Apps Archives - Panda Security https://www.pandasecurity.com/en/mediacenter/tag/apps/ Clear tips, up-to-date news and practical solutions to protect your family and devices. Learn how to avoid online threats and stay one step ahead with Panda Security. Tue, 14 Oct 2025 12:44:44 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://www.pandasecurity.com/en/mediacenter/src/uploads/2016/11/cropped-favicon-1-32x32.png Apps Archives - Panda Security https://www.pandasecurity.com/en/mediacenter/tag/apps/ 32 32 Does Facebook have a Dating AI assistant? https://www.pandasecurity.com/en/mediacenter/does-facebook-have-a-dating-ai-assistant/ https://www.pandasecurity.com/en/mediacenter/does-facebook-have-a-dating-ai-assistant/#respond Wed, 08 Oct 2025 07:00:02 +0000 https://www.pandasecurity.com/en/mediacenter/?p=34179 does-facebook-have-a-dating-ai-assistant

Yes, Facebook does have a dating AI assistant that helps users be more efficient when searching for matches on the company’s online dating service, Facebook…

The post Does Facebook have a Dating AI assistant? appeared first on Panda Security Mediacenter.

]]>

Yes, Facebook does have a dating AI assistant that helps users be more efficient when searching for matches on the company’s online dating service, Facebook Dating. The new AI tool comes in the form of a chatbot, and it began rolling out to some Facebook Dating users in Canada and the USA last month. This innovative AI dating helper is designed to reduce users’ swipe fatigue, which, according to a recent Forbes Health Survey, is a real issue, as users admitted to spending approximately fifty minutes a day swiping through dating apps. The new chatbot is not the only new feature from the world’s biggest social media platform. Facebook has also introduced Meet Cute, a feature that aims to eliminate indecision in online dating by automatically matching users with a surprise match based on their personalized matching algorithm. Similar AI-powered features have already been introduced at other meeting apps. 

Key takeaways

  • Facebook Dating added a couple of new features to its arsenal of dating tools in an effort to expand its presence in the dating app market.
  • The new chatbot can help users find matches without needing to swipe, but by just conversing with a chatbot. The other new feature, Meet Cute, offers surprise matches based on a matchmaking algorithm.
  • Unlike tools at other dating apps, the new Facebook Dating match features are offered free of charge.
  • Romance scams are rising. Fraudsters use AI tools to create fake profiles and gain victims´ trust with emotional manipulation tactics.   

What is Facebook Dating?

Meta’s Facebook has billions of users, but despite its significant size, it is not known as the go-to place when individuals are looking for a new partner. The folks at Meta have been trying to change that over the last six years since Facebook Dating was first launched. Meta markets its dating services as a space within Facebook designed to facilitate meeting and initiating new conversations with like-minded people who share similar interests.

However, despite having hundreds of thousands of users, Facebook Dating has not taken off as well as other dating apps, whose active user numbers are in the millions. Meta is taking a step forward. Its new AI chatbot and Meet Cute aim to capture part of the dating crowd. Last month, the new features started rolling out in Canada and the USA. 

Facebook’s new dating assistant and Meet Cute explained

The dating assistant is presented as a chatbot that guides love seekers through their dating journey. It offers better matches, and just by conversing with the bot, it can make suggestions. Meta is hoping to alleviate the swipe fatigue that has left dating app users frustrated.

A recent Forbes Health Survey disclosed that users spend approximately 50 minutes swiping per day.  Instead of swiping, Meta wants users to request more unique traits from the dating assistant. For example, they can ask it to “find a handsome engineer from Los Angeles” or a “Kathrin Zeta Jones lookalike”. On the other hand, Meet Cute pairs users automatically based on algorithmic predictions of mutual interest. The feature is optional and delivers matches weekly, but it is not mandatory, and users can easily opt out. Neither feature is yet available worldwide, but both have started rolling out gradually to users in North America.

How does Facebook Dating compare to other dating apps?

While Facebook Dating garners the attention of hundreds of thousands of users, this represents only a tiny portion of the overall Facebook user base. The numbers are small compared to daily users of popular dating apps like Tinder and Bumble, with millions active.

Do other apps have similar AI features?

Yes, they do. Trendy dating apps such as Tinder, Hinge, and Bumble have introduced similar chatbots. While some of them are behind paywalls, AI is widely adopted by the most popular online dating platforms, including Bumble, Tinder, and Hinge. 

Are romance scams on the rise?

Yes, romance scams continue rising, powered by AI chatbots that help fraudsters appear more plausible and trustworthy. The new tools make it hard to spot fake requests. AI attacks are especially effective against non-tech-savvy users. Criminals use AI to create fake profiles and images. It also helps them sound convincing and gain trust. Once the trust is established, criminals typically attempt to defraud their targets by imposing urgent requests and financial demands. The AI and crypto revolutions have made it easy for scammers to thrive. 

Facebook Dating introduced new features last month. They´re rolling out slowly in North America and  expanding globally next year. AI is certainly helping companies deliver better tools, but cybercriminals are also utilizing it. While it is tempting to take advantage of the new tools, social media users need to keep in mind that the latest improvements in AI have also made it possible for fraudsters to become more creative when targeting new victims and executing malicious campaigns. Having adequate cyber protection can help fight back against bad actors trying to scam you.

The post Does Facebook have a Dating AI assistant? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/does-facebook-have-a-dating-ai-assistant/feed/ 0
Why Logging Out of Facebook Could Save You From Scams and Stop Meta’s Relentless Tracking https://www.pandasecurity.com/en/mediacenter/why-logging-out-of-facebook-could-save-you-from-scams-and-stop-metas-relentless-tracking/ https://www.pandasecurity.com/en/mediacenter/why-logging-out-of-facebook-could-save-you-from-scams-and-stop-metas-relentless-tracking/#respond Fri, 26 Sep 2025 07:00:16 +0000 https://www.pandasecurity.com/en/mediacenter/?p=34067 why-logging-out-of-facebook-could-save-you-from-scams-and-stop-metas-relentless-tracking

Staying logged into Facebook might seem convenient, but it opens the door to sophisticated tracking, dangerous exploits and even attacks through infected SVG files. Here’s…

The post Why Logging Out of Facebook Could Save You From Scams and Stop Meta’s Relentless Tracking appeared first on Panda Security Mediacenter.

]]>

Staying logged into Facebook might seem convenient, but it opens the door to sophisticated tracking, dangerous exploits and even attacks through infected SVG files. Here’s how to protect yourself from Meta’s data collection and emerging cyberthreats.

Key takeaways

  • Staying logged into Facebook allows Meta to track your activity across the entire web, not just on their platforms. For many people this may be feel like an invasion of privacy
  • New malicious exploits like JSFuck can hijack your logged-in Facebook session to perform actions without your consent
  • Adult websites are using weaponized SVG image files to secretly “like” Facebook posts on your behalf, exposing your private activity to friends, family and marketers
  • Logging out of Facebook significantly reduces your exposure to both tracking and session-based attacks

How Meta tracks you beyond Facebook

When you remain logged into Facebook, you’re essentially giving Meta permission to follow you around the internet. The company doesn’t just collect data about your activity on Facebook and Instagram – it actively harvests information from millions of other apps, websites, and services that use Meta’s tracking technologies

This extensive surveillance network includes websites with Facebook “Like” and “Share” buttons, Facebook Login integration and invisible tracking pixels. Even if you never click these buttons, Facebook is still collecting data about your browsing habits, the articles you read, videos you watch, and products you view. This ‘digital footprint’ is used to build a detailed marketing profile based on your interests – including adult content viewing habits.

