Over 1 million tech questions and answers.

Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products

Q: Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products

A vulnerability in the Panda 2016 products that allows the execution of code with elevated permissions has been detected in Small Business Protection and Panda 2016 products. The PSEvents.exe process is periodically run with elevated permissions and has dependencies of libraries located both in the default directory as well as in other system libraries. As the USERS group has Write permissions over the folder where the PSEvent.exe process is run and because the system first looks for libraries run by this process in the execution folder, it may be possible to create a malicious library in the execution folder that will replace one of the libraries installed in other folders. Therefore, a user could run malicious code with SYSTEM privileges.

Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products - Technical Support - Panda Security

Read other answers
Preferred Solution: Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)


Versions 5.0 ? 7.0 of ESET Smart Security and ESET Endpoint Security products for Windows XP OS allow a low privileged user to execute code as SYSTEM by exploiting a vulnerability in the ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver also mentioned as Personal Firewall module: Build 1183 (20140214) and prior. This is a ?trusted value vulnerability? that can be triggered through a specific IOCTL with a specifically crafted buffer, to force the driver to validate an improper IOCTL.


A:Privilege Escalation In ESET Products For Windows

This was patched, wasn't it?
"27/06/2014 | Fix confirmed"

Read other 1 answers

Latest, and possibly earlier builds, of the PavTPK.sys kernel mode driver of Panda Security software suffers from a heap overflow bug that allows any user to elevate their privileges through an IOCTL request and execute code as SYSTEM by controlling the EIP via a corrupted kernel object.

Upon unsuccessful exploitation the system will crash with a BSoD.
This driver is loaded into kernel memory during boot time and stays resident without touching the disk later.

All Panda Security products using the faulty driver were foujnd to be vulnerable.


A:Privilege Escalation in Panda Security

22/07/2014 Fix confirmed

Read other 1 answers

Lutomirski had recently reported the CVE-2014-9090 which was caused due to improper handling of faults associated with the Stack Segment (SS) register on the x86 architecture. After notification of CVE-2014-9090, Borislav Petkov pointed out to Lutomirski some further flaws that existed even after vulnerability.  After  research Lutomirski discovered that there were two bugs in the improper handling of Stack Segment (SS) register.  The new kernel kernel vulnerability is now identified CVE-2014-9322 and allows potential hacker to  gain privilege escalation on all X86_64 systems.
“Any kernel that is not patched against CVE-2014-9090 is vulnerable to privilege escalation due to incorrect handling of a #SS fault caused by an IRET instruction. In particular, if IRET executes on a writeable kernel stack (this was always the case before 3.16 and is sometimes the case on 3.16 and newer), the assembly function general_protection will execute with the user’s gsbase and the kernel’s gsbase swapped,” Lutomirski explained in an advisory.
He added that, “This is likely to be easy to exploit for privilege escalation, except on systems with SMAP or UDEREF. On those systems, assuming that the mitigation works correctly, the impact of this bug may be limited to massive memory corruption and an eventual crash or reboot.”
Privilege Escalation Vulnerability in Linux #CVE-2014-9322

Read other answers

Security researchers have find out ways to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system.
The technique, dubbed "rowhammer", was outlined in a blog post published Monday by Google's Project Zero security initiative, a team of top security researchers dedicatedly identifies severe zero-day vulnerabilities in different software.
Rowhammer is a problem with recent generation DRAM chips in which repeatedly accessing a row of memory can cause "bit flipping" in an adjacent row which could allow anyone to change the value of contents stored in computer memory.
DDR memory is arranged in an array of rows and columns, which are assigned to various services, applications and OS resources in large blocks. In order to prevent each application from accessing the memory of other application, they are kept in a "sandbox" protection layer.
However, Sandbox protection can be bypassed using Bit flipping technique in which a malicious application needs to repeatedly access adjacent rows of memory in a tiny fraction of a second.
As a result, hammering two aggressor memory regions can disturb neighbouring locations, causing charge to leak into or out of neighbouring cells.

DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation

A:DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation

Program for testing for the DRAM "rowhammer" problem
The test should work on Linux or Mac OS X, on x86 only.

