Apps Archives - Panda Security https://www.pandasecurity.com/en/mediacenter/tag/apps/ All the info about your cybersecurity Thu, 18 Jul 2024 06:49:04 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.pandasecurity.com/en/mediacenter/src/uploads/2016/11/cropped-favicon-1-32x32.png Apps Archives - Panda Security https://www.pandasecurity.com/en/mediacenter/tag/apps/ 32 32 How the EU is about to violate your privacy https://www.pandasecurity.com/en/mediacenter/how-the-eu-is-about-to-violate-your-privacy/ https://www.pandasecurity.com/en/mediacenter/how-the-eu-is-about-to-violate-your-privacy/#respond Thu, 18 Jul 2024 06:43:23 +0000 https://www.pandasecurity.com/en/mediacenter/?p=32089 how-the-eu-is-about-to-violate-your-privacy

European Union (EU) lawmakers continue to press ahead with plans to scan private messages in an effort to crack down on criminal activity. This new…

The post How the EU is about to violate your privacy appeared first on Panda Security Mediacenter.

]]>

European Union (EU) lawmakers continue to press ahead with plans to scan private messages in an effort to crack down on criminal activity. This new control law is intended to prevent criminals from spreading child sex abuse material (CSAM) through private messaging channels. These channels include iMessage, Signal, Telegram, and WhatsApp.

Read also: Cyberbullying, a growing problem in Europe

Good idea, bad idea

No one would argue that stopping CSAM is a bad idea. However, for the chat control law to work, EU government agencies will have to scan all messages sent and received by their citizens. Even those people who are not suspected of committing any crime.

Worse still, the law will require service providers to circumvent message encryption to permit access. Message encryption is an important privacy protection that ensures only the sender and receiver can read a message. It prevents criminal interception of sensitive chat content.

Weakening encryption in any way will increase the risk of innocent people falling victim to scammers and criminals.

Has the EU changed its mind?

When the new law was first proposed, several civil liberty groups registered their opposition. Groups like the Internet Freedom Foundation, Mozilla and the Center for Democracy and technology argued that message scanning not only compromises security. But also treats every citizen as a potential suspect.

These calls were picked up by the EU’s own Civil Liberties committee. The committee voted to exclude mass scanning of encrypted messages from the proposed law. However, as the bill approaches Parliament once more, it appears that the wording may have changed. Nevertheless, the principle remains the same. The EU will still require service providers to compromise encryption algorithms. This will allow messages to be scanned as part of an ‘upload moderation’ routine.

Many MEPs have already signed an open letter against the law. They claim that chat moderation not only weakens cybersecurity but will also act as a “blueprint for authoritarian states”, providing governments with an excuse – and a means – to identify, block and potentially prosecute any content which they disagree with.

Disagreements have seen the bill delayed in Parliament, although it is due to be endorsed on the 13th December 2024. Since the most recent review, just two EU nations remain opposed to the legislation – Poland and Germany. All other member states have since fallen into line, choosing to support this privacy-breaching law. Which means that it is extremely likely this new law will be adopted across the EU, affecting citizens and anyone who communicates with them, wherever they are located in the world.

For more details about how the law could affect law-abiding citizens like you, and how to register your opposition to this assault on privacy, visit www.chatcontrol.eu.

The post How the EU is about to violate your privacy appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/how-the-eu-is-about-to-violate-your-privacy/feed/ 0
Cyber criminals target Apple users with smishing attacks https://www.pandasecurity.com/en/mediacenter/cyber-criminals-target-apple-users-with-smishing-attacks/ https://www.pandasecurity.com/en/mediacenter/cyber-criminals-target-apple-users-with-smishing-attacks/#respond Tue, 16 Jul 2024 09:12:04 +0000 https://www.pandasecurity.com/en/mediacenter/?p=32082 cyber-criminals-target-apple-users-with-smishing-attacks

Since the launch of Apple’s iPhone nearly two decades ago, the device and all its consecutive versions have been among the best-selling smartphone devices in…

The post Cyber criminals target Apple users with smishing attacks appeared first on Panda Security Mediacenter.

]]>

Since the launch of Apple’s iPhone nearly two decades ago, the device and all its consecutive versions have been among the best-selling smartphone devices in the USA.

The rising threat of smishing attacks

Criminals are well aware of the brand’s popularity in North America and have been looking for ways to exploit it. Recently, Apple users have become targets of smishing attacks.