Meta’s tracking toolkit collects information like:

  • Your device information (phone brand, operating system, installed apps)
  • Technical data (IP address, internet speed, time zone, network connections)  
  • Location data from GPS and network signals
  • Behavioral patterns (how long you spend on pages, scroll patterns, click behavior)

The emerging threat of SVG-based exploits

A concerning new attack vector has emerged that specifically targets users who stay logged into Facebook. Cybercriminals are embedding malicious JavaScript code inside seemingly harmless image files called SVGs (Scalable Vector Graphics).

How the JSFuck exploit works

Security researchers have discovered that adult websites are distributing malicious SVG files that contain heavily obfuscated JavaScript code using a technique called “JSFuck”. ‘Obfuscation’ is a programming technique designed to make code impossible to read by other developers – or anti-malware tools.

If you click on these weaponized image files, the hidden code springs into action:

  1. The SVG file opens in your default browser (typically Microsoft Edge on Windows)
  2. In the background, obfuscated JavaScript code executes automatically  
  3. The script downloads additional malicious payloads from remote servers
  4. If you’re logged into Facebook, the malware silently clicks “Like” on targeted posts without your knowledge or consent

Importantly, this attack only works if you have an active Facebook session. However, this has led to many users become unknowing victims who keep Facebook open for convenience.

Although JSFuck targets adult website users, the same techniques can be used to exploit everyone who stays permanently logged into their Facebook account.

How to protect yourself against weaponized SVGs (and Meta)

Step 1: Log out regularly

The most effective defense against session-based exploits is simple: log out of Facebook when you’re not actively using it. This breaks the connection that malicious scripts rely on to hijack your account.

Step 2: Use Facebook’s privacy tools

Facebook provides built-in tools to limit tracking, though they require manual configuration:

  • Access “Settings & Privacy” -> “Privacy Checkup” to review your data sharing preferences
  • Navigate to “Your Facebook Information” -> “Off-Facebook Activity” to see what external data Facebook has collected about you
  • Clear your activity history and turn off future off-Facebook activity tracking

Step 3: Install anti-malware

Implement additional safeguards in your web browser:

  • Install a tool like Panda Dome which can identify and block malware from being installed
  • Consider switching to privacy-focused browsers like Brave or Firefox

Step 4: Be cautious with files

  • Never open SVG files from untrusted sources, especially from adult websites or suspicious emails
  • Be skeptical of image files that prompt you to “preview in browser”
  • Keep your browser and security software updated to detect the latest threats

The cost of convenience

While staying logged into Facebook offers convenience, the privacy and security trade-offs are substantial. Meta has been caught using methods that privacy experts describe as similar to those employed by digital criminals. The company secretly compiled logs of users’ web browsing activities on Android devices for months without user or Google’s knowledge.

Meta’s data collection extends far beyond what you realize. The company tracks not just your social media activity, but your real-world location, device usage patterns, app installations, and even tries to match your online behavior with offline purchases.

Taking control of your digital footprint

The choice is ultimately yours: accept the convenience of persistent social media sessions along with extensive tracking and security risks or take proactive steps to protect your privacy and security. 

Logging out of Facebook regularly is one of the simplest yet most effective ways to limit both Meta’s surveillance and your exposure to emerging cyberthreats like the JSFuck exploit. Combined with proper browser security settings and cautious file handling, this basic practice can significantly improve your online privacy and security posture.

Your personal data is valuable – to you and to the companies that profit from it. Taking control starts with something as simple as clicking “Log Out” when you’re done browsing social media.

The post Why Logging Out of Facebook Could Save You From Scams and Stop Meta’s Relentless Tracking appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/why-logging-out-of-facebook-could-save-you-from-scams-and-stop-metas-relentless-tracking/feed/ 0
Live-Streaming Dangers: Protecting Children in the Digital World https://www.pandasecurity.com/en/mediacenter/live-streaming-dangers-protecting-children-in-the-digital-world/ https://www.pandasecurity.com/en/mediacenter/live-streaming-dangers-protecting-children-in-the-digital-world/#respond Mon, 22 Sep 2025 07:00:36 +0000 https://www.pandasecurity.com/en/mediacenter/?p=34052 live-streaming-dangers-protecting-children-in-the-digital-world

Children face unprecedented risks when live-streaming online, from exposure to predatory behavior to unintended personal data sharing. Understanding these dangers and implementing protective measures is…

The post Live-Streaming Dangers: Protecting Children in the Digital World appeared first on Panda Security Mediacenter.

]]>

Children face unprecedented risks when live-streaming online, from exposure to predatory behavior to unintended personal data sharing. Understanding these dangers and implementing protective measures is crucial for keeping young users safe in today’s digital landscape.

Introduction

Live-streaming has become increasingly popular among children and teens, offering them a platform to broadcast their lives in real-time to potentially massive audiences. Unlike traditional video sharing, live-streaming through apps like TikTok happens instantly without content moderation or the ability to edit before publication. This immediacy creates unique safety challenges that parents, teachers, and children themselves must understand.

Key Takeaways

  • Real-time risks: Live-streaming’s immediate nature eliminates content filtering and increases impulsive behavior
  • Predator targeting: Anonymous viewers can easily exploit children through comments and private messaging
  • Personal data exposure: Children often inadvertently share location, personal details, and intimate information
  • Limited age verification: Most platforms have weak age verification systems that children can easily bypass
  • Unmoderated interactions: Comments and viewer interactions happen without real-time oversight

Exposure to Inappropriate Content and Predatory Behavior

Children watching live-streams face significant exposure to inappropriate content that would normally be filtered on traditional platforms. Research conducted by BBC investigators found disturbing examples, including a nine-year-old girl being asked to remove her clothes during her first live broadcast, and another child of similar age being watched by nearly 1,000 viewers receiving explicit requests.

The anonymity of live-streaming platforms creates an environment where predators can easily target vulnerable children. Police warn that sex offenders actively use these services to groom children, with users demanding personal contact details and exposing children to obscene material. The real-time nature means these interactions happen immediately, before any moderation can intervene.

Privacy and Personal Information Risks

One of the most significant dangers involves children inadvertently sharing personal information during broadcasts. When streaming from their homes, bedrooms, or neighborhoods, children can accidentally reveal their location, making them vulnerable to real-world threats. Personal details like phone numbers, email addresses, and school information are often shared with anonymous viewers who may have malicious intent.

The permanent nature of digital content compounds this risk – anything broadcast can be recorded by viewers and shared across other platforms without knowledge or consent. This creates a lasting digital footprint that could impact the child’s future opportunities and safety.

Psychological and Behavioral Impacts

Live-streaming can encourage risky behavior as children feel pressured to maintain audience engagement. The real-time feedback loop of comments and reactions can push children to act impulsively or perform increasingly dangerous acts to keep viewers watching. This phenomenon is particularly concerning given that children’s decision-making abilities are still developing.

The platform dynamics often encourage children to seek validation through viewer numbers and comments, potentially leading to self-esteem issues and unhealthy relationships with online attention. Some children broadcast for hours daily, impacting their sleep, academic performance, and social development.

Technical and Platform Vulnerabilities

Despite the demands of the UK’s new Online Safety Act, most live-streaming platforms have inadequate age verification systems. While some claim age ratings of 13 or 17+, the verification process is often as simple as entering a birth date, making it easy for younger children to access. A 2018 NSPCC survey found that 24% of children aged 7-16 had delivered a live-stream broadcast, indicating widespread underage usage.