Read other 4 answers

Remark:   I have NOT personally experienced (or at least, not noticed) these errors, so I can't offer any first-hand comments.   Rather, I am simply alerting Panda Anti-Virus users to a thread that's posted in the Panda forum, in case someone here is also suffering from the symptoms.
As of 24 April, Panda is experiencing a global issue with Consumer and Corporate products, where these are the symptoms:- PsEvents.exe errors- PSExpCampaign.exe errors- Installation problems (2132 error in Corporate products)
We ... are already studying the issue.We will communicate any update in this thread.Sorry for the inconveniences
Those interested should see http://support.pandasecurity.com/forum/viewtopic.php?f=93&t=6276&sid=6fcec6f395bc377b0658f72b32774a6c

A:Panda: PsEvents.exe & PSExpCampaign.exe errors

I kept ggetting a pop up about PSEvents.dll not working...or words to that effect.
Seems to be gone today.

Read other 1 answers

I have been investigating on the privilege escalation vulnerability when we use methods of named pipe. This vulnerability is reported for Windows Server 2000 as per bulletin -
Microsoft Security Bulletin MS00-053 -  Critical and Windows Server 2008 as per bulletin -
Microsoft Security Bulletin MS10-059 - Important.

The similar vulnerability is also reported for Windows Server 2012 in bulletin - Microsoft Security Bulletin MS15-050 - Important. I just want to make sure
that, whether the vulnerability identified for Windows Server 2012 is also due to use of the
CreateNamedPipe method and impersonation or due to some different reason. 
If this vulnerability mentioned in the bulletin - Microsoft
Security Bulletin MS15-050 - Important, is not related to Named Pipe, then is there other vulnerability with Named pipe which leads to privileges escalation?


Read other answers

Lenovo Security Advisory: LEN-2015-011
Potential Impact: Execution of arbitrary code
Severity: Medium

Multiple vulnerabilities have been identified within Lenovo System Update (previously known as ThinkVantage System Update). Lenovo has released a new version of the Lenovo System Update software that addresses these vulnerabilities.

Lenovo System Update validates all system update files as they are downloaded from the Lenovo servers. However, if the local system contains malware, it is possible that the downloaded updates could be altered before installation creating a race condition. The latest Lenovo System Update release eliminates this possibility. Lenovo System Update uses a service called SUService.exe to run system updates. As part of the authentication and validation process the service only accepts commands if a valid security token is passed along with the command. Vulnerabilities were discovered on how the security tokens were generated allowing an attacker to run commands. The latest Lenovo System Update release fixes the token authentication flaws.
Other security issues were also addressed in this update.
Mitigation Strategy for Customers (what you should do to protect yourself):
Starting from April 1, 2015, run Lenovo System Update and install the latest version of the application, version 5.06.0034 or later. You can determine the currently installed version by opening Lenovo System Update, clicking on the green question mark in the ... Read more

A:Lenovo System Update Privilege Escalation

Bundleware/ Crapware: This is why I do a clean install on a brand new PC.

Read other 1 answers

Have a few computers missing this (MS15-058) Microsoft SQL Server Privilege Escalation (3065718) patch.

Get access denied just by trying to run the patch: SQLServer2008-KB3045305-x64.exe even though I'm logged in with my domain admin account.

I do a run as administrator with my domain admin account and GUI will start but will still fail with Setup account privileges failed.

Local admin account has same problem.
Screen shots attached.

Has anyone come across a problem like this??

A:(MS15-058) Microsoft SQL Server Privilege Escalation (3065718)

at what Service Pack level is your SQL Server install?
I am NOT any kind of expert in domain permissions! - have you checked the two links in the error message?

It's always possible that there is registry corruption present which is preventing access to certain keys - that's also worth checking.

Read other 1 answers

hi guys

There is a way to deny interactive logon to a workstation but permit the priviledge escalation(run as)?
I tried with this local GPO

Use Computer Configuration / Windows Settings / Security Settings / Local Policy User Rights Assignment
to set Deny logon locally for this account.

but it does not work because deny also the privilege escalarion or run as...not only the interactive logon. We would need for some Laptop in workgroup

tanks a lot!

Read other answers

The Linux kernel 2.6.0 through, and 2.4.4 through, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.http://web.nvd.nist.gov/view/vuln/detail?v...d=CVE-2009-2692What this amounts to is that someone with physical access to an affected computer could gain root and wreak havoc. Debian and Ubuntu have already released patches and users are urged to update immediately through their distro's update utility.Proof of concept code for an exploit is already available.

Read other answers

I have 6 months trial license all of them. Which one do you recommend?

Thank you in advance.

Best regards.


