First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

Don’t be fooled by fake emails offering updates to operating systems and other software! Cyber-extortionists are trying to take advantage of the millions of people looking for a fr ...

Configure Windows 10 like a privacy pro

Configure Windows 10 like a privacy pro

Windows 10 has only been around for a couple of days, but it is running on more than 67 million computers worldwide already. The new operating system is being aggressively pushed t ...

Start Testing the New Bitdefender 2016 Beta

Start Testing the New Bitdefender 2016 Beta

Help us perfect the best security software of 2016 by visiting http://www.bitdefender.com/beta/ to download the new Bitdefender 2016 beta kits. You get early access to some of the ...

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Update: The antivirus upgrade system built into Windows 10 won’t immediately check for a compatible version of the product. There is a three hour delay and this is not something we ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

Britons Embrace Ease of Use over Online Security, Study Shows

Almost 75% of Britons are securing their online information with easy-to-guess passwords, exposing their information to the risk of theft by hackers, according to a government survey. Britons often use passwords such as a pet's name, their place of birth or something related to a favorite sports team. Image source: Deviantart According to The Independent, this security flaw echoes a survey of millions of pi...

Multiple Vulnerabilities in Belkin Router Could Allow DNS Spoofing and Credentials Theft

Five zero-day vulnerabilities in Belkin N600 DB Wireless Dual Band N+ routers could have allowed attackers to grab credentials in clear text and spoof DNS requests, according to security researcher Joel Land. The affected mode is F9K1102 v2 with firmware version 2.10.17, possibly earlier versions and models susceptible to the five found vulnerabilities as well. By successfully exploiting the firmware vulner...

U.K. National Crime Agency under DDOS Attack as Protest from Lizard Squad

A massive Distributed Denial of Service attack by hacker group Lizard Squad has affected daily operations of the U.K.’s National Crime Agency website. The hackers posted on Twitter the message “Stressed out” and a URL to the agency’s website. The attack was likely triggered by the arrest of six teenagers, days earlier, on accusations of using denial of service tools to perform similar attacks on various web...

US Parents Concerned About Student Data Security

Some 87% of US parents are concerned about student data privacy and security in America’s K-12 schools, according to a survey by The Future of Privacy Forum. Source: Wikimedia American parents worry that their child’s electronic education records could be hacked or stolen, the study shows. Consequently, 85% of parents said that their willingness to support the use of student data and technology in education...

Ashley Madison Scams: Extremely Convincing and Dangerous

37 million people were registered to online dating site Ashley Madison before it got hacked. Intimate details about millions of users were exposed to the world. Embarrassment, million-dollar lawsuits, bounties on hacker heads and alleged suicides soon followed.   The media took full advantage of the juicy story, of course. But journalists aren’t the only ones. Scammers also paid attention, targeting those i...

Team Poison hacker believed killed by US drone strike

It is reported that a notorious British-born hacker has been killed by a US drone strike near the city of Raqqa in Syria. 21-year-old Junaid Hussain was a prominent member of the Islamic State group, and believed to be the leader of the CyberCaliphate hacking group, known for its antics defacing websites and hijacking social media accounts to spread propaganda. Source: Twitter Hussain, who referred to himse...

The Ashley Madison mystery: why would you use your work email address?

The Ashley Madison hack, and leak of its user database, continues to enrapture the public, and delight online news editors keen to fill their webpages with salacious content. Many choose to ignore the very real harm and human cost that could result from information which should have remained private, and ask what are - to be fair - quite reasonable questions. Like, why on earth would you use your work email...

Over 95% of Millennials Feel Companies and Governments Fail to Protect Personal Data

Fewer than 5 per cent of Millennials in the US and UK believe their digital identity and personal data are completely protected, according to a study by Intercede and Atomik Research. Image source: Wikimedia When asked about the impact on their privacy of an increasingly digitally connected world, such as rising use of mobile devices and tablets, nearly 70% of Millennials believed the risk to their online s...

AT&T Wi-Fi Hotspot Allegedly Used for Injecting Ads

One of AT&T’s free Wi-Fi hotspots is allegedly injecting ads that annoy users, slow browsing and clutter web pages, according to Jonathan Mayer, a computer scientist at Stanford. While browsing the airport’s AT&T-powered Wi-Fi network, Mayer noticed ads appearing on educational, government and ad-supported sites such as The Wall Street Journal. He investigated the source and found three lines of cod...

Half of Security Specialists Need More Than Two Days to Detect and Repair Breaches

Some 50% of security specialists took two days or longer to detect and remediate breaches, while another 7% knew neither the dwell time nor how to solve the issues, according to a survey by SANS Institute. Source: Jisc The length of time from an attacker’s initial entry into a network to the detection correlates most closely to the total cost of a breach. The longer an attacker has free access on a network,...

© 2012 Powered By Bitdefender

Scroll to top