Platform features that seem innocent can create additional risks. Location services, friend-finding features, and direct messaging capabilities all provide avenues for predators to locate and contact children. The global nature of these platforms means children can be targeted by individuals anywhere in the world.

Protecting Children Through Education

The most effective protection begins with open communication between parents, educators, and children about online safety. Children need age-appropriate education about the permanence of digital content and the reality that online strangers may not have good intentions. 

Parents should explore apps and platforms like TikTok together with their children. It’s important to understand the features, privacy settings, and potential risks. This collaborative approach helps children feel supported while developing critical thinking skills about online interactions. Regular conversations about what children encounter online create opportunities to address concerns before they become serious problems.

Technical Protection Measures

Implementing proper privacy and security settings is essential for child safety. Parents should review location services, ensure private account settings, and understand reporting mechanisms on each platform their child uses. Parental control software like Panda Dome Family can help monitor and restrict access to high-risk applications.

Creating family agreements about online behavior, including specific rules about live-streaming, helps establish clear expectations. These agreements should cover what information should never be shared, how to respond to inappropriate requests, and when to seek adult help. These agreements should be backed by regular monitoring of children’s online activities. However, it should be balanced with age-appropriate privacy expectations. 

Teaching children to recognize and report dangerous situations empowers them to protect themselves. Children should understand that they can always seek help from trusted adults without fear of punishment.

Conclusion

Live-streaming presents unique and serious risks to children that require proactive attention from parents, educators, and policymakers. The combination of real-time interaction, minimal content moderation, and easy access creates an environment where children can quickly find themselves in dangerous situations.

Effective protection requires a multi-faceted approach combining education, technical safeguards, and ongoing communication. Parents and teachers must stay informed about emerging platforms and risks while fostering open dialogue with children about their online experiences.

As live-streaming technology continues to evolve, the focus must remain on creating safer digital environments where children can explore and learn without facing exploitation or harm. By understanding the risks and implementing comprehensive protection strategies, we can help ensure that children’s online experiences support rather than endanger their development and well-being.

 

The post Live-Streaming Dangers: Protecting Children in the Digital World appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/live-streaming-dangers-protecting-children-in-the-digital-world/feed/ 0
Did hackers steal the details of 2.5 billion Gmail users last month? https://www.pandasecurity.com/en/mediacenter/did-hackers-steal-the-details-of-2-5-billion-gmail-users-last-month/ https://www.pandasecurity.com/en/mediacenter/did-hackers-steal-the-details-of-2-5-billion-gmail-users-last-month/#respond Fri, 19 Sep 2025 07:00:32 +0000 https://www.pandasecurity.com/en/mediacenter/?p=34007 did-hackers-steal-the-details-of-2-5-billion-gmail-users-last-month

No, they did not. Last month, multiple media outlets reported on a widespread attack on Gmail users. However, the statements were debunked by Google. The…

The post Did hackers steal the details of 2.5 billion Gmail users last month? appeared first on Panda Security Mediacenter.

]]>

No, they did not. Last month, multiple media outlets reported on a widespread attack on Gmail users. However, the statements were debunked by Google. The tech conglomerate issued a blog post denying the claims that the details of approximately 2.5 billion Gmail users have been exposed. Even though Alphabet’s Google was affected by an attack on its Salesforce clusters, Google denies that such a large amount of Gmail users were under threat. The update posted by Google Workplace stated that the initial reports exaggerated the security issue and highlighted that Gmail’s protections are strong and effective. Google confirmed that security is extremely important to them and that the statements made by multiple high-profile media outlets are entirely false. However, Alphabet’s Google advised its users to practice password hygiene. It encouraged users to use secure password alternatives, leaving some room for speculation. 

Key takeaways

  • False claims of reportedly exposed information belonging to 2.5 billion Gmail users were spreading last month
  • Google denied hacking claims and stated Gmail is strongly and effectively protected in a blog post
  • The tech conglomerate advised users to maintain adequate password hygiene and use password alternatives
  • Antivirus software helps fight off phishing attacks 

Why were there reports that Google’s Gmail was hacked?

Multiple businesses and individuals began receiving emails from Google, requesting that they change their passwords and enhance security. Such advisories are usually issued when there’s been a breach within the organization. Media outlets learned about the messages and reported that a hacker group, ShinyHunters, is responsible for one of the largest breaches in history. Even though the hackers apparently made their way into Google’s system through social engineering tactics, they did not manage to steal more than what is already available publicly. 

Was the breach debunked?

Yes, just a few days after the news started spreading with outlets claiming Google is informing all 2.5 billion users and asking them to change passwords, Alphabet’s Google hurried to issue a blog post confirming that its email systems are safe and operating. The tech company rejected the claims that its mailing services have been hacked. Alphabet spokespeople provided updates and prompted multiple media outlets, including Mashable, to update their articles. Google openly called the statements about the severity of the cyber incident “entirely false”. 

Is there room for speculation?

Probably, as there really was an actual attack that was detected by Google’s Threat Intelligence Group (GTIG). They discovered the breach and realized that hackers had been able to lurk around internal systems by using social engineering techniques. Luckily, after investigating the cases, the cyber experts determined that the data the hackers managed to access certainly does not include all 2.5 billion Gmail users. The exposed information only included publicly available details about an unknown number of individuals and businesses.  

What does Google have to say about cybersecurity?

Google suggests users take advantage of password managers. Such safe password-storing options are often included in antivirus software solutions. It is advisable to enable two-factor authentication whenever possible. And ensure that all apps and operating systems are up to date. Last but not least, users are advised to avoid suspicious links and always be cautious of any means of communication that looks out of the ordinary, i.e., emails, text messages, and even social media posts. 

Last month’s breach was not as severe as everyone initially thought. Exposing the details of 2.5 billion users would have been a terrible turn of events for Gmail. Luckily, the breach was not as significant and did not include sensitive information. However, Google is no stranger to hacks, like almost all other high-profile tech companies. Cybercriminals are always on the lookout for more victims. And giant corporations and their users often fall prey to bad actors. Staying safe and protected is of great importance in this day and age.

The post Did hackers steal the details of 2.5 billion Gmail users last month? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/did-hackers-steal-the-details-of-2-5-billion-gmail-users-last-month/feed/ 0
Major credit bureau TransUnion discloses data breach affecting millions of Americans https://www.pandasecurity.com/en/mediacenter/major-credit-bureau-transunion-discloses-data-breach-affecting-millions-of-americans/ https://www.pandasecurity.com/en/mediacenter/major-credit-bureau-transunion-discloses-data-breach-affecting-millions-of-americans/#respond Wed, 03 Sep 2025 07:00:44 +0000 https://www.pandasecurity.com/en/mediacenter/?p=33758 major-credit-bureau-transunion-discloses-data-breach-affecting-millions-of-americans

TransUnion has filed data breach disclosures with the attorney general’s offices of Texas and Maine. According to the filings submitted to the authorities, a data…

The post Major credit bureau TransUnion discloses data breach affecting millions of Americans appeared first on Panda Security Mediacenter.

]]>

TransUnion has filed data breach disclosures with the attorney general’s offices of Texas and Maine. According to the filings submitted to the authorities, a data breach affecting millions of TransUnion customers occurred on July 28, 2025, and was discovered a couple of days later. Unknown hackers have stolen the personal information of nearly 4.5 million TransUnion customers. The exposed sensitive information was improperly stored on a third-party application. Currently, there is no information available on who is behind the attack and whether the stolen data has already been used for fraudulent activities. This is not the first time bad actors have targeted data belonging to the Chicago-based credit reporting agency. 