A:Avast IS 2016 / Panda IS 2016 / Bitdefender IS 2016

What kind of system do you have?
Panda and Avast are the lightest while Bitdefender can be heavy.

All 3 offer excellent protection (Avast requires tweaking; Bitdefender and Panda works out of the box), while Bitdefender is mainly known for its detection rate (signatures).

Try the 3 of them (trial versions, not the 6 months) and see which one you prefer.

In terms of UI, all 3 are user friendly.

Have a look here for Avast and Bitdefender info:
KIS 2016 vs NIS 2016 vs BIS 2016 vs Avast IS 2016 vs Trend Micro IS 2016

Read other 4 answers


A privilege elevation vulnerability exists in the way that Microsoft Windows starts applications with specially crafted file manifests. This vulnerability could allow a logged on user to take complete control of the system

Affected Software:

• Microsoft Windows XP Service Pack 2
• Microsoft Windows Server 2003
• Microsoft Windows Server 2003 for Itanium-based Systems




Read other answers

We recently updated our ATA installation to version 1.6 and we're getting a lot of "Privilege escalation using forged authorization data" alerts in the console.  We can see that the information is all for an application we use company wide
called Projectwise and the software appears to be generating these even though everything is operating as expected.  Is there anyway we can mark a bunch of these as dismissed in bulk instead of having to go through each one?  Or has anyone tried
to dig into these sorts of alerts with a software vendor to try and find out why the traffic is coming up suspicious?  We've got over 500 of them in 3 days, so it's getting a bit out of hand...

Read other answers

I understand its Free vs Paid product comparision but anyway

A:F-Secure Internet Security 2016 vs Panda Free Antivirus 2016

If a security soft ranks amongst the top performing AVs, it won't matter much if it does function correctly or causes problems on your specific system.

From lab test results F-Secure has an edge over Panda during testing the past few years in terms of detection (although higher false positives).

From users, it seems more prefer Panda - which is one of Neil Rubenking's (PCMag) favs (that don't mean much - but that is just my opinion).

I'd say, in terms of overall protection, Panda has a slight edge; it might protect your system in a few instances that F-Secure will not.

Read other 2 answers

I'm with security issue CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability and the following occurs to me:

I'm having trouble starting to collect events 5827-5831
I have installed the August 2020 update on a DC Microsot Windows Server 2012 R2 to start the event collection, and no events appear, even when logging in with Microsoft Windows Server 2012 without the August update.

I have set the FullSecureChannelProtection registry key to 1, and from a server with Microsoft Windows Server 2012 without the August 2020 update I can login without problems.

No events appear in the security log and I can login without problems with FullSecureChannelProtection at 1. I don't understand where the problem is. Can anyone give me any clues?

sorry for my english

Read other answers

Hello there everyone,

I'm actually on Kaspersky Antivirus v2016, and i was wishing to go to the freeware side. But i definitly do not want to sacrifice security. Does Panda offer same or even better security than Kaspersky, or shall i rather stay where i am?

Any opinions are welcome.. Thanks in advance

A:Panda 2016 Free vs Kaspersky Antivirus 2016

without doubt, i'd choose kaspersky antivirus

Read other 2 answers

Hi everyone,
Our Nessus scanner detected the following vulnerability :


The version of Microsoft Malware Protection Signature Update Stub (MpSigStub.exe) installed on the remote Windows host is prior to 1.1.16200.1. It is, therefore, affected by a elevation of privilege vulnerability which could allow an attacker who successfully
exploited this vulnerability to elevate privileges on the system.


Enable automatic updates to update the scan engine for the relevant antimalware applications. Refer to Knowledge Base Article 2510781 for information on how to verify that MMPE has been updated.

Plugin Output
Product : Microsoft Malware Protection Signature Update Stub
Path : C:\Windows\System32\MpSigStub.exe
Installed version : 1.1.15000.2
Fixed version : 1.1.16200.1
I don't understand how to fix that issue, is there any patches ?

Read other answers

With this latest vulnerability, i need some clarification about what exactly is a "Non-Compliant Device".
In the KB articles definition, A non-compliant device is one that uses a vulnerable Netlogon secure channel connection.
So that means, lets say you have a Windows machine, that has not been patched correctly, and still uses vulnerable netlogon connection.
So once the DC is patched for this vulnerability, what will happen to this Windows machine?
Will it get denied connection and be reported in event ID: 5827/5828?
Or will it be allowed connection, as it is technically a non-compliant device based on the definition, as it is using vulnerable netlogon connection? And be logged under event ID: 5829?

