|By PR Newswire||
|March 13, 2013 02:32 PM EDT||
ABINGDON, England, March 13, 2013 /PRNewswire/ --
Kaspersky Lab launches PURE 3.0 Total Security to safeguard users' identity, passwords, money and digital assets online
Consumers are leaving themselves open to online fraud, when banking and shopping online. According to research from YouGov on behalf of Kaspersky Lab, less than half (43 per cent) of consumers have insurance to cover their debit or credit cards from illegitimate withdrawals and purchases. The research also reveals that 38 per cent of consumers use the same password for more than one online account, increasing the likelihood of a cybercriminal gaining access to multiple accounts.
Data from Kaspersky Lab[i] shows that more than 5,000 websites are compromised daily, including popular banking and shopping websites. With 77 per cent of computer users regularly shopping online in 2012,[ii] and 86 per cent now using online banking,[iii] it's easy to imagine how many transactions occur daily, and how many credit card numbers are at the fingertips of cybercriminals.
In addition, Kaspersky data[iv] also shows that approximately 70 per cent of phishing emails trick victims into visiting malicious, cleverly-forged websites for the sole purpose of stealing their bank credentials.
To help protect home PC users from these threats, Kaspersky Lab has announced the launch of Kaspersky PURE 3.0 Total Security to safeguard all things stored and exchanged on users' PCs. The new product from Kaspersky boasts an array of features including online banking and shopping security, password management and online backup, all of which can be accessed via an easy-to-use interface with rapid access to key features and management from the main window.
"The Internet has become a key element of our lives today and this has increased the potential 'attack surface' for cybercriminals. As increasing numbers of us bank, shop and socialise online, the number and sophistication of attacks from cybercriminals also rises, therefore we all need to make sure we are taking the necessary precautions to stay protected," says "David Emm, Senior Security Researcher, Kaspersky Lab. "By incorporating award-winning technologies such as Safe Money and Automatic Exploit Prevention into Kaspersky PURE 3.0, we sought to develop a product that not only protects a PC but the digital identity and online assets of its user, whether that be bank details or personal photos."
New and Improved Features of Kaspersky PURE 3.0 Total Security include:
- Safe money: Cybercriminals are after one thing in the end: money. The Internet gives these modern con-artists new ways to steal, so Kaspersky PURE 3.0 includes new ways to stay protected. Using new Safe Money technology, Kaspersky PURE 3.0 verifies that all websites requiring banking, payment, or shopping information are genuine, so users aren't tricked into entering personal information onto a fake website. By using security certificates and checking website reputation, Safe Money verifies the sites' authenticity, and then automatically launches a secure web browser to offer extra protection from online malware. For even more protection, Safe Money also includes a new Secure Keyboard feature, which ensures login information isn't recorded by keylogging software.
- Password Sync: Passwords are a vital way to control the information that makes up a person's identity, making it crucial to ensure the strength and complexity of their passwords. On average, Internet users have at least five password-protected accounts that use various combinations of characters and symbols to securely log in. Multiple passwords are often difficult to remember and keep organised. Kaspersky Lab's online password vault allows users to store all their login information in a single, secure vault, that can be synced across multiple PCs (with PURE 3.0 installed), instead of carrying a list of passwords on a piece of paper, or using the same details for every login.
If users are looking to create the most secure passwords they can, the Kaspersky Password Manager will generate an incredibly sophisticated password so they don't have to, and further save it to the cloud, so memorising it won't be necessary.
- Online Backup: With so many critical documents, photos and information stored on users' computers, it's important to plan for physical loss, damage or theft of PCs. Kaspersky PURE 3.0 now offers an integrated online backup feature, allowing users to automatically back up their files online via a preliminarily created account on Dropbox service. Once the files have been backed up, users will be able to access the files from any computer with an Internet connection.
- Automatic Exploit Prevention: Many of the software programs we use daily can be easily exploited and turned into an effective entry point for cybercriminals. These common programs, such as Adobe Acrobat, Java, and more, may contain vulnerabilities that have not been fixed by the software creator, or by users who absentmindedly click "ignore" when prompted to install software updates. If these vulnerabilities are left unpatched, cybercriminals can use these holes to gain access to their computer. Kaspersky Lab's new Automatic Exploit Prevention technology anticipates and blocks these types of attacks by watching over the programs installed on the PC and monitoring them for abnormal behaviour. If the program tries to perform unusual or unauthorised activities, this technology blocks the potentially malicious action.
