Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

Pornography is no longer scammers’ favorite bait! After analyzing a wave of scams spreading worldwide before the Valentine’s Day celebration, Bitdefender researchers have found tha ...

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, Bitdefender malware analyst ...

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Two weeks ago, we wrote about the re-emergence of tag scams on Facebook. What seemed to be a basic worm at that time turned into inspiration for multiple cyber-criminal gangs. This ...

CTB Locker Ransomware Targets French Companies

CTB Locker Ransomware Targets French Companies

A spam campaign delivering CTB Locker is targeting employees from French companies, Bitdefender researchers found. The  spam e-mails  carry an attachment,a .cab file and a message ...

Vile troll uses Twitter ads to urge transgender people to commit suicide

We all know there's some fairly horrible stuff that goes on on social networks. Sadly many have used the detachment of sites like Facebook and Twitter to say hateful things that they would never be brave enough to say to another living person's face. But a Twitter troll went one step further yesterday, not only describing transgender people as "deformed freaks" who should kill themselves, but using the paid...

Money or Data? The Ultimate Guide to Understanding Ransomware – Part I

Not long ago, a man committed suicide after an automatically generated notice from a computer virus threatened him with jail unless he paid a ransom thousands of dollars. The year was 2014. As incredible as the story seems, it marked the first known time a computer virus actually killed somebody. The next generations stole cash from users around the globe, and Cryptolocker raised the stakes - holding data o...

How the Washington Post was hijacked by the Syrian Electronic Army (again)

The Syrian Electronic Army appears to have successfully scalped another high profile media outlet, briefly hijacking the mobile version of the Washington Post website to display pop-up messages claiming that the media is not telling the truth. For a period of approximately 30 minutes, visitors to m.washingtonpost.com found they were greeted not by the latest news, but by alert boxes saying: "You've been hac...

The Trouble with Installing Unofficial Browser Extensions

Google has extended its ban on unofficial Google Chrome extensions. This means developers and Mac users will have to install extensions from the official Chrome Web Store, according to recent news reports. The initiative, launched a year ago, aimed to eradicate malicious browser extensions that ruined users’ browsing experience by slowing the system down, injecting adware or silently tracking browsing activ...

Google, Microsoft and Mastercard Sign Anti-Piracy Agreement with Danish ISPS

A coalition including Google, Mastercard, Microsoft and anti-piracy organization Right Alliance was formed to tackle the issue of online infringement, according to news reports. Their memorandum of understanding, or ‘Code to Promote Lawful Behavior on the Internet,’ has five key objectives: To help make the Internet a safe and legal platform for consumers and businesses. To stress that copyright is an impor...

Photofucket, the tool that lets hackers steal Photobucket pictures. Creators arrested

Are you still storing your private photographs and videos on the internet? How much trust are you putting in online companies to keep unauthorised eyes from seeing your personal snapshots and intimate home movies? It's a question that keeps arising, and is again this week following news that two men have been arrested for allegedly creating. marketing and selling a tool designed to allow unauthorised access...

Rogue Ads Impacted Tens of Millions Users, Google Study Reveals

In 2014, 5.5% of visitors to a Google site were served malicious ads, according to a Google study. In an in-depth analysis of the web injection ecosystem, Google identified tens of millions of ad injections “in the wild” in only a few months. The company partnered with the University of California, Berkeley and Santa Barbara to shed light on the “tangled web” of the lucrative online advertising business. “O...

WordPress Patches New Vulnerabilities in Plugins

The WordPress JetPack plugin and the TwentyFifteen theme have been found vulnerable to a cross-site scripting (XSS) vulnerability actively exploited in the wild, according to news reports. The JetPack plugin, reported to have over 1 million active installs and TwentyFifteen, the theme in the default WordPress package installed automatically with the CMS, are both susceptible to DOM-based XSS attacks. The pr...

USBKill – how to turn a USB stick into a kill switch that can force a computer to destroy what you were doing

Imagine that the authorities have an interest in what's on your computer. It might not be that you're an online criminal hacking into servers, writing malware, or running an underground website like the Silk Road. It could equally be the case that you're a political activist, a journalist or a whistleblower. Whatever the reason, it might be the case that you have a very good reason for not being that keen f...

Hard Rock’s Las Vegas Hotel & Casino hit by hackers

If you visit the website of Las Vegas's Hard Rock Hotel and Casino right now, you may spot a message at the top of the page. Didn't notice it? Take a closer look. If you click on the link about the "data security incident", I'm afraid it's not good news. Because the 640-room hotel is warning that for some seven months, hackers were able to steal customers' credit and debit card details from retail outlets (...

© 2012 Powered By Bitdefender

Scroll to top