The other question i have is for the use of the GPO policy: "Domain controller: Allow vulnerable Netlogon secure channel connections"
So i understand that this will bypass the enforcement.
However, if the "Non-Compliant" device is not a windows device, i will assume that the GPO will not work for these devices. So when in enforcement phase, for these such non windows devices that is still using vulnerable netlogon connection, there
is no workaround right? Either get vendor to provide a fix or decommission?

Thanks DM.


Read other answers


Stickying this for a week or so

A vulnerability was discovered in the ICQ instant messaging protocol
parsing routines of the ISS Protocol Analysis Module (PAM) component.
The PAM module is a shared component of all current ISS host, server,
and network protection software and devices. The flaw relates to
incorrect parsing of the ICQ protocol which may lead to a buffer
overflow condition.

Affected Versions:

RealSecure® Network 7.0, XPU 22.11 and before
RealSecure Server Sensor 7.0 XPU 22.11 and before
RealSecure Server Sensor 6.5 for Windows SR 3.10 and before
Proventia™ A Series XPU 22.11 and before
Proventia G Series XPU 22.11 and before
Proventia M Series XPU 1.9 and before
RealSecure Desktop 7.0 ebl and before
RealSecure Desktop 3.6 ecf and before
RealSecure Guard 3.6 ecf and before
RealSecure Sentry 3.6 ecf and before
BlackICE™ Agent for Server 3.6 ecf and before
BlackICE PC Protection 3.6 ccf and before
BlackICE Server Protection 3.6 ccf and before

The vulnerability is caused by insufficient size checks on certain
protocol fields in ICQ response data. After examining the nature of
this vulnerability, ISS X-Force™ believes that exploitation of this
issue is possible. It would not be necessary for ICQ response data to
be part of a legitimate ICQ session to trigger this issue.


The Protocol Analysis Module (PAM) facilitates the parsing of network
protocols in order to perform further analysis and attack detection.
IC... Read more

Read other answers

I know some of you are awaiting the 2010 security products from anti-virus vendors, so I wanted to make a very quick announcement that Panda Security launched its 2010 retail products today. There?s some substantial improvements in 2010, including 80 percent performance improvement over previous versions. The 2010 products once again integrate Panda?s Collective Intelligence cloud scanning technology, which we also use in our free Cloud Antivirus product.

I?ll avoid going into a long spiel here, but wanted to give a quick heads up to those who are keeping track of the annual updates.

Sean-Paul, Panda Security

Read other answers

I'd like to include Dell's list of affected systems here: http://spywarehammer.com/current-news/intel-vulnerability/msg155913/#msg155913My search at Dell produced no results. Does a list exist?

Read other answers

My dealings with Panda seem to indicate the company is a SCAM!...

Here is my last e-mail to them dated December 11:

I have sent this e-mail this morning to [email protected] and so far NO ANSWER!

Problem with "Disinfect my PC" for $12.95....


I subscribed to the above and after filling in all the credit card details and completing the purchase, NO page summary/receipt followed: instead, the next page wanted my credit card information all over again, so I tried to go back to the previous page to print a receipt to no avail...

It seems that I would have to go through the same process and pay a second time to get proof of payment: what is going on, as I have received no service and no confirmation e-mail?...

After having apparently LOST my $12.95, I have tried AGAIN to buy a Panda product, the Active ScanPro advertised at $19.95 for 1 year I presumed...


...but when clicking the buy button, the price becomes $29.95 for 2 years and there is no other alternative:


This is FALSE advertising and I now believe that Panda is just another SCAM that I am going to report as such....

Read other answers

Panda software retail and corporate products UK support...

Ladies and gentlemen let me just start by saying that the following post is not officially endorsed by panda software and they annot be held liable for anything contained within it.

Right, on to the meat and two veg of this post. A brand-new technical support team and department has been set up for Panda software retail and corporate customers in the united kingdom, or any native english customers who buy our product online abroad and it is hot. To all customers who have had previous problems with technical support such as not receiving responses or getting the runaround this is now a thing of the past. We have cleared the backlog we took on when we started a month ago and are now answering emails usually within a couple of hours tops, slightly longer if we have to escalate it.

I am not here to tell you to buy the product or spam any sales links, I am here completely unprompted just to try and shake a bit of this bad press from the internet and hopefully prove to you that panda technical support in the UK is now really up and running.