Read also: 14 Types of Malware and How to Prevent Them

What is smishing?

Smishing  consists of phishing attempts received in the form of an SMS. Apple users have received text messages from bad actors pretending to be part of Apple’s team. The fraudsters request Apple users to click on a suspicious link that requires them to share their Apple ID and iCloud information.

How smishing works

The bad actors even make potential victims pass a captcha test to make the request look more authentic. Once the unsuspecting users verify they are not robots, they end up on a site resembling a real one with prompts asking them to share sensitive info, including passwords, usernames, full names, and other personal information. The criminals record all the data the users give and then use it to commit fraud.

Consequences of smishing attacks

Potential risks for victims

Attackers could use the info to crack Amazon or eBay accounts and purchase things with all the credit and debit cards on file. Fraudsters could also try the same email, username, and password to break into an online banking account and attempt to drain it.

Why SMS phishing is effective

SMS phishing has become more effective for hackers than regular email phishing, as email clients often forward such requests directly to a user’s junk folder. However, smartphones have not yet perfected such protection, and malicious links frequently land in people’s message centers. While many wouldn’t fall for such a trap, distracted folks could make a wrong move and get infected, hacked, and defrauded.  

How to recognize and avoid smishing attacks

Identifying red flags

In order to recognize smishing or phishing attacks, users can look for red flags that usually consist of misspelled words in the URL or text body. Verifying the phone number can also be helpful – if the message comes from a sketchy random number, the message is very likely fraudulent.

General precautions

Being cautious when receiving unsolicited messages is a must not only when it comes to SMS but also emails – clicking on suspicious links on any platform almost certainly leads to problems. Sometimes, bad actors would try to call and provide “tech support,” leading to even more malicious activities on a user’s smartphone or computer. Or fraudsters would already know the target’s first name and try to gain trust, pretending to be a person looking for human contact.  

Protective measures against smishing

While wireless service providers and smartphone manufacturers are still perfecting defense systems that could prevent fraudsters from reaching potential victims, most advanced antivirus software companies already offer a shield against such attacks.

Such advanced protection options can give you peace of mind, even if you accidently end up clicking on a suspicious link. You will receive a notification that you are going to a website known to be associated with malicious activities. Antivirus companies monitor the global internet space for such threats and ensure they protect its client base.

The post Cyber criminals target Apple users with smishing attacks appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/cyber-criminals-target-apple-users-with-smishing-attacks/feed/ 0
How to recover deleted files on a Mac https://www.pandasecurity.com/en/mediacenter/how-to-recover-deleted-files-mac/ https://www.pandasecurity.com/en/mediacenter/how-to-recover-deleted-files-mac/#respond Thu, 11 Jul 2024 06:20:02 +0000 https://www.pandasecurity.com/en/mediacenter/?p=32059 how-to-recover-deleted-files-mac

We all know the feeling. You hit delete and suddenly realize that you’ve made a mistake. Is the file gone forever? Probably not, no. Here’s…

The post How to recover deleted files on a Mac appeared first on Panda Security Mediacenter.

]]>

We all know the feeling. You hit delete and suddenly realize that you’ve made a mistake. Is the file gone forever? Probably not, no. Here’s how to recover a deleted file on your Mac.

1. Use Finder’s Undo Move option

If you realize your mistake immediately, you can recover a deleted file in just two clicks:

  • Open Finder
  • Click Edit -> Undo Move

This menu option will reverse the change, restoring your file to its original location.

2. Restore from Trash

Normally, any file that you delete is moved to the Trash can. This provides a helpful layer of security to reduce the risk of deleting something accidentally. To recover a deleted file:

  • Click the Trash icon in the dock
  • Scroll through to find your file
  • Right click the file and select Put Back from the pop-up menu

MacOS will then restore the deleted file back to its original location.

3. Restore from Recently Deleted

Some of the built-in MacOS apps, like Photos, include a trash can function called Recently Deleted. The Recently Deleted folder stores deleted items for thirty days before they are permanently deleted, giving you a chance to get them back if you make a mistake.

To recover a deleted file from Recently Deleted: 

  • Open Photos, Notes or whichever Apple app you were using
  • Click the Recently Deleted folder in the left-hand menu bar. You may need to type your password or use FaceID to access the folder.
  • Right click the deleted file and select Recover from the pop-up menu

The system will now put the deleted file back to its original location.