You might be interested in: 15 Tips to Protect Personal Information Online for 2023

Key takeaways

  • A major credit bureau, TransUnion, was hacked on July 28, 2025. The incident was discovered on July 30, 2025. 
  • The number of affected individuals is upwards of 4 million. The exposed details of some of the victims include Social Security Numbers (SSN), full names of the victims, and date of birth (DOB). 
  • Details about the accident, such as who is behind the attack and why it took days for TransUnion to discover the breach, remain a mystery
  • TransUnion has advised its customers to be vigilant for suspicious behavior and to take advantage of the 2-year free access to TrueIdentity online credit monitoring services 

Was TransUnion hacked again?

The major credit agency has not been directly hacked, but details belonging to millions of its customers were exposed by a third-party vendor on July 28, 2025. Bits and pieces of information belonging to nearly 4.5 million Americans were exposed to cyber criminals. In TransUnion’s filing to the state of Maine, company representatives have stated that ‘no credit information was accessed’. However, the residents of Maine are only a small percentage of the millions of people affected in the breach. The data breach filing in Texas lists various types of exposed information, including SSNs, DOBs, and full names. The number of affected Texans is more than twenty times higher than the number of victims residing in Maine.  

How bad is the TransUnion cybersecurity accident?

According to the Maine filing, the total number of affected individuals is 4,461,511. TransUnion reports that approximately 17,000 Maine residents and 358,000 Texas residents are affected by the cyber incident.  Although TransUnion is the smallest of the three major credit bureaus in the USA, the Illinois-based credit consumer reporting agency has more than 260 million clients on file and plays a significant role in shaping the credit ratings of nearly all adult Americans. 

Who is responsible for the TransUnion data breach?

The identity of the perpetrator(s) has not been revealed yet. TransUnion is collaborating with law enforcement agencies to gather more information about the attack. There is no definitive answer to whether the attack was state-sponsored or carried out by a money-driven hacker organization. There is no clarity about the whereabouts of the rest of the victims – it is very likely that, apart from the victims in Maine and Texas, there are affected residents from other states such as California, Illinois, and New York. 

What does TransUnion want victims to do?

Affected customers have begun receiving letters with more details about the incident. And the type of information that was exposed to the bad actors. TransUnion recommends that victims monitor their credit reports for fraudulent activity and invites them to utilize the company’s credit monitoring tool, TrueIdentity. TransUnion has agreed to provide 24 months of free credit monitoring to all the affected customers.

Luckily, not all affected individuals saw all their most sensitive information stolen. Some of the information exposed to the hackers did not include people’s SSNs, full names, or dates of birth. However, information belonging to everyone was exposed. Fraudsters will likely attempt to piece together the available data points to commit fraud. Having all your connected devices safely protected would undoubtedly make it harder for criminals who are looking to gain access to the whole picture, as proper antivirus coverage prevents them from revealing additional information about you and the rest of the victims.

The post Major credit bureau TransUnion discloses data breach affecting millions of Americans appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/major-credit-bureau-transunion-discloses-data-breach-affecting-millions-of-americans/feed/ 0
What are the differences between OpenAI’s GPT 5 and GPT 4o? https://www.pandasecurity.com/en/mediacenter/what-are-the-differences-between-openais-gpt-5-and-gpt-4o/ https://www.pandasecurity.com/en/mediacenter/what-are-the-differences-between-openais-gpt-5-and-gpt-4o/#respond Wed, 27 Aug 2025 07:00:54 +0000 https://www.pandasecurity.com/en/mediacenter/?p=33738 what-are-the-differences-between-openais-gpt-5-and-gpt-4o

Earlier this month, OpenAI released GPT 5, which they market as the company’s best AI system. OpenAI has hailed the new GPT update as its…

The post What are the differences between OpenAI’s GPT 5 and GPT 4o? appeared first on Panda Security Mediacenter.

]]>

Earlier this month, OpenAI released GPT 5, which they market as the company’s best AI system. OpenAI has hailed the new GPT update as its smartest, fastest, most useful model yet. The AI organization says the latest update is better than older variations, such as GPT 4o, because it features improved performance across multiple disciplines, including coding, math, writing, health, and visual perception. The new update can recognize whether users need a quick response or require a deeper and more advanced expert-level answer. OpenAI strongly believes that GPT 5 is more effective and significantly better than GPT 4o and is a solid contender to alternatives such as xAI’s Grok and Google’s Gemini

Key takeaways

  • The new GPT 5 was announced on August 7th, 2025, and was immediately deployed in OpenAI’s ChatGPT bot
  • The key differences between GPT 5 and GPT 4o consist of improved performance that is beneficial when the updated system is tasked with real-world queries
  • With the launch of GPT 5, OpenAI continues its quest against other strong contenders such as Grok and Gemini
  • GPT 6 is already in development, and OpenAI’s CEO, Sam Altman, wants it to focus on personalization 

When was GPT 5 launched? 

The new product by OpenAI was released on August 7th, 2025. The announcement came in the form of a blog post published on OpenAI’s main page and a live stream that highlighted the improvements. 

What are the key differences with GPT 4o?

OpenAI claims plenty of differences between the older system and the new one. Those revolve around the system’s ability to deal with real-world questions. Bots backed up by GPT 5 can be better at reasoning and context, and can also provide more adequate support on queries that include texts and images. GPT 5 is built to be faster and more efficient, and less prone to hallucinations. With better accuracy and a unified system, GPT 5 does not require manual model selection and uses a real-time router to choose between rapid responses and deep-thinking answers.  The new additions also include improved tone and personality of the bot, which aim to make the system’s responses more human-like. 

You might be interested in: How ChatGPT changed the world – a timeline

How does GPT 5 stack against other AI solutions?

Direct comparison is almost impossible due to the different methodologies used to evaluate the products. Still, generally speaking, OpenAI GPT 5’s top competitors are xAI’s Grok and Google’s Gemini. Each AI solution offers different perks depending on what matters most for the user; for instance, xAI is considered to provide more truth-focused responses. At the same time, GPT 5 is a solid choice for folks who value versatility

Do consumers need to do anything to use GPT 5?

Apart of updating the apps backed by GPT 5, users are not required to take any specific action to benefit from the update. The new system was automatically rolled out to ChatGPT users. OpenAI has confirmed that some paid users can revert to the “legacy model” GPT 4o. However, they are encouraged to use the improved version instead.

What to expect from GPT 6? 

Sam Altman has already confirmed that the new system is in development and will focus on enhanced memory. OpenAI wants the bot to answer questions correctly. It also aims for the bot to remember and understand its users. The goal is to create a more personal experience between humans and AI. Sam Altman plans to make GPT 6 compliant with government requests to maintain ideologically neutral grounds when federal government clients use the technology.

GPT 5 is accessible on various devices and platforms. Users can use it on both Android and iOS devices, as well as on PCs, laptops, and Macs. It is entirely up to the user how they get access to GPT 5-powered solutions. While having AI available is undoubtedly a plus, having strong antivirus software on all connected devices is an absolute must. There are solutions out there built to withstand some of the worst cyber-attacks.