I cannot speak for U.S. or rest of the world departments, only the U.K. and customers who buy through our store.

So umm yeah that's it really... any UK customers that want to email tech support DO NOT go through the .com site go through our UK one http://www.pandasoftware.co.uk/

Hopefully this can restore some of the faith in our service, because we know we have a good product... Read more

Read other answers

Which av is best ?

BD Free is not compatible with Windows 10

A:Bitdefender free 2016 vs Panda free 2016 vs Avira free 2016


This is my Top from what you listed.

Read other 12 answers

"Kaspersky Lab today announced the release of the latest versions of its flagship security solutions for home users ? Kaspersky Anti-Virus, Kaspersky Internet Security and Kaspersky Total Security. The latest solutions protect what matters most to consumers ? their privacy, data, digital identity and money ? across PC, Mac and Android devices. With new features like Private Browsing, Kaspersky Lab is providing advanced protection of consumers? online privacy."Click to expand...

Source: http://www.businesswire.com/news/ho...Lab-Announces-Latest-Line-Consumer-Protection

(official post pending)

Download links available at Kaspersky's USA website (still yet to come at other international sites) : http://usa.kaspersky.com/


A:Kaspersky 2016 Products Released

Thanks for the heads up. Updating now.

Read other 13 answers

Source: Anti-virus4U.com Blog: Avira 2016 Available for Download

Avira Operations GmbH & Co. KG has announced the release of Avira 2016 products line: Avira Antivirus Pro 2016, Avira Internet Security Suite 2016, Avira Ultimate Protection Suite 2016 and Avira Antivirus Pro for Android 2016

The new version of Avira 2016 consumer products boasts top detection rates, cloud-based Real-Time Protection and excellent usability.

In the year of its 30th anniversary, Avira is going from strength to strength!

The new 2016 version offers optimal protection from viruses, Trojans and more, and is also extremely user-friendly. Over the last few years, usability has been confirmed repeatedly by leading test companies: Stiftung Warentest (04/2015) rated Avira Internet Security Suite as "VERY GOOD 1.5" in the "Handling" category, and AV-TEST confirmed that Avira Antivirus Pro was the easiest to use protection software on the market (Best Usability Award for 2014 + 2015 versions).

Download your Avira 2016 product Now!
Visit our Downloads page and try it before you buy it!
Click Here to Save up to 65% on Avira 2016 products line - LIMITED TIME OFFER
Let's see what's new.

Avira Antivirus Pro 2016
Avira Antivirus Pro 2016 includes:

Advanced Real-Time Protection
Web Protection
Browser Safety
Mail Protection
Network Drive Protection
Online Essentials
Premium Support
Avira Internet Security Suite 2016
Avira Internet Security Sui... Read more

A:Avira Security 2016 products

Still it lacks some conventional products that can be more flexible like Sandbox implementation, BB or possible HIPS as a final resort for bypass protection.

Even though Avira Browser is at Beta, it seems having a sandbox feature is too way common and a must for every products.

Read other 7 answers

new update 16.02

Panda free download
no changelog

Read other answers

The new 2016 Consumer Solutions range by Panda Security is finally available! In an increasingly global and multi-device environment, the 2016 Consumer Solutions range is designed to make the digital world easier and more secure.


A:Panda Security 2016 available

Did they cancelled the Free Version

Read other 23 answers

I am ditching Windows Defender for something with better detection, is Panda decent compared to Windows Defender?

A:Is Panda 2016 good?

Definitely better than Windows Defender. It's a good product with 0 impact on system resources.

Read other 7 answers

On two separate systems (so far) today, Panda Cloud Free Antivirus has automatically pushed its 2016 update (to version 16.0.2, from the 15.0.4 that I was still happily using).
I was hoping to keep the 2015 version around as long as possible, due to allegations that 2016 has a problem with restoring files from quarantine to the proper/original folders from which they came.   Now that the update has been pushed out, we'll see what happens.

A:Panda pushing 2016 update

My Win 7/x64 Panda Free version is still 15.1.0. I see nowhere in the settings to allow or block automatic updating of the AV engine.
My Win 10 Panda Free version is 16.1.0, which I believe is the version I recently installed.

Read other 12 answers

Hey I need some advice. I cleaned up all my Images today and started over.

I had no idea Panda Anti-Viras a firewall, and I installed Spyshelter Firewall too, both of these are retail versions.

Should I turn off the Panda firewall or leave them both on?


