Java IoT Authors: TJ Randall, Carmen Gonzalez, Elizabeth White, Jim Kaskade, Dana Gardner

News Feed Item

Use of Online Shopping and Banking Soars, yet Consumers Fail to Protect Credit Cards from Online Fraud

ABINGDON, England, March 13, 2013 /PRNewswire/ --

Kaspersky Lab launches PURE 3.0 Total Security to safeguard users' identity, passwords, money and digital assets online

Consumers are leaving themselves open to online fraud, when banking and shopping online. According to research from YouGov on behalf of Kaspersky Lab, less than half (43 per cent) of consumers have insurance to cover their debit or credit cards from illegitimate withdrawals and purchases. The research also reveals that 38 per cent of consumers use the same password for more than one online account, increasing the likelihood of a cybercriminal gaining access to multiple accounts.

Data from Kaspersky Lab[i] shows that more than 5,000 websites are compromised daily, including popular banking and shopping websites. With 77 per cent of computer users regularly shopping online in 2012,[ii] and 86 per cent now using online banking,[iii] it's easy to imagine how many transactions occur daily, and how many credit card numbers are at the fingertips of cybercriminals.

In addition, Kaspersky data[iv] also shows that approximately 70 per cent of phishing emails trick victims into visiting malicious, cleverly-forged websites for the sole purpose of stealing their bank credentials.

To help protect home PC users from these threats, Kaspersky Lab has announced the launch of Kaspersky PURE 3.0 Total Security to safeguard all things stored and exchanged on users' PCs. The new product from Kaspersky boasts an array of features including online banking and shopping security, password management and online backup, all of which can be accessed via an easy-to-use interface with rapid access to key features and management from the main window.

"The Internet has become a key element of our lives today and this has increased the potential 'attack surface' for cybercriminals. As increasing numbers of us bank, shop and socialise online, the number and sophistication of attacks from cybercriminals also rises, therefore we all need to make sure we are taking the necessary precautions to stay protected," says "David Emm, Senior Security Researcher, Kaspersky Lab. "By incorporating award-winning technologies such as Safe Money and Automatic Exploit Prevention into Kaspersky PURE 3.0, we sought to develop a product that not only protects a PC but the digital identity and online assets of its user, whether that be bank details or personal photos."

New and Improved Features of Kaspersky PURE 3.0 Total Security include:

  • Safe money: Cybercriminals are after one thing in the end: money. The Internet gives these modern con-artists new ways to steal, so Kaspersky PURE 3.0 includes new ways to stay protected. Using new Safe Money technology, Kaspersky PURE 3.0 verifies that all websites requiring banking, payment, or shopping information are genuine, so users aren't tricked into entering personal information onto a fake website. By using security certificates and checking website reputation, Safe Money verifies the sites' authenticity, and then automatically launches a secure web browser to offer extra protection from online malware. For even more protection, Safe Money also includes a new Secure Keyboard feature, which ensures login information isn't recorded by keylogging software.

  • Password Sync: Passwords are a vital way to control the information that makes up a person's identity, making it crucial to ensure the strength and complexity of their passwords. On average, Internet users have at least five password-protected accounts that use various combinations of characters and symbols to securely log in. Multiple passwords are often difficult to remember and keep organised. Kaspersky Lab's online password vault allows users to store all their login information in a single, secure vault, that can be synced across multiple PCs (with PURE 3.0 installed), instead of carrying a list of passwords on a piece of paper, or using the same details for every login.

If users are looking to create the most secure passwords they can, the Kaspersky Password Manager will generate an incredibly sophisticated password so they don't have to, and further save it to the cloud, so memorising it won't be necessary.

  • Online Backup: With so many critical documents, photos and information stored on users' computers, it's important to plan for physical loss, damage or theft of PCs. Kaspersky PURE 3.0 now offers an integrated online backup feature, allowing users to automatically back up their files online via a preliminarily created account on Dropbox service. Once the files have been backed up, users will be able to access the files from any computer with an Internet connection.