Read also: How to Get Rid of a Computer Virus [Mac and PC]

What if these methods don’t work?

Hopefully, you are also using Apple Time Machine to regularly backup your data (if not, now would be a great time to start!). Every hour, Apple Time Machine takes a ‘snapshot’ of your Mac, copying changed files to an external disk. If you accidentally delete a file, you can recover it from the Time Machine snapshot.

Apple Time Machine is particularly useful because it can also recover files that have been deleted from your Trash can. Ready to learn more? Apple has full instructions on how to setup and use Time Machine here.

If you have permanently deleted a file and don’t have a backup system, you will need to consider using file recovery software. These are powerful tools than can scan your Mac’s hard drive to locate and recover deleted files.

Although relatively effective, file recovery tools are the very last resort. You should not rely on them to protect you against data loss. A proper backup solution, like Time Machine, gives you greater control and peace of mind, just in case something goes wrong.

So there you have it, three ways to quickly recover deleted files on your Apple Mac. Good luck!

The post How to recover deleted files on a Mac appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/how-to-recover-deleted-files-mac/feed/ 0
PSA: This Microsoft Update is essential https://www.pandasecurity.com/en/mediacenter/psa-this-microsoft-update-is-essential/ https://www.pandasecurity.com/en/mediacenter/psa-this-microsoft-update-is-essential/#respond Mon, 08 Jul 2024 07:16:46 +0000 https://www.pandasecurity.com/en/mediacenter/?p=32037 psa-this-microsoft-update-is-essential

There are always risks when connecting to unknown public WiFi networks. Scammers will sometimes create ‘fake’ hotspots that capture and steal sensitive data from their…

The post PSA: This Microsoft Update is essential appeared first on Panda Security Mediacenter.

]]>

There are always risks when connecting to unknown public WiFi networks. Scammers will sometimes create ‘fake’ hotspots that capture and steal sensitive data from their unsuspecting victims. However, these scams only work when the hackers have complete control of the WiFi network. 

Microsoft discovers a new variation

Microsoft recently identified a new vulnerability that could be exploited to compromise machines on any public WiFi network. The vulnerability (CVE-2024-30078) allows hackers to send a malicious packet to devices on the same Wi-Fi networks in locations such as airports, coffee shops, hotels, or workplaces. 

Once the magic packet has been received by an unprotected computer, the hacker can remotely execute commands and access the system. Worse still, the whole process is invisible – there are no prompts or alerts that show something is wrong. 

Fortunately, Microsoft has developed a fix. The patch for CVE-2024-30078 was included in the monthly update for June. Although Microsoft classifies this vulnerability as “Important” (the second highest rating), it still presents a significant risk to anyone who uses public WiFi networks.

Patch today

Like any security patch, we strongly recommending installing the upgrade as soon as possible – even if you have no plans to use a public WiFi network. Why? Because if they can get connected, hackers can use the magic packet technique on your own home network too.

Microsoft release new software updates every month to address vulnerabilities. By installing patches as soon as they are released, you greatly reduce the risk of becoming a victim of cybercrime. 

Additional protection

The only problem with security updates is that there tends to be a lag between vulnerability discovery and the patch being released. And it is during that gap when cybercriminals are most likely to strike.

The good news is that you can close that gap with a robust antimalware tool like Panda Dome. Panda Dome monitors your devices for suspicious activity, blocking anything that may indicate a hacking attempt. In this way, you can protect yourself against magic packet attacks – even those which have not yet been identified.

Get yourself protected today. Make sure you apply the June Microsoft update then download a free trial of Panda Dome to ensure you’re protected against the next unidentified vulnerability!

The post PSA: This Microsoft Update is essential appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/psa-this-microsoft-update-is-essential/feed/ 0
Avoid malware while streaming UEFA EURO 2024 and Copa America CONMEBOL https://www.pandasecurity.com/en/mediacenter/avoid-malware-while-streaming-uefa-euro-2024-and-copa-america-conmebol/ https://www.pandasecurity.com/en/mediacenter/avoid-malware-while-streaming-uefa-euro-2024-and-copa-america-conmebol/#respond Thu, 04 Jul 2024 08:09:01 +0000 https://www.pandasecurity.com/en/mediacenter/?p=32010 avoid-malware-while-streaming-uefa-euro-2024-and-copa-america-conmebol

The soccer fever of the UEFA EURO 2024 and Copa America CONMEBOL tournaments rages through Europe and the Americas. Fox Sports, the sports programming division…

The post Avoid malware while streaming UEFA EURO 2024 and Copa America CONMEBOL appeared first on Panda Security Mediacenter.