A:I had no idea...Panda Antivirus Pro 2016...

"Panda Antivirus Pro 2016 includes a bidirectional firewall to protect your Wi-Fi network from intrusions and unwanted connections. Chat, share photos and videos, read your favorite blogs or simply surf the Web with complete peace of mind."

You may have missed this on their homepage, as they advertise as WiFi Protection.

Here's a comparison with the Free version:


Read other 7 answers

I am deciding bewtween Panda Free 2016 and 360 Total Security. I know 360 has really good protections but have also heard that they tend to quarantine Windows system files. I do not know much about Panda except that it is heavily reliant on cloud, which is fine and they do decent in independent testing. I would like your opinion on which one you think is better for a reliable, effective, and light antivirus experience.

A:Panda Free 2016 vs 360 Total Security

Qihoo has one of the best detection, the downside is a lot of false positive, if you use all the engines in real time it will use a lot of memory.

About Panda Cloud, well, it's a decent product.

Read other 15 answers

When will the Panda Global Protection 2016 beta

A:Panda Global Protection 2016 beta

You asked that for Norton already.

I assume mid to fall this year.

Read other 12 answers

I am ditching Windows Defender for something with better detection, is Panda decent compared to Windows Defender?

A:Internet Security Panda 2016 good?

Definitely better than Windows Defender. It's a good product with 0 impact on system resources.

Read other 7 answers

I know WD has improved immensely on Windows 10. Panda I do not know much about however.

Read other answers

The Good
It's available for Windows, Mac, Android and iOS devices. The interface blends well with the Windows 10 look and its options are easy to find. Any module can be disabled and tiles can be removed from the console.

The parental control and firewall components worked smoothly in our tests. The data shield immediately reacted when unknown programs tried to access the protected folders.

It has a comprehensive help manual that explains most parts of the program.

The Bad
As previously mentioned, Panda shows a notification message for the data shield module whenever an unknown application tries to access the protected directories, and it asks you what to do: allow or deny. However, although it doesn't inform you of this, it remembers the choice you make for that process, adds it to the permissions list, and sets its permission type. This means that it will automatically allow or deny access to that program whenever it tries to access the protected folders, until you go to the console panel to revert settings. In other words, Panda doesn't implement two options in the tray message for allowing/denying access only once and always.
The application control module worked well in our tests when denying access to programs that were on the list. However, it didn't prompt us for action whenever an unknown application tried to run, and it didn't deny access when we asked it to do this automatically, except in one case: when we tried opening Panda's vi... Read more

Read other answers

Effective Malware Blocking
Panda scored very well in my hands-on malware blocking test. When I opened a folder containing my current malware sample collection, it didn't do anything immediately. That's because Panda waits for a significant event like file creation or modification; it doesn't scan just because a process accessed the file. When I copies the collection to another folder, Panda got to work, quickly wiping out 86 percent of the samples.

It also caught some of the remaining samples when I launched them. Overall, it detected 89 percent of the samples and earned 8.8 points, the same as Kaspersky. Among products tested with this same collection, Trend Micro has the best scores, with 93 percent detection and 9.1 points.

Results from tests with my previous malware collection aren't directly comparable, of course, but you have to appreciate what Webroot SecureAnywhere Antivirus (2015) did with that bunch. It detected 100 percent of the samples and earned a perfect 10 points.

My malicious URL blocking test doesn't rely on a pre-set collection of samples. Rather, I take the very newest list of malicious URLs supplied by MRG-Effitas and attempt to download real-world malware samples. The antivirus gets credit for blocking access to the URL or for wiping out the file during or immediately after the download. I keep at this test until I have results for 100 very new malicious URLs.

As I proceeded with the test, Panda's stats stayed remarkably... Read more

A:Panda Free Antivirus (2016) PCMag review

I should not provide any questions for Panda cause they have already identical two flip side of a story in the test.

One is independent organization test and user based test.

Read other 9 answers

I'm going to buy a new license of one of these product, so any suggest please?
I have used Bitdefender, Avast, Kaspersky ( about 3 years ago), I haven't used Norton and Trend Micro.

A:KIS 2016 vs NIS 2016 vs BIS 2016 vs Avast IS 2016 vs Trend Micro IS 2016

Out of all these,and your prerequisites,I would go with Kaspersky!
PS:This is from personal experience,and other members may have varying opinions!!