Continue reading: How to protect your personal data when using ChatGPT and generative AI

The post What are the differences between OpenAI’s GPT 5 and GPT 4o? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/what-are-the-differences-between-openais-gpt-5-and-gpt-4o/feed/ 0
Is wireless usage increasing in the USA, and how is satellite connectivity helping? https://www.pandasecurity.com/en/mediacenter/is-wireless-usage-increasing-in-the-usa-and-how-is-satellite-connectivity-helping/ https://www.pandasecurity.com/en/mediacenter/is-wireless-usage-increasing-in-the-usa-and-how-is-satellite-connectivity-helping/#respond Fri, 22 Aug 2025 07:00:03 +0000 https://www.pandasecurity.com/en/mediacenter/?p=33684 is-wireless-usage-increasing-in-the-usa-and-how-is-satellite-connectivity-helping

The overall wireless usage has continued its steady growth in 2025 and is not planning on slowing down anytime soon. Americans continue to take advantage…

The post Is wireless usage increasing in the USA, and how is satellite connectivity helping? appeared first on Panda Security Mediacenter.

]]>

The overall wireless usage has continued its steady growth in 2025 and is not planning on slowing down anytime soon. Americans continue to take advantage of wireless communications as people become more reliant on smartphones and other wireless-connected devices such as smartwatches, tablets, and even cars. Wireless carriers continue to report an uptick in usage times, which is a call for improvements in the already-strained telecom networks and a sign that more partnerships with satellite companies are needed to keep up with the demand.

Satellite-to-mobile technology is already successfully implemented and is reducing stress on traditional ground networks. T-Mobile recently started a collaboration with Starlink, and the CTIA reported that over half a million messages and over a hundred wireless Emergency Alerts were distributed during the latest hurricanes and wildfires across the USA. Verizon and AT&T are also experimenting with the integration of satellite technology.

Key takeaways 

  • All three major carriers are continuing to experience an increase in wireless usage in 2025
  • T-Mobile first deployed a widely available satellite-to-mobile technology powered by Starlink 
  • Both Verizon and AT&T are experimenting with the integration of satellite technology and offer similar services
  • Improvements in wireless technology infrastructure and partnerships with companies that offer satellite-to-mobile solutions are necessary to meet customer demand
  • WhatsApp, AccuWeather, X, and AllTrails will soon be accessible via satellite internet

Will wireless usage slow down in 2025 and 2026?

It’s highly unlikely for wireless usage to decrease in 2025. People are becoming increasingly reliant on connected devices, and the demand for more wireless communications is likely to increase. The need for reliable communications becomes evident not only during rush hour but also when natural disasters hit and incapacitate local critical infrastructure. People’s demand for more data will continue to rise, and satellite internet will be of crucial importance during disasters. 

Who is the frontrunner in the satellite-to-mobile race right now?

T-Mobile is the wireless network that is the current frontrunner in the satellite-to-mobile implementation. The company struck a deal with Starlink and, after six months of beta testing, presented what they call “T-Satellite”. The service utilizes over 650 Starlink satellites that enable some T-Mobile users with newer phones to communicate with the rest of the world, even in areas with no regular coverage. 

Does the satellite technology come with limitations?

It does come with limitations, as not all smartphones can take advantage of it. Only newer smartphone models are compatible with the latest technology, which is, in some cases, limited to a specific type of wireless device, such as Android. While Verizon and AT&T have also recently confirmed partnerships with Starlink, they have also been experimenting with other solutions over the last few months. These alternatives were not able to provide satellite connections to Apple users. Luckily, both carriers are catching up well, as the solution became available to Apple users, too.  

How are increased wireless usage expectations going to be met in the future?

As people continue to upgrade their devices, more and more folks will have access to satellite wireless communication. Starlink is also continuously deploying more and more satellites to Earth’s lower orbit. Wireless carriers are undoubtedly going to continue to improve their on-ground infrastructure, too. 

What type of data can be transferred from mobile to satellite connections? 

Main priority is given to communication during natural disasters and SOS communications. Currently, messages-to-911 and direct-to-cell messaging services are available. However, by the end of the year, more apps will be adjusted so they can be utilized in areas with no regular wireless coverage. The list of applications that will likely be satellite-data friendly includes apps such as AllTrails, AccuWeather, WhatsApp, and even X.

The improvements and availability of satellite technology do not mean that we will see the end of wireless dead zones. However, the recent market improvements indicate that the industry is moving in the right direction, with an increasing number of solutions being introduced worldwide and satellite connections becoming more mainstream. However, being connected all the time, without any exceptions, also means that hackers could target anything anywhere… even if you are in the middle of nowhere, you could still potentially be a target of a cyberattack or government surveillance as your devices continue to be connected. Being prepared and ready to fight back against cyber criminals with antivirus software tools continues to be a must. 

The post Is wireless usage increasing in the USA, and how is satellite connectivity helping? appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/is-wireless-usage-increasing-in-the-usa-and-how-is-satellite-connectivity-helping/feed/ 0
The Best Antivirus for Gaming PCs in 2025: 6 Top Picks Compared https://www.pandasecurity.com/en/mediacenter/best-antivirus-for-gaming-pc/ https://www.pandasecurity.com/en/mediacenter/best-antivirus-for-gaming-pc/#respond Wed, 20 Aug 2025 15:56:21 +0000 https://www.pandasecurity.com/en/mediacenter/?p=33664 best-antivirus-for-gaming-pc

What’s the best antivirus for a gaming PC? For gamers who want performance-first protection, Panda Dome Premium stands out with its dedicated Gaming Mode, built-in…

The post The Best Antivirus for Gaming PCs in 2025: 6 Top Picks Compared appeared first on Panda Security Mediacenter.

]]>

What’s the best antivirus for a gaming PC?

For gamers who want performance-first protection, Panda Dome Premium stands out with its dedicated Gaming Mode, built-in VPN and system tune-up tools that enhance security without sacrificing speed.

In 2023, 6.06 billion malware attacks were detected around the world. That’s about 192 malware attacks every second. Imagine getting pinched 192 times a second — that’s what your PC would feel if it could!

And while many gamers believe antivirus software will slow down their system, the real threat is what you don’t see: viruses, spyware and hackers who can steal your login info, ruin your performance mid-match or even brick your rig.

If you’re a gamer, you need more than just basic protection. You need a smart antivirus that keeps you safe and your system fast. Features like gaming mode, low CPU usage and smart background scanning make all the difference. 

But not all antivirus programs are built for high-performance systems. Some are heavy, slow or interrupt gameplay with pop-ups and scans. Let’s cut through the noise and find the best antivirus for gaming PCs that blocks threats in real time, avoids interrupting gameplay and uses as few resources as possible.

The Best Antiviruses for Gaming PCs at a Glance

We compared six of the best antivirus programs for gaming PCs across key features, including real-time protection, performance impact, VPN access and more. Here’s a quick overview to help you see which tools check all the right boxes for your setup:

AntivirusLow RAM usage during gameplayPrice (Starting at)Free versionVPNGaming modeReal-Time monitoringDevice cleaningPassword manager
Panda Dome✅$34.99/year✅✅✅✅✅✅
Bitdefender✅$29.99/year✅✅✅✅✅✅
Malwarebytes✅$44.99/year✅✅✅✅❌❌
Norton✅$29.99/year❌✅✅✅✅✅
TotalAV✅$99/year✅✅✅✅✅✅
McAfee✅$39.99/year❌✅✅✅✅✅

1. Panda

Screenshot of Panda’s Game Mode UI Best for: 

  • Serious gamers who want top-tier security without losing performance
  • Families, streamers and anyone who wants an all-in-one suite with tools like a VPN, password manager and PC cleanup