]]>

The soccer fever of the UEFA EURO 2024 and Copa America CONMEBOL tournaments rages through Europe and the Americas. Fox Sports, the sports programming division of the Fox Corporation, has most of the rights to stream Euros and Copa America in the USA. Still, Fox is unavailable on standard streaming services such as Netflix and Disney+, making the events inaccessible for many.

With only a handful of streamers, millions of people scramble for options when they want to watch a soccer match. Apart from live broadcasters, such as Fox, a few other options provide viewing access to the matches, such as Sling, Fubo, and even YouTube TV, but all of those come at a price.

Understandably, while striving to avoid the steep fees set by streamers, viewers have been looking for ways to watch the matches for free or a fraction of the cost.

However, there is no such thing as a free lunch, as cybercriminals often set traps for all the people who try to bend the rules and avoid the steep prices. Not paying usually results in thousands of people watching sports content on questionable websites. Such places often require a small payment or are infected with malicious code that aims to get into the viewer’s system and possibly even steal credit card details.

Read also: 14 Types of Malware and How to Prevent Them

So, how do you stay safe and watch the games? There are a few ways.

Ways to stay safe and watch the games

  • Attend in person

Check if there are tournament matches nearby. There is no better way to enjoy the game’s beauty than watching it in person. If this is an option, head to Ticketmaster, book tickets, and stop reading. 

  • Sports bar

If attending in person is not an option, soccer fanatics will likely not have a better excuse to head to the pub. All sports bars cover major events such as the Euros and Copa America, and watching them at a bar means that folks can enjoy a cold beverage instead of browsing websites or filling out online forms to start a trial.

  • Free trial

Most streamers offer free trials. FuboTV has the longest free trial—it is one week and provides access to many games completely free of charge and free of viruses. FuboTV sometimes offers matches even in Spanish.

  • VPN

Soccer clashes are often available for free on national TV in other countries. Viewers can use a VPN to hop over the virtual wall and access a game. If a user gets a reliable VPN and has access to high-speed internet, watching in real-time could work well. 

  • Free streaming

Getting free access to live soccer games on murky mirror websites could be tempting and sometimes could work, but we suggest folks avoid being on those. If this is the last resort, users should ensure they don’t share card details and have antivirus installed on all smart devices. 

In the USA, soccer has been trying to dethrone baseball and ice hockey for years and may eventually succeed. It could potentially become the third most popular team sport in the US, especially with the upcoming 2026 FIFA World Cup planned to take place right here in North America. Whatever sport you watch, ensuring you do it on a protected device is a must, as sometimes even big corporations get hit by cyber-attacks and unintentionally expose customer info. 

The post Avoid malware while streaming UEFA EURO 2024 and Copa America CONMEBOL appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/avoid-malware-while-streaming-uefa-euro-2024-and-copa-america-conmebol/feed/ 0
How to check how much RAM my computer has? https://www.pandasecurity.com/en/mediacenter/how-to-check-how-much-ram-my-computer-has/ https://www.pandasecurity.com/en/mediacenter/how-to-check-how-much-ram-my-computer-has/#respond Fri, 28 Jun 2024 09:28:13 +0000 https://www.pandasecurity.com/en/mediacenter/?p=32003 how-to-check-how-much-ram-my-computer-has

The performance of your computer is affected by several factors. But one of the most important is RAM. Generally, the more RAM your device has,…

The post How to check how much RAM my computer has? appeared first on Panda Security Mediacenter.

]]>

The performance of your computer is affected by several factors. But one of the most important is RAM. Generally, the more RAM your device has, the faster it should ‘work’ – particularly when playing graphics intensive games or editing large photos and videos*.

So how can you check how much RAM your computer has? Fortunately, the process is quite simple.

Windows PC

Finding how much RAM is installed in your Windows PC takes just a few clicks:

  • Click the Windows icon in the bottom left corner of your screen, then select Settings
  • In the window that appears, click System (on the left) then About (bottom right)
  • Look for Installed RAM in the Device Specifications section (e.g. 64.0 GB)

Apple Mac

Finding the basic specifications of your Mac is simple:

  • Click the Apple icon () in the top left corner of your screen
  • Select About This Mac from the top of the menu
  • In the popup screen that appears, your RAM count is listed next to Memory e.g. 8 GB

Why would you need to check how much RAM your computer has?