  • Automatic Exploit Prevention: Many of the software programs we use daily can be easily exploited and turned into an effective entry point for cybercriminals. These common programs, such as Adobe Acrobat, Java, and more, may contain vulnerabilities that have not been fixed by the software creator, or by users who absentmindedly click "ignore" when prompted to install software updates. If these vulnerabilities are left unpatched, cybercriminals can use these holes to gain access to their computer. Kaspersky Lab's new Automatic Exploit Prevention technology anticipates and blocks these types of attacks by watching over the programs installed on the PC and monitoring them for abnormal behaviour. If the program tries to perform unusual or unauthorised activities, this technology blocks the potentially malicious action.

  • Parental Controls: Parents aren't always aware of what children are doing while they're on the computer, which can be worrisome. With Kaspersky PURE's parental controls, users will know their children are completely protected with Kaspersky Lab's premier security features and filters. Parents can block access to inappropriate websites, set Internet usage time limits, and prevent valuable information from being shared via Facebook and Twitter, such as addresses or credit card numbers. If a child has their own computer, parents can manage and monitor all these Parental Control settings from their own computer via the central management tool.

  • Home Network Control. Kaspersky PURE 3.0 Total Security features an improved, easy-to-use centralised security management function for networked home computers. This allows users to check the protection status and update the antivirus database for all the PCs in a home network from just one computer.

Don't just take our word for it

Kaspersky PURE 3.0 Total Security is built on the award-winning foundation of Kaspersky Lab's premium security technology, which consistently outperforms competitor products in rigorous independent industry tests. Products from Kaspersky Lab's line of home-user protection participated in more than 50 independent tests in 2012 and achieved first-place in half of these evaluations. More information on the award results can be found here.

System requirements to install and run Kaspersky PURE 3.0

Kaspersky PURE 3.0 Total Security is compatible with Microsoft Windows 8/Pro/Enterprise (32-bit and 64-bit*); Microsoft Windows 7 Starter/Home Basic and Premium/Professional/Ultimate (32-bit and 64-bit* Service Pack 1 or higher); Microsoft Windows Vista Home Basic and Premium/Business/Enterprise/Ultimate (32-bit and 64-bit* Service Pack 2 or higher). Microsoft Windows XP Home/Professional (32-bit Service Pack 3 or higher and 64-bit* Service Pack 2 or higher.)

Availability and Pricing

Kaspersky PURE 3.0 Total Security will be available from March 12, 2013. One-year licences can be purchased for £59.99 for a one user license and £89.99 for a three user license.

To learn more about Kaspersky PURE 3.0 Total Security, please visit: http://www.kaspersky.co.uk/store

* Password Manager works with 32-bit applications and browsers

Kaspersky Lab has launched a new online newsroom, Kaspersky Lab Newsroom Europe (http://newsroom.kaspersky.eu/), for journalists throughout Europe. The newsroom is specifically designed to serve many of the media's most common requests, making it easier for journalists to find product and corporate information, facts and figures, editorial copy, images, videos and audio files, as well as details about the appropriate PR contacts.

About Kaspersky Lab

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and enterprises. The company currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at http://www.kaspersky.co.uk.

* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2011. The rating was published in the IDC report "Worldwide Endpoint Security 2012-2016 Forecast and 2011 Vendor Shares (IDC #235930, July 2012). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2011.

Follow us on Twitter


Like us on Facebook


© 2013 Kaspersky Lab. The information contained herein is subject to change without notice. The only warranties for Kaspersky Lab products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Kaspersky Lab shall not be liable for technical or editorial errors or omissions contained herein.

i. Data was obtained from Kaspersky Security Network (KSN) in 2012.

ii. According the worldwide survey conducted by O+K Research in May 2012.

iii. According to research from YouGov Plc on behalf of Kaspersky Lab. Total sample size was 2055 and the survey was carried out online. The figures have been weighted and are representative of all GB adults (aged 18+).

iv. Data was obtained from Kaspersky Security Network (KSN) in 2012.

Editorial contact:

Berkeley PR    
Ella Thompson    
[email protected]     
Telephone: +44(0)118-909-0909    
1650 Arlington Business Park    
RG7 4SA, Reading
Kaspersky Lab UK
Ruth Knowles
[email protected]
Telephone: +44(0)871-789-1633

Milton Business Park
OX14 4RY, Oxford


SOURCE Kaspersky Lab

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...