Panda Dome stands out for its gamer-friendly design and smart resource management. Whether you’re grinding in an open-world RPG or competing in a high-stakes FPS, Panda works quietly in the background to keep your system protected without slowing you down.Its unique zero-trust security approach helps it detect threats early, even ones that haven’t been officially identified yet. This is thanks to its cloud-based AI, which constantly learns from millions of data points to block different types of malware before they can do damage.With five different plan levels, Panda lets you choose the exact level of protection you need. From lightweight free protection to full-featured Premium plans, it’s flexible, modern and built to protect what matters most to gamers.Key Features

  • Real-time protection with minimal performance impact
  • Smart Gaming Mode for uninterrupted play
  • AI-powered threat detection with zero-day protection
  • Built-in firewall to secure online connections
  • VPN for privacy and access to restricted games (Premium tier)
  • PC tune-up tools for better speed and performance
  • Password manager to store sensitive info securely
  • Parental controls for safer family gaming
  • Cloud-based scanning for faster, lighter antivirus checks

Pricing and Free Antivirus Options

Panda offers several plans for individual users to fit different needs and budgets:

PlanKey featuresAnnual price
Panda Dome FreeBasic antivirus with real-time scanningFree
Panda Dome EssentialAdds a firewall and Wi-Fi protection$34.99
Panda Dome AdvancedIncludes ransomware protection and identity theft defense$41.99
Panda Dome CompleteAdds a password manager and PC cleanup tools$53.99
Panda Dome PremiumFull package with unlimited VPN, premium support and all advanced features$56

2. Bitdefender

Screenshot of Bitdefender gaming antivirusBest for: 

  • Gamers who want fast, lightweight antivirus protection with strong malware detection
  • Users who care about privacy, webcam/microphone protection and safe online shopping

Bitdefender is known for its top-rated malware detection, quick scans and low impact on system performance — all things gamers love. 

Its Autopilot mode and Game, Movie and Work Profiles adjust settings automatically, so you won’t get interrupted mid-game. Bitdefender also uses behavior-based threat detection, which adds another layer of real-time security and helps avoid online gaming risks.

Compared to Panda, Bitdefender offers fewer extras in its lower tiers, like no built-in VPN unless you upgrade to Premium. Its interface can also be a bit more complex for first-time users. But when it comes to pure protection and smooth gaming performance, Bitdefender is one of the best.

Key Features

  • Advanced real-time threat detection and ransomware protection
  • Game, Movie and Work Profiles for automatic resource optimization
  • Autopilot mode for hands-off, intelligent security management
  • Cloud-based scanning to reduce system load
  • Multi-layer ransomware defense and file encryption
  • Safe online shopping and banking features (Safepay browser)
  • Webcam and microphone protection
  • Network threat prevention for safe online play

Pricing and Free Bitdefender Antivirus Options

Bitdefender offers both a free version and several paid plans, including:

PlanKey featuresAnnual price
Bitdefender Antivirus FreeReal-time antivirus and malware protection — no VPN or advanced toolsFree
Bitdefender Antivirus PlusAdds multi-layer ransomware protection, secure browsing and file shredder$29.99 (first year)
Bitdefender Total SecurityAdds system optimization, anti-theft and coverage for all OS types$59.99 (first year)
Bitdefender Premium SecurityFull plan with unlimited VPN, priority support and all advanced features$79.99 (first year)
Bitdefender Ultimate SecurityIncludes firewall, webcam protection and parental controls$89.99 (first year)
Bitdefender Ultimate Security PlusIncludes financial fraud protection and credit report monitoring$119.99 (first year)

3. Malwarebytes

Screenshot of Malwarebytes gaming antivirusBest for: 

  • Gamers who want fast, no-fuss protection with a clean interface
  • Users who prefer simplicity and strong malware defense without extra features they may not use

Malwarebytes is well-known for its strong malware and ransomware protection and its ability to detect threats that traditional antivirus tools sometimes miss. 

It’s lightweight, fast and simple to set up, making it a favorite for gamers who just want solid protection without slowing down their system. Its Play Mode automatically suppresses alerts during gaming or streaming.

That said, compared to Panda or Bitdefender, Malwarebytes has fewer built-in features. It lacks a full firewall, password manager and system cleanup tools. While it excels at keeping malware away, it may not be the best all-in-one solution for gamers looking for extra privacy or performance tools.

Key Features

  • Fast, lightweight malware and ransomware protection
  • Play Mode to silence notifications during full-screen gaming
  • Behavior-based threat detection for zero-day attacks
  • Clean, easy-to-use interface with minimal system impact
  • Web protection to block phishing and malicious sites
  • Exploit protection for vulnerable software and games
  • Optional VPN available in higher-tier plans

Pricing and Free Malwarebytes Antivirus Options

Malwarebytes keeps things simple with just a few plan options:

PlanKey featuresAnnual price
Malwarebytes FreeManual malware scanning only; no real-time protectionFree
Malwarebytes StandardProtection from malware, virus, ransomware and phishing, plus ad blocking$44.99
Malwarebytes PlusAntivirus, anti-malware, browser protection and no-log, ultra-fast VPN$59.99
Malwarebytes UltimateDevice security, VPN, identity protection and personal data remover$119.99

4. Norton

Screenshot of Norton gaming antivirusBest for: 

  • Gamers who want a well-rounded security suite with lots of extras
  • Families, streamers and users looking for identity protection and cloud backup, along with antivirus

Norton has been around for a long time, and it’s still one of the most trusted names in antivirus. It offers strong real-time protection, frequent updates and useful extras like cloud backup and dark web monitoring. 

Its Game Optimizer feature sets it apart for gamers, as it helps boost system performance by managing background apps and prioritizing CPU power for games.

However, Norton’s full features come at a slightly higher cost than others, and some tools, like the VPN and identity protection, are only available in top-tier plans. It’s also heavier on system resources compared to lightweight options like Malwarebytes, though its Game Optimizer helps balance that during gameplay.

Key Features

  • Game Optimizer to boost in-game performance
  • Real-time malware, spyware and ransomware protection
  • Smart firewall to block online threats
  • Dark web monitoring for identity theft alerts
  • 50GB to 500GB of cloud backup, depending on plan
  • Secure VPN included with most paid plans
  • Parental controls and school time monitoring (higher tiers)
  • Password manager to protect gaming and personal accounts

Pricing and Free Norton Antivirus Options

Norton offers several plans under its Norton 360 product line:

PlanKey featuresAnnual price
Norton AntiVirus PlusReal-time protection and firewall — no VPN or Game Optimizer$29.99 (first year)
Norton 360 StandardAdds VPN, dark web monitoring and 10GB cloud backup$39.99 (first year)
Norton 360 DeluxeAdds Game Optimizer, parental controls and 50GB cloud backup$49.99 (first year)
Norton 360 Select PlusIncludes identity theft protection, credit monitoring and 100GB cloud backup$99.99 (first year)

5. TotalAV

Screenshot of TotalAV gaming antivirusBest for: 

  • Gamers who want a beginner-friendly antivirus with strong core protection and helpful performance tools
  • Users who want one-click optimization and privacy features without digging through settings

TotalAV is one of the newer players in the antivirus space, but it’s earned a solid reputation for ease of use and effective malware detection. 

It offers real-time protection, a system tune-up tool and a WebShield to block unsafe websites — all in a clean, easy-to-use dashboard. Its low system impact makes it a great choice for gamers who want protection without annoying slowdowns.

That said, TotalAV’s free version is very limited, offering only on-demand scans. Also, its VPN, ad blocker and advanced features are only available on the higher-paid tiers, which can be more expensive than similar options like Bitdefender or Panda.