Some apps, particularly games, have a minimum RAM requirement. If your computer does not have enough memory, these apps may not run correctly. Some will not even install. So you will need to check how much RAM you have before buying new software.

But that’s not the only reason. Have you ever seen a pop-up warning you that your computer is running low on memory? Or had your computer freeze entirely until it is restarted?

These are common signs that your computer has run out of RAM – there is not enough ‘free’ memory to complete a task. This is a relatively common problem on older computers that do not have enough RAM to cope with modern computing tasks.

But if your computer is newer, or you are seeing these messages when completing basic tasks, it may be a sign of something more sinister. Malware, will often consume all of your available RAM, causing your computer to crash. Others, such as cryptominers, will divert your memory and CPU resources to other malicious activities that prevent your device from working correctly.

Whenever see a popup about insufficient RAM (or similar), you should immediately complete an antimalware scan. The same is true if your computer crashes, freezes or reboots for no apparent reason. Only once you are sure that your computer has not been infected should you consider upgrading RAM (or replacing your computer).

Click here to download a free trial of Panda Dome and ensure your computer is “clean”.

* Note: There are other factors that will affect your computer’s performance including CPU speed and cores, unused disk space, storage type and network speed. Whenever you encounter speed issues, an antimalware scan should always be one of your first troubleshooting tasks to try and identify the cause.

The post How to check how much RAM my computer has? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/how-to-check-how-much-ram-my-computer-has/feed/ 0
NSA Recommends users restart mobile devices weekly https://www.pandasecurity.com/en/mediacenter/nsa-recommends-restart-mobile-devices-weekly/ https://www.pandasecurity.com/en/mediacenter/nsa-recommends-restart-mobile-devices-weekly/#respond Wed, 26 Jun 2024 09:20:31 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31994 nsa-recommends-restart-mobile-devices-weekly

The National Security Agency (NSA) has issued a mobile device best practice advisory with one often overlooked recommendation. The intelligence agency wants smartphone and tablet…

The post NSA Recommends users restart mobile devices weekly appeared first on Panda Security Mediacenter.

]]>

The National Security Agency (NSA) has issued a mobile device best practice advisory with one often overlooked recommendation. The intelligence agency wants smartphone and tablet users to turn devices off and on at least once a week. According to the government pamphlet, the recommendation could prevent hackers from infecting the devices with malware or making the most of already installed malicious code. NSA says that the practice could also help avoid zero-click exploits.  

How does turning smartphones on and off help users avoid malware and zero-click exploits?

NSA researchers have a reason to believe that restarting a device can affect the operations of some types of malicious codes running on a smartphone or tablet. Apple and Android users who turn the smart devices on and off at least once a week are more likely to interrupt the action on any malware that might already be present on the device. Rebooting the devices, a simple process that clears the memory, could sometimes result in preventing the malicious codes from continuing to operate. 

Weekly rebooting is a common practice for computers and Macs. Operations systems like Windows often integrate weekly reboots into their security systems. The reboot gives computers a chance to install any pending software or driver updates. Turning a device on and off helps it maintain a healthy computing environment. Smartphones and tablets are also computing devices. So knowing that those must be turned off from time to time should not be a shock.

A simple restart does not solve all the problems, but the practice appears to be helpful. However, not all device restarts are the same. It is essential to learn how to restart a device correctly, as often turning it on and off isn’t enough, as some device components remain on even while the device seemingly appears to be off. 

How to perform a soft reset

If users want to be sure they get the most out of our smartphone or tablet, they should perform a soft reset. The last few generations of Apple products can be fully rebooted by quickly pressing the volume up button, followed by rapid press of the volume down button. And then finishing the soft reset by holding the power button until the white Apple logo appears on the black screen.

The procedure for soft reboot of Android devices varies but it often is just holding the power button for a long time until the device turns off. These soft power cycle actions, known for their effectiveness and safety, are healthy for mobile systems and do not erase any data from a phone or the settings and apps. 

Powering a smartphone on and off is certainly helpful, but it’s important to install antivirus software. This additional step can significantly enhance your device’s security. Making it more hostile to hackers and malicious files that may be lurking around, trying to infiltrate your digital life.  

