  • Avoid performing online transactions
  • Cover your keyboard when entering any passwords or credentials
  • Install an antivirus that includes parental controls for kids accessing public WiFi
  • Always make sure paid WiFi is legitimate and use a third-party payment system
  • Keep antivirus up-to-date

Sources:

The Simple Dollar | PC Mag | Consumer Reports | Boost and Co | Slideshare | Netspot App | Lifewire | Profandroid.com | The Windows Club | Hilton Honors | How to Geek | PC World | CN Traveler | World of Wanderlust |

The post How to Find WiFi Anywhere You Go appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/find-wifi/feed/ 3