Read other 3 answers

I'm running Win XP on my Lenovo PC using Panda as my A?V and bought full version,MAMB for added malware protection.
Started getting this error message>>>>
PSEvents.exe has encountered a problem and needs to close.
Error Signature has $zAppName:PSEvents.exe $zAppVer: $ZModName;PSEvents.exe
szmodVer: offset: 00033ac2
Also the following files are included in this error report:

It crops up every hour or so and i simply close it.It doesn't seem to hamper my PC functionality but how do i get rid of it and is it related to Panda a/v??
Please help


Yes it is associated with Panda: Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products - Technical Support - Panda Security
If the Hotfix does not fix it, try uninstalling Panda, Restart the computer, and reinstall Panda. How to uninstall Panda from the computer - Technical Support - Panda Security

Read other 1 answers

I'm running Win XP on my Lenovo PC using Panda as my A?V and bought full version,MAMB for added malware protection.
Started getting this error message>>>>
PSEvents.exe has encountered a problem and needs to close.
Error Signature has $zAppName:PSEvents.exe $zAppVer: $ZModName;PSEvents.exe
szmodVer: offset: 00033ac2
Also the following files are included in this error report:

It crops up every hour or so and i simply close it.It doesn't seem to hamper my PC functionality but how do i get rid of it and is it related to Panda a/v??
Please help


Yes it is associated with Panda: Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products - Technical Support - Panda Security
If the Hotfix does not fix it, try uninstalling Panda, Restart the computer, and reinstall Panda. How to uninstall Panda from the computer - Technical Support - Panda Security

Read other 5 answers

Ever since yesterday, I keep getting the following message:

I don't know what program this belongs to, but I ran an antivirus scan (quick, not full) and nothing came up. This message is extremely annoying as it will pop up multiple times (around 5 - 7) a day if I don't minimize it. A full restart of the computer doesn't sole the problem and I don't see anything suspicious in msconfig/startup.

My antivirus program is Panda Free Antivirus v. 16.0.2. I did a quick online search for PSEvents and found an article claiming that it's a Panda program, but I don't know what to make of it. Also, PSEvents isn't psevents.exe, as attempting to run that program yields an error message saying that Windows can't find it.

How do I get this annoying pop-up to go away?

Read other answers

Now! ESET has just released their newest security suite: ESET Smart Security 9 (2016 Edition). These products are on the top of security suites which are produced by giants on security companies. Most of them released 2016 editions of their products. I want to compare on their newest products with new features (such as on ESET: Banking Protection, Bitdefender: Ransomware Protection and new Firewall, etc...) and some enhanced features.

And now, which is your choose for your security? Please let me know your opinion!

A:Battle: Kaspersky IS 2016 vs ESET Smart Security 2016 vs Bitdefender IS 2016 vs Emsisoft IS 10

its hard choice choose between Eset,Kaspersky and Emsisoft.
in fact i never test Eset 2016, but i tested kaspersky and Emsisoft, Kaspersky 2016 really go lighter than Emsisoft(now i am Emsisoft useres)
by your budget and your interest u can choose Emsisoft or kaspersky.

Read other 46 answers
A:Bitdefender free vs Panda free vs Avira free 2016


This is my Top from what you listed.

Read other 3 answers

I stupidly read where if I went to change settings in the Windows Update and unchecked the box for updates to all Microsoft Products and notify me of new products.  Now I do not receive any updates to the Microsoft Office products.
I cannot get that check box back, it has totally disappeared.
What I was trying to do is eliminate the annoying Win 10 stuff that keeps coming in.  I don't want Win 10 and I don't want Microsoft's constant harassing by downloading KB3035583 all the time.
Can anyone help me get this check box back??  Unfortunately when I did it to my laptop I also did it to my sister's brand new laptop, so now I have two systems that need help.
Thank you in advance.
GOT IT!!!  Ran Secunia PSI and had to do it 3 times, but the Microsoft Updater now is working correctly!! 

A:Windows updates-update all Microsoft products and tell me about new products

Please close this thread for me.  Sorry for the posting.  Can't believe after struggling with this for 3 weeks, right after posting and then doing some reading on downloads on Bleeping Computer my issue got solved.
thank you!

Read other 5 answers

hello guys, i have two key for avira and panda. but, i have confuse which one could use.??? i hope friend can give opinios and experience with me...


A:Avira Internet Security Suite vs Panda Internet Security 2016

Panda gui sucks. Use avira because easy to use better detection

Read other 16 answers