The post NSA Recommends users restart mobile devices weekly appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/nsa-recommends-restart-mobile-devices-weekly/feed/ 0
Ransomware gangs testing in developing nations before striking richer countries https://www.pandasecurity.com/en/mediacenter/ransomware-gangs-testing-in-developing-nations/ https://www.pandasecurity.com/en/mediacenter/ransomware-gangs-testing-in-developing-nations/#respond Wed, 19 Jun 2024 11:57:10 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31979 ransomware-gangs-testing-in-developing-nations

Cyber attackers are increasingly targeting developing nations, businesses in Africa, Asia, and South America with their latest ransomware variants, using these regions to test how…

The post Ransomware gangs testing in developing nations before striking richer countries appeared first on Panda Security Mediacenter.

]]>

Cyber attackers are increasingly targeting developing nations, businesses in Africa, Asia, and South America with their latest ransomware variants, using these regions to test how well they work. If the malware works successfully, they will then strike wealthier nations that are protected by more sophisticated security systems. 

Adopting this approach allows them to refine their malicious programs in less secure environments. Because developing nations tend to be behind the curve in relation to cybersecurity. Recent victims of these ransomware tests include a bank in Senegal, a financial services company in Chile, a tax firm in Colombia, and a government economic agency in Argentina. These practice runs help cybercrime gangs perfect their methods before attacking high-value, better-defended targets.

Digitization in the developing world outpaces cybersecurity

Businesses in developing countries often lack cybersecurity awareness, making them easy targets. For example, a cyber gang might first try out a new malware attack in countries like Senegal or Brazil. Where banks have similar IT infrastructure to their western counterparts. This tactic works because these regions generally have lower cybersecurity defenses.

One cyber gang, Medusa, began attacking businesses in 2023 in South Africa, Senegal, and Tonga, stealing and encrypting companies’ data. Medusa went on to carry out 99 breaches in the US, UK, Canada, Italy, and France following the success of their trial runs in Africa. During these tests, users only become aware of an attack only when they are locked out of their systems and instructed to negotiate a ransom on the dark web. If victims refuse, the stolen data is published.

Local cybercriminals want to get in on the game

However, not all cyber gangs are so methodical or have long term goals. Some gangs are opportunistic. Targeting developing countries because local hackers can cheaply acquire ransomware and conduct smaller attacks without needing deep IT security knowledge and experience. Gangs like Medusa will often sell their tools to less sophisticated hackers, who use them against ‘easier’ targets. 

Expanding their reach

Cyber gangs often perfect their methods locally before exporting them to regions with similar languages, such as Brazil to Portugal. Rapid digital adoption in Africa is outpacing the development of robust cybersecurity measures, creating a gap that cybercriminals exploit. This highlights the need for businesses and individuals worldwide to stay vigilant and invest in strong cybersecurity measures, including antimalware tools like Panda Dome, to protect against these evolving threats.

As cyber attackers continue to test and refine their techniques in developing countries, everyone must prioritize cybersecurity to safeguard against increasingly sophisticated threats.

The post Ransomware gangs testing in developing nations before striking richer countries appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/ransomware-gangs-testing-in-developing-nations/feed/ 0
FBI offers thousands of free LockBit decryption keys https://www.pandasecurity.com/en/mediacenter/fbi-offers-thousands-of-free-lockbit-decryption-keys/ https://www.pandasecurity.com/en/mediacenter/fbi-offers-thousands-of-free-lockbit-decryption-keys/#respond Wed, 12 Jun 2024 08:00:42 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31965 fbi-offers-thousands-of-free-lockbit-decryption-keys

During a cyber security conference in Boston earlier this month, FBI’s Cyber Division Assistant Director Bryan Vorndran highlighted that the government agency has approximately 7,000…

The post FBI offers thousands of free LockBit decryption keys appeared first on Panda Security Mediacenter.

]]>

During a cyber security conference in Boston earlier this month, FBI’s Cyber Division Assistant Director Bryan Vorndran highlighted that the government agency has approximately 7,000 LockBit decryption keys and is willing to share them with any of the thousands of victims of the viral ransomware.

Process for obtaining a decryption key

For the FBI to release a decryption key, the victim must fill out a form located on the FBI’s Internet Crime Complaint Center (IC3). After filling out the LockBit victim reporting form, the FBI asses the request and eventually provides a decryption key so potential victims do not have to pay ransom to the cybercriminals. Knowing that the FBI might have a spare key brings hope to organizations fighting the nasty ransomware.

