Posts Tagged ‘threats’


Kids and technologies: 6 basic tips to bear in mind

In Security,Teenagers,Uncategorized on January 3, 2012 by tecnologyantivirus Tagged: , , , , , , ,

Published by Ana Etxebarria

Continuing our series of articles on children and new technologies, today we give you some simple tips to make sure your children stay safe on the Internet.

Last week I posted an article describing two different approaches to parenting in the digital age: controlling and permissive; and despite I am clearly in favor of the latter approach, I am also aware that you cannot lower your guard when dealing with Internet risks.

I still believe that interaction on the Internet is not very different from real-world interaction, and people who manage well in real life do at least equally well in the virtual world. In any event, I must admit the online world may pose additional risks due to the Internet’s immunity and anonymity.

How can you help your children deal with that threat?

  1. Just as you know about your children’s friends, you better also know who your child contacts on the Internet.
  2. Keep an eye on how much time your children spend online, including other points of Internet access too, like smartphones and gaming consoles.
  3. Just as you teach your children never to talk to strangers or accept gifts from them, remind them never to physically meet anyone they’ve only become friends with online. If they decide to meet a cyber-friend in person, go with them.
  4. Talk to kids about the types of information they post online and how it can impact their reputation and future. Kids can unknowingly give out personal details about their life that could be maliciously used… And embarrassing and inappropriate photos and comments can stay with you forever.
  5. Teach them to be cautious with giving too much personal information, such as their location, their parents’ working hours, hobbies, etc. The less potential ‘unfriends’, the better.
  6. As Facebook makes frequent changes to its privacty policy, it is a good idea to sit with your kids and check out their online profiles with them. Pay special attention to their privacy settings and which messages, photos and personal details are accesible to whom.

Are you comfortable monitoring your child’s online world? What are your family’s technology ground rules?



With one hand behind our backs

In Malware on April 7, 2010 by tecnologyantivirus Tagged: , , ,

Posted by Javi Guerrero, April 7th, 2010

It’s a known fact that security software in general, and antivirus software in particular is always a couple of steps behind cyber-crooks. That is, the most usual thing is for malware creators to find new ways to attack computers and for security companies to update their products to be able to combat the new threat.
So, operating systems and applications must fix their vulnerabilities and antivirus solutions keep their databases up-to-date to be able to detect the new malware that

If you consider the huge amount of threats that appear every day, it is easy to realize the huge effort that must be invested to keep up the fight against malware. Along these lines, Panda’s innovative developments such as TruPrevent technologies or the recent Cloud AV (the first antivirus in the world to put the concept of cloud-based protection into practice) have proved to be extremely effective when it comes to detecting malware. However, the fight goes on and will continue indefinitely.

Yet, there is an aspect of antivirus software development that clearly shows the disadvantageous situation it is in: the requirement to respect the operating system and other installed applications, in terms of stability, performance and functionality.

What does this mean? Well, just as I explained in my previous article Antivirus, performance and security, security solutions must protect the system without affecting performance beyond what is reasonable. They must also avoid affecting the way other applications or the operating system work, in order not to cause instability, crashes or incompatibility conflicts. This is sometimes very difficult to guarantee, due to the peculiarities of the way an antivirus product works.

Getting back to the topic of this post, here is an example of a disadvantageous situation:  Any antivirus software in general, and especially some of its components (such as the “on-access” detection layer) must fulfill certain conditions and good practice recommendations set out by Microsoft in order to ensure the product’s reliability and quality, and obtain compatibility certificates, etc. These rules include, among other things, to avoid using undocumented system functions, as they can change from one Windows version to another, or even among various service packs, and generate an incompatibility conflict that might cause the problems above.

However, malware evidently does not have to follow any of these rules or try to ‘respect’ the system and its applications, or at least not beyond what is strictly necessary to achieve its goals, as it is not a legitimate application.

The antivirus, however, must abide by those rules and is at a clear disadvantage when it comes to detecting and neutralizing threats. Sometimes, this makes security developers feel as if they were fighting with one hand tied behind their backs… Actually this is very similar to real life: whereas criminals break the law as they like, law enforcement agencies must abide by a series of rules and laws in the process of stopping them.

If you take all these circumstances into consideration, it is really worth admiring the effort put in by security software developers to try and keep ever-increasing threats at bay.