- Parental Controls: Parents aren't always aware of what children are doing while they're on the computer, which can be worrisome. With Kaspersky PURE's parental controls, users will know their children are completely protected with Kaspersky Lab's premier security features and filters. Parents can block access to inappropriate websites, set Internet usage time limits, and prevent valuable information from being shared via Facebook and Twitter, such as addresses or credit card numbers. If a child has their own computer, parents can manage and monitor all these Parental Control settings from their own computer via the central management tool.
- Home Network Control. Kaspersky PURE 3.0 Total Security features an improved, easy-to-use centralised security management function for networked home computers. This allows users to check the protection status and update the antivirus database for all the PCs in a home network from just one computer.
Don't just take our word for it
Kaspersky PURE 3.0 Total Security is built on the award-winning foundation of Kaspersky Lab's premium security technology, which consistently outperforms competitor products in rigorous independent industry tests. Products from Kaspersky Lab's line of home-user protection participated in more than 50 independent tests in 2012 and achieved first-place in half of these evaluations. More information on the award results can be found here.
System requirements to install and run Kaspersky PURE 3.0
Kaspersky PURE 3.0 Total Security is compatible with Microsoft Windows 8/Pro/Enterprise (32-bit and 64-bit*); Microsoft Windows 7 Starter/Home Basic and Premium/Professional/Ultimate (32-bit and 64-bit* Service Pack 1 or higher); Microsoft Windows Vista Home Basic and Premium/Business/Enterprise/Ultimate (32-bit and 64-bit* Service Pack 2 or higher). Microsoft Windows XP Home/Professional (32-bit Service Pack 3 or higher and 64-bit* Service Pack 2 or higher.)
Availability and Pricing
Kaspersky PURE 3.0 Total Security will be available from March 12, 2013. One-year licences can be purchased for £59.99 for a one user license and £89.99 for a three user license.
To learn more about Kaspersky PURE 3.0 Total Security, please visit: http://www.kaspersky.co.uk/store
* Password Manager works with 32-bit applications and browsers
Kaspersky Lab has launched a new online newsroom, Kaspersky Lab Newsroom Europe (http://newsroom.kaspersky.eu/), for journalists throughout Europe. The newsroom is specifically designed to serve many of the media's most common requests, making it easier for journalists to find product and corporate information, facts and figures, editorial copy, images, videos and audio files, as well as details about the appropriate PR contacts.
About Kaspersky Lab
Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and enterprises. The company currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at http://www.kaspersky.co.uk.
* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2011. The rating was published in the IDC report "Worldwide Endpoint Security 2012-2016 Forecast and 2011 Vendor Shares (IDC #235930, July 2012). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2011.
Follow us on Twitter
Like us on Facebook
© 2013 Kaspersky Lab. The information contained herein is subject to change without notice. The only warranties for Kaspersky Lab products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Kaspersky Lab shall not be liable for technical or editorial errors or omissions contained herein.
i. Data was obtained from Kaspersky Security Network (KSN) in 2012.
ii. According the worldwide survey conducted by O+K Research in May 2012.
iii. According to research from YouGov Plc on behalf of Kaspersky Lab. Total sample size was 2055 and the survey was carried out online. The figures have been weighted and are representative of all GB adults (aged 18+).
iv. Data was obtained from Kaspersky Security Network (KSN) in 2012.
1650 Arlington Business Park
RG7 4SA, Reading
Kaspersky Lab UK
Milton Business Park
OX14 4RY, Oxford
SOURCE Kaspersky Lab
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 27, 2016 08:00 AM EDT Reads: 1,973
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 27, 2016 08:00 AM EDT Reads: 3,627
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Sep. 27, 2016 07:45 AM EDT Reads: 3,227
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 27, 2016 07:45 AM EDT Reads: 2,467
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
Sep. 27, 2016 07:30 AM EDT Reads: 2,950
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 27, 2016 07:15 AM EDT Reads: 1,114
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Sep. 27, 2016 06:45 AM EDT Reads: 3,315
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 06:30 AM EDT Reads: 1,827
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 06:15 AM EDT Reads: 2,612
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 27, 2016 05:30 AM EDT Reads: 1,152
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 27, 2016 05:15 AM EDT Reads: 1,445
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Sep. 27, 2016 04:45 AM EDT Reads: 1,152
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 04:30 AM EDT Reads: 2,004
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 04:15 AM EDT Reads: 2,105
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 03:00 AM EDT Reads: 2,780
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 27, 2016 03:00 AM EDT Reads: 1,806
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Sep. 27, 2016 03:00 AM EDT Reads: 2,942
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 27, 2016 02:15 AM EDT Reads: 1,605
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Sep. 27, 2016 02:15 AM EDT Reads: 3,054
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 27, 2016 02:00 AM EDT Reads: 1,735