Eligibility and encouragement

All individuals and entities suffering from LockBit are welcome to request a key if needed. As the FBI is willing to help both US and non-US victims. The government agency openly invites potential victims to take advantage of the keys and suggests that victims don’t pay a ransom in case of a cyber security incident.

The hackers may claim that if the ransom is paid, they will decrypt all files and leave the victim alone. Still, victims often send digital money only to realize that they’ve been tricked again, and the files in question are not decrypted but are up for sale to the highest bidder on the dark web. 

Background on LockBit and FBI’s actions

The FBI’s actions resulted from an ongoing international operation that aimed to disrupt the RaaS (Ransomware-as-a-Serivce) LockBit infrastructure after multiple high-profile attacks on large private organizations and critical infrastructure worldwide.

LockBit is one of the most profitable RaaS groups in the world. Various versions of LockBit have been circulating on the internet for half a decade. Causing losses worth billions of dollars to companies and individuals worldwide. 

Just last month, cybercriminals utilizing the LockBit malicious software managed to compromise the Canadian retail chain London Drugs and asked for a $25 million ransom. The Canadian retail pharmacy chain refused to cooperate, prompting the bad actors to publish some of the stolen info on the dark web.

Identity of LockBit leaders

Even though LockBit has existed for quite some time, the identities of the high-ranking officers at the criminal organization responsible for the creation and distribution of the ransomware remain unknown, with the exception of Dimitry Yuryevich Khoroshev, a Russian national from Voronezh. The US State Department believes Dimitry is a top director at LockBit and offers a $10 million reward for information that could lead to an arrest.

The post FBI offers thousands of free LockBit decryption keys appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/fbi-offers-thousands-of-free-lockbit-decryption-keys/feed/ 0
X now allows adult content https://www.pandasecurity.com/en/mediacenter/x-now-allows-adult-content/ https://www.pandasecurity.com/en/mediacenter/x-now-allows-adult-content/#respond Mon, 10 Jun 2024 08:22:25 +0000 https://www.pandasecurity.com/en/mediacenter/?p=31959 x-now-allows-adult-content

When Elon Musk says all content creators are welcome at X, he means business. X, formerly known as Twitter, recently updated its policy to allow…

The post X now allows adult content appeared first on Panda Security Mediacenter.

]]>

When Elon Musk says all content creators are welcome at X, he means business. X, formerly known as Twitter, recently updated its policy to allow X users to post adult content that could consist of nudity and sexually explicit videos and imagery.

The revised policy confirms that pornographic content is welcome as long as it is appropriately labeled and not prominently displayed. The move is not new to X as such content has been previously available on the platform. But the policy was not as specific and formal. In the past, X did not have a paid subscription option either. So content creators were not racing to post on Twitter. The recent X developments could change that.

Guidelines for adult performers

Even though the latest move officially welcomes nudity to X, the adult performers will need to adhere to specific rules. According to the new terms of service, X prohibits sexualization or harm to minors, content promoting exploitation, objectification, nonconsent, and obscene behaviors. All content that intends to cause sexual arousal.

Even if it is AI-generated or in the form of animation, must be labeled accordingly. Content creators will be able to change the settings of single posts or change settings on all content posted from a profile. If rules are not met, X might have to jump in and change settings, and repeated policy offenders will risk a potential ban from the platform. 

Ensuring user safety and privacy

The social media giant hopes that it will be able to restrict children from accessing any pornographic content and also works on making sure that such type of content does not appear on the timelines of users who do not wish to see it. To prevent unnecessary exposure, X will not allow explicit imagery on publicly visible places such as profile photos and banners.

Elon Musk’s vision for X

Real-life Tony Stark is on a quest to reform X from being so dependable on advertising revenue. And hopes to take some of the market share currently dominated by the popular internet content subscription service provider OnlyFans. Rather than solely relying on advertising, Elon Musk has been working hard to transform X into a company with multiple revenue streams. One of which is money pouring from content creators and their followers. 

Elon is also likely exploring ways to snatch traffic from other highly-popular sites, that include adult websites PornHub and XVideos. Combined, both adult websites generate more traffic than platforms such as Wikipedia and Instagram, leaving other popular online places such as Amazon and Bing in the dust.

The post X now allows adult content appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/x-now-allows-adult-content/feed/ 0