Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:39 PM
Dark Reading
Dark Reading
Products and Releases

Panda Security Launches Panda Global Protection 2010 Beta

Anti-malware suite is aimed at home users

GLENDALE, Calif.,May 26 /PRNewswire/ --Panda Security, The Cloud Security Company, has released a beta version of Panda Global Protection 2010, its most complete anti-malware suite for home users.

This beta version is available for free at: http://www.pandasecurity.com/promotions/betatest/

Panda Global Protection 2010 includes improved, innovative detection and protection technologies and a new engine with 80 percent less memory consumption to ensure that users have the best protection in the most resource-friendly solution.

Panda Global Protection 2010 beta includes:

-- Antivirus -- Proactive protection technology -- Anti-spyware/Anti-adware -- Anti-phishing -- Anti-rootkit -- Personal firewall -- Anti-spam -- Identity Protect -- Parental Control -- Local and Online Backup -- PC Optimizer (Tune-up)

Panda Global Protection 2010 leverages Collective Intelligence technologies to protect users from the cloud and utilizes knowledge from a global community comprising of millions of Panda users worldwide. Panda's Collective Intelligence servers automatically classify more than 35,000 new malware samples every day, and each new file through these servers is automatically classified within six minutes. These technologies correlate information on the malware it receives from computers to continuously improve the protection level for its global user community. Panda Global Protection 2010 has continuous, real-time contact with this vast knowledge base allowing it to offer users the fastest response against the new malware that appears every day.

In conjunction with the launch, Panda Security is hosting a competition to reward its beta testers. All users who download this beta and help improve the product (by reporting interface typos, functionality issues, etc.) will take part in a competition to be judged by a panel of technical experts from Panda Security. The ten beta testers adjudged to have made the best contributions towards improving the product will each receive a $200 Amazon.com voucher.

In addition, all users who report a previously unknown incident will get a 50 percent discount on the final release version of Panda Global Protection 2010.

To download the free beta and get more information about the competition, go to: http://www.pandasecurity.com/promotions/betatest/

About Panda Security

Panda Security is one of the world's leading IT security providers, with millions of clients around the globe and products available in over twenty languages. Our mission is to keep our customers' information and IT assets safe from security threats, giving them the most effective protection with the minimum resource consumption.

Every day, thousands of new malicious codes are created. To combat this threat, Panda Security has developed an innovative and unique security model which can automatically analyze and classify thousands of new malware samples. This model is collective intelligence and ensures that Panda Security solutions can protect against far more threats than the products of any other company.

For more information and evaluation versions of all Panda Security solutions, visit our website at: http://www.pandasecurity.com/


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.