Key Features

  • Real-time antivirus and ransomware protection
  • System optimization tools to reduce lag and free up space
  • WebShield for safe browsing and phishing protection
  • Ad blocker to speed up gaming-related web use
  • VPN included in higher-tier plans
  • Easy-to-use interface with one-click scans and cleanup
  • Identity protection — U.S. only, higher tiers

Pricing and Free TotalAV Antivirus Options

TotalAV offers one of the best free malware scanners, but real protection starts with a paid plan:

PlanKey featuresAnnual price
TotalAV FreeOn-demand malware scanning only — no real-time protectionFree
TotalAV PremiumReal-time protection, system optimization and WebShield$99
TotalAV Internet SecurityAdds VPN (Safe Browsing)$129
TotalAV Total SecurityAdds ad blocker and password manager$149

6. McAfee

Screenshot of McAfee gaming antivirusBest for: 

  • Gamers who want multi-device coverage, strong identity protection and solid antivirus performance
  • Families or streamers who use multiple platforms and want all-in-one security

McAfee has come a long way in recent years, offering a smoother, faster experience that works well on gaming PCs. 

Its real-time protection and firewall block threats without dragging down performance, and the Gamer Security version (previously a standalone product, now integrated into McAfee+ tiers) is designed specifically to prioritize CPU power for games.

Still, McAfee uses more system resources than lighter options like Malwarebytes and Panda Dome. Plus, many of its best features — like VPN and identity monitoring — are only in the top tiers. But if you’re looking for cross-device protection with privacy and optimization tools, McAfee is a strong pick.

Key Features

  • Real-time antivirus and anti-phishing protection
  • Performance optimization to reduce lag and improve speed
  • Secure VPN included in most paid plans
  • Identity monitoring for personal data leaks
  • Personal data cleanup from risky data broker sites (higher tiers)
  • Multi-device protection across Windows, macOS, Android and iOS
  • Gamer-friendly performance settings in McAfee+ plans

Pricing and Free McAfee Antivirus Options

McAfee focuses on paid protection, but offers strong value in its bundles:

PlanKey featuresAnnual price
McAfee Free ToolsLimited tools like web protection and password manager trialsFree
McAfee+ Premium IndividualReal-time protection, VPN, password manager$49.99 (first year)
McAfee+ Advanced IndividualAdds features like identity monitoring and personal data cleanup$89.99 (first year)
McAfee+ Unlimited IndividualAdds features like $2M ID theft coverage and security freeze tools$199.99 (first year)

How to Choose an Antivirus for Your Gaming PC

Picking the best antivirus software for a gaming PC isn’t just about staying safe — it’s about protecting your investment and making sure nothing interrupts your gaming experience. 

Here’s what to look for in the best security software for gaming PCs:

  • Performance impact: Look for antivirus programs that work in the background without slowing down your games. A tool that eats up CPU or RAM during a match can ruin your experience.
  • Robust threat detection/protection: Gaming PCs are targets for malware, ransomware and phishing, especially when downloading mods or using voice chat. You need reliable, real-time protection to stay safe.
  • Dedicated gaming mode: The best antivirus tools offer a gaming mode that pauses scans, updates and pop-ups while you play. This keeps your sessions smooth and uninterrupted.
  • Resource usage: Check for tools with low RAM and CPU usage. Many programs publish benchmarking data so you can see how they perform during gaming.
  • False positives and game files: If you mod games or develop them, some antivirus tools might wrongly flag your files. Choose software that allows exceptions or has a strong track record with gamer communities.
  • UI and gamer friendliness: A clean, simple interface makes it easier to manage your settings. Bonus points for dashboards that show gaming status or performance tools.
  • Cross-device security: Many gamers stream or use mobile apps while playing. A good antivirus should protect game and stream setups and offer safe mobile gaming tools, too.
  • Customer support: If something goes wrong, quick and knowledgeable support is a must, especially for fixing false flags or restoring quarantined files.

Whether you’re a casual player or a full-time streamer, these features will help you avoid the risks of online gaming for kids and adults alike while keeping your rig running at full power.

Why Gamers Need Antivirus

Even the most experienced players can get caught off guard. Hackers are getting rich through gamers — stealing logins, draining accounts and spreading malware through tools disguised as mods, cheats or game cracks.

From Discord token stealers to phishing links in gaming communities, the threats are real and growing. Some malware even hides in popular platforms like Cheat Engine or shady performance boosters, tricking users into installing dangerous files. You need a solid antivirus to spot these risks and stay safe while gaming or streaming.

Level Up Security for Your Gaming Antivirus With Panda

Still not sure which is the best antivirus for your gaming PC? Well, the ideal gaming antivirus should offer real-time protection, a dedicated gaming mode and low resource usage to keep your system running smoothly. 

Panda Dome checks all these boxes, with advanced AI-powered detection, gaming mode for uninterrupted play and a proactive approach to blocking emerging threats like malware, ransomware and phishing scams. For budget-conscious gamers, Panda has a free version that offers great security.

Compare Panda Dome plans, pick one that best fits your needs and protect your gaming rig.

The post The Best Antivirus for Gaming PCs in 2025: 6 Top Picks Compared appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/best-antivirus-for-gaming-pc/feed/ 0
UK’s Online Safety Act Comes into force – and runs into problems immediately https://www.pandasecurity.com/en/mediacenter/uks-online-safety-act-comes-into-force-and-runs-into-problems-immediately/ https://www.pandasecurity.com/en/mediacenter/uks-online-safety-act-comes-into-force-and-runs-into-problems-immediately/#respond Thu, 07 Aug 2025 07:13:05 +0000 https://www.pandasecurity.com/en/mediacenter/?p=33636 uks-online-safety-act-comes-into-force-and-runs-into-problems-immediately.

The UK’s Online Safety Act, fully enacted in July 2025, mandates strict age verification for accessing certain online content to protect minors. Anyone living in…

The post UK’s Online Safety Act Comes into force – and runs into problems immediately appeared first on Panda Security Mediacenter.

]]>

The UK’s Online Safety Act, fully enacted in July 2025, mandates strict age verification for accessing certain online content to protect minors. Anyone living in the UK will now need to prove their age before browsing adult websites.

This has led many users to seek ways to bypass these restrictions, particularly using a virtual private network (VPN). In this article, we’ll explore how to bypass UK age verification with a VPN, why it’s effective, and the broader implications for adult users facing censorship of legitimate content. 

If you’re frustrated by prompts requiring ID uploads or facial scans on sites like Pornhub or Reddit, or even censored content on X and Facebook, a VPN offers a simple solution to regain unrestricted access. We’ll cover step-by-step methods, potential risks, and reasons adults are turning to this tool amid concerns over privacy and free expression. By the end, you’ll understand how to navigate these changes securely.

Key takeaways

  • The UK’s Online Safety Act requires age checks on platforms with potentially harmful content, but VPNs easily bypass them by masking your IP address.
  • Bypassing involves connecting to a non-UK server, allowing access without verification prompts.
  • Adults use VPNs to avoid censorship of legitimate topics like news on global conflicts, local politics or health discussions.
  • Opt for paid VPNs like Panda Dome VPN Premium for better security; free ones may pose risks.
  • While effective now, the UK Government is already considering plans to ban VPNs in the future.

How does a VPN bypass UK age verification?

A VPN bypasses UK age verification by rerouting your internet traffic through a server outside the UK. This makes it seem like your computer (or smartphone) is based in another country. This avoids triggering the Act’s IP-based detection on restricted sites.

Setting up a VPN connection is simple and takes just a few minutes. You simply select a reliable VPN provider, download their app, and connect to a server in a country like the US or Netherlands. 

