Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

Pornography is no longer scammers’ favorite bait! After analyzing a wave of scams spreading worldwide before the Valentine’s Day celebration, Bitdefender researchers have found tha ...

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, Bitdefender malware analyst ...

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Two weeks ago, we wrote about the re-emergence of tag scams on Facebook. What seemed to be a basic worm at that time turned into inspiration for multiple cyber-criminal gangs. This ...

CTB Locker Ransomware Targets French Companies

CTB Locker Ransomware Targets French Companies

A spam campaign delivering CTB Locker is targeting employees from French companies, Bitdefender researchers found. The  spam e-mails  carry an attachment,a .cab file and a message ...

Google Uses Fingerprint Scanners to Stay Secure On The New Android M

Android M, the newest version of Google’s software for gadgets, intends to increase security of mobile payments, the company informed on its annual developer conference in San Francisco. New measures such as fingerprint- and iris-authenticated money transfers are about to test the market. A new feature is that Android M users will be able to deny apps access to location, personal information and data on a c...

NSA’s Data Harvesting Policy Makes Foreign Governments Cautious Guarding Secrets

The Chinese Government intends to adopt a five-year cybersecurity program, part of a plan announced against cyber confrontation with the United States, while European decision makers are also reducing cooperation with NSA. China’s concern with cyber-security was given a powerful boost following the revelations of the former NSA contractor Edward Snowden about the universal surveillance capabilities of the U...

Facebook Launches New Security Checkup Feature To Prevent Hacks

Facebook has launched a new security feature to prevent hackers from breaking user accounts, allegedly because of an increase of vulnerability issues reported in 2015. Users are now allowed to easily change passwords, setup alerts and clean up login sessions. The login session manager shows which computers the user is logged on and can terminate sessions if instructed. “We invest considerable in building se...

How Does Ransomware Work? The Ultimate Guide to Understanding Ransomware – Part II

Now that we’ve been introduced to ransomware, let’s see how it spreads and infects machines. How does it enter systems? Common penetration techniques include: Spam and social engineering Direct drive-by-download or malvertising Malware installation tools and botnets When ransomware first hit the scene a few years ago, computers predominantly got infected when users opened e-mail attachments containing malwa...

7 Most Used Exploits In The Wild, According to Bitdefender

Heartbleed, Shellshock and Poodle gave the world a sudden shock in 2014 - their severity and widespread effect left hundreds of millions of users uncertain of their safety.  But do cyberattacks really strike out of the blue? The past few years have been marked by the emergence of exploit kits. These tools are usually hosted on compromised servers and served like regular web pages. Once the user lands on one...

Hacker’s List leaks its secrets, revealing true identities of those wanting to hack

Is there something you want hacked? I get emails all the time from complete strangers, asking if I can help them hack into someone's Facebook or email account. Sometimes they claim to be family members who are worried that their loved one has gone missing and not replying to messages, but more often they're suspicious that their partners are cheating on them behind their back and want to read their private...

Hola VPN Allegedly Used in DDoS Against 4Chan

Popular VPN service Hola has been used to disrupt the operations of 4Chan, according to reports. To help users access any site from around the world by hiding their IP address, Hola’s VPN service uses the Luminati network. Luminati is an anonymity network similar to Tor. Based on a peer-to-peer network, it routes users’ requests through other Luminati users acting as exit nodes. It seems Luminati was used a...

Best Security News? Yes, You’re in the Right Place

If you’ve landed on this page, then you must like us, right?  Then, please vote for us at EU Security Blogger Awards 2015! We’re happy to have been nominated, once again, at the European Security Blogger Awards 2015, held in London, June 3rd 2015. HotForSecurity is competing against top security blogs in three major categories: Best European Corporate Security Blog Grand Prix Prize for the Best Overall Secu...

Vile troll uses Twitter ads to urge transgender people to commit suicide

We all know there's some fairly horrible stuff that goes on on social networks. Sadly many have used the detachment of sites like Facebook and Twitter to say hateful things that they would never be brave enough to say to another living person's face. But a Twitter troll went one step further yesterday, not only describing transgender people as "deformed freaks" who should kill themselves, but using the paid...

Money or Data? The Ultimate Guide to Understanding Ransomware – Part I

Not long ago, a man committed suicide after an automatically generated notice from a computer virus threatened him with jail unless he paid a ransom thousands of dollars. The year was 2014. As incredible as the story seems, it marked the first known time a computer virus actually killed somebody. The next generations stole cash from users around the globe, and Cryptolocker raised the stakes - holding data o...

© 2012 Powered By Bitdefender

Scroll to top