Once active, you can visit any age-restricted site; verification prompts disappear because the website detects that you are visiting from a non-UK location. For instance, users on Reddit have reported seamless access to age-gated subreddits after switching servers. 

This workaround is both effective and popular. Stats show VPN downloads surged up to 1,800% after the Act came into force. There are suggestions that under-18s have accounted for much of this increased interest, causing concerns for legislators.

VPNs can circumvent UK age restrictions because the Act targets UK IP addresses only, not global users. Some platforms like Pornhub have taken a more robust approach, blocking entire geographic regions, however VPNs circumvent this too.

Why do adult users want to use a VPN for bypassing censorship?

In addition to blocking unquestionably adult websites (like pornography and gambling), the Act demands that all sites censor content that may cause “harm” to minors. This has led to an increase in censorship of relatively trivial content for fear of prosecution by the UK regulator OFCOM. 

Platforms like X and Reddit blocking or age-gating posts on topics such as the Gaza conflict or Ukraine war, misclassified as “harmful.” This isn’t just about adult entertainment; educational forums on mental health, like eating disorder support, now require verification, limiting adults’ access to vital resources. 

Adult users are turning to VPNs to access legitimate content censored under the broad umbrella of the Online Safety Act, which has led to overreach affecting free speech and privacy. A petition with nearly 500,000 signatures demands repeal of the ACT, citing privacy risks from sharing IDs or facial data, which could lead to breaches.

Impacts on legitimate content access

No one denies that preventing children from accessing adult content is a good idea. However, the vague and over-reaching terms of the Act is having a detrimental effect on free speech in the UK:

  • Privacy erosion: Verifying age often means uploading sensitive info, deterring users from engaging in discussions on politics or health.
  • Over-censorship examples: News articles on global events are hidden behind prompts, as platforms fear fines up to 10% of global revenue.
  • Public sentiment: Polls indicate only 24% of Britons think the Act effectively protects kids, down from 34%, with many viewing it as excessive Government surveillance.
  • Broader implications: It creates a divided internet, where unverified users miss out on democratic discourse – including broadcasts from UK Parliament itself – prompting a 300% rise in VPN searches.

Experts note that the UK’s legislation sets a precedent for global online regulation, potentially spreading to other nations and further eroding anonymity and privacy for citizens.

Conclusion

Bypassing UK age verification with a VPN is a practical response to the Online Safety Act’s restrictions, enabling access to both restricted and legitimate content without compromising privacy. Key methods involve simple server switches, while adults benefit by evading censorship of essential information. 

For a secure online experience, consider exploring reputable VPN options to maintain your digital freedom. If you’re dealing with similar issues, test a VPN trial today and share your experiences in privacy-focused communities.

For parents, a more robust and effective way to shield their children from adult content is to use a Parental Control tool. Panda Dome Parental Control automatically filters and blocks inappropriate content – and prevents the use of third-party VPNs for total security.

The post UK’s Online Safety Act Comes into force – and runs into problems immediately appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/uks-online-safety-act-comes-into-force-and-runs-into-problems-immediately/feed/ 0
How to Download Your Personal Data from Facebook: A Step-by-Step Guide https://www.pandasecurity.com/en/mediacenter/how-to-download-your-personal-data-from-facebook-a-step-by-step-guide/ https://www.pandasecurity.com/en/mediacenter/how-to-download-your-personal-data-from-facebook-a-step-by-step-guide/#respond Mon, 14 Jul 2025 07:00:28 +0000 https://www.pandasecurity.com/en/mediacenter/?p=33549 how-to-download-your-personal-data-from-facebook-a-step-by-step-guide

For long time Facebook users, the social network is an important record of our digital history. So, if you’ve spent years sharing photos, posts, and…

The post How to Download Your Personal Data from Facebook: A Step-by-Step Guide appeared first on Panda Security Mediacenter.

]]>

For long time Facebook users, the social network is an important record of our digital history. So, if you’ve spent years sharing photos, posts, and memories on Facebook, you might want to keep a copy of that data.

As Dr Ilka Gleibs, professor of social psychology at the London School of Economics says, “The word ‘data’ makes it sounds like we’re talking about numbers, but what we’re really talking about is our friendships, our relationships, our memories, our ups and our downs.” A Facebook download provides an easy trip down memory lane, allowing you to review much of your recent personal history.

Whether you’re planning to leave the platform or just want a personal backup, Facebook offers a straightforward way to download your information. This guide walks you through the process, highlights what you can expect to receive, and shares tips for protecting your data.

Key Takeaways

  • You can download a copy of your Facebook data, including posts, photos, groups, and more.
  • The process is customizable, letting you select specific types of information.
  • Downloads are available for a limited time after your request is processed.
  • Some deleted or very old content may not be included in your download.

How Do You Download Your Facebook Data?

Facebook provides a built-in tool to help you download your personal data. Here’s how to access and use it:

1. Go to Your Facebook Settings

  • Click your profile picture in the top right corner.
  • Select Settings and privacy, then choose Settings.

2. Navigate to Download Your Information

  • In the left-hand menu, find and click Download your information

3. Start the Download Process

  • Click Continue then select Download or transfer information

4. Choose What to Download

  • Pick which profiles you want to save information from (if you manage more than one).
  • Click Next to move to the selection screen.

5. Select Data Types and Date Range

  • Decide how much information you want to download.
  • Use the Specific types of information option to narrow your selection (e.g., posts, photos, groups).
  • You can also get a copy of your data logs that outlines your online activity.

6. Choose Delivery Method

  • Decide whether to download the data to your device or transfer it to another service.

7. Submit Your Request

  • After making your selections, submit your request.
  • You’ll see a pending status while Facebook processes your data.

8. Download Your Data

  • Once the download is ready, you’ll receive a notification.
  • You have four days to download your data before the link expires. If that happens, you will need to repeat this process.

What’s Included in Your Facebook Download?

So what kind of information will you get back from Facebook?

  • Posts and photos you’ve shared
  • Photos you’re tagged in
  • A list of your friends and the groups you are a member of
  • Search history and ad interactions
  • A list of connected apps (like other apps that use the Facebook login service for instance)

You should note that content you have deleted and some older data may not be available, depending on Facebook’s storage policies.

Tips for Managing Your Downloaded Data

Social media data is particularly sensitive, so you should take steps to protect your new download:

  • Store your data securely, as it may contain sensitive personal information.
  • Review your download for accuracy and completeness.
  • Consider deleting your download from shared devices after review.
  • It’s extremely unlikely the download will have been compromised, but you should always scan every incoming file for malware – including your Facebook export.

Conclusion

Downloading your Facebook data is a smart way to preserve your digital memories and maintain control over your online presence. It’s also a great way to recover cherished photos that you may have lost or accidentally deleted. 

By following these steps, you can easily create a personal backup of your information. 

FAQ

How long does Facebook take to process a download request?

Processing time can vary based on the amount of data, but you’ll receive a notification when your download is ready. You should allow up to four days for your request to be processed.

Can I select only certain types of data to download?

Yes, Facebook lets you customize your download by data type, date range, and more. So if you only want your photos, you can deselect all the other options.

What if I miss the four-day window to download my data?

You’ll need to submit a new request if your download link expires.

Continue reading: Was the data of 64 million McDonald’s applicants left protected only by a flimsy password?

 

The post How to Download Your Personal Data from Facebook: A Step-by-Step Guide appeared first on Panda Security Mediacenter.

]]>
https://www.pandasecurity.com/en/mediacenter/how-to-download-your-personal-data-from-facebook-a-step-by-step-guide/feed/ 0