First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

Don’t be fooled by fake emails offering updates to operating systems and other software! Cyber-extortionists are trying to take advantage of the millions of people looking for a fr ...

Configure Windows 10 like a privacy pro

Configure Windows 10 like a privacy pro

Windows 10 has only been around for a couple of days, but it is running on more than 67 million computers worldwide already. The new operating system is being aggressively pushed t ...

Start Testing the New Bitdefender 2016 Beta

Start Testing the New Bitdefender 2016 Beta

Help us perfect the best security software of 2016 by visiting http://www.bitdefender.com/beta/ to download the new Bitdefender 2016 beta kits. You get early access to some of the ...

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Update: The antivirus upgrade system built into Windows 10 won’t immediately check for a compatible version of the product. There is a three hour delay and this is not something we ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

Over 95% of Millennials Feel Companies and Governments Fail to Protect Personal Data

Fewer than 5 per cent of Millennials in the US and UK believe their digital identity and personal data are completely protected, according to a study by Atomik Research. Image source: Wikimedia When asked about the impact on their privacy of an increasingly digitally connected world, such as rising use of mobile devices and tablets, nearly 70% of Millennials believed the risk to their online safety will inc...

AT&T Wi-Fi Hotspot Allegedly Used for Injecting Ads

One of AT&T’s free Wi-Fi hotspots is allegedly injecting ads that annoy users, slow browsing and clutter web pages, according to Jonathan Mayer, a computer scientist at Stanford. While browsing the airport’s AT&T-powered Wi-Fi network, Mayer noticed ads appearing on educational, government and ad-supported sites such as The Wall Street Journal. He investigated the source and found three lines of cod...

Half of Security Specialists Need More Than Two Days to Detect and Repair Breaches

Some 50% of security specialists took two days or longer to detect and remediate breaches, while another 7% knew neither the dwell time nor how to solve the issues, according to a survey by SANS Institute. Source: Jisc The length of time from an attacker’s initial entry into a network to the detection correlates most closely to the total cost of a breach. The longer an attacker has free access on a network,...

Wikipedia Now Censored in Russia

Several Russian-based ISPs are blocking free online library Wikipedia after content editors refused to delete an “offending article,” according to news reports. The URL of a page describing how to use charas, a type of cannabis, was banned by the court of a small Russian town, Cherny Yar. The illegal character of the information posted to Wikipedia has been confirmed by expert analysis and a corresponding d...

Poetic justice after burglar who taunted police on Facebook is captured

It's not unusual these days for the police to make use of social media to help them in the fight against crime. What is peculiar is for the criminals they are hunting for to respond via the net. 21-year-old Logan Hale of Polk County, Florida, was wanted for his alleged involvement in an armed burglary, so it's no surprise that a mugshot of the fugitive was posted on the local sheriff's Facebook page. Under...

FTC Granted Authority as Corporate Cybersecurity Watchdog by US Court

The FTC has been granted legal rights to sue companies for failing cybersecurity practices when protecting their customer data, according to a ruling by the Third US Circuit Court of Appeals. The decision followed a legal complaint from the FTC against Wyndham Hotels, a company that experienced three security incidents in two years, resulting in the loss of hundreds of thousands of payment card accounts.  W...

Reports claim Ashley Madison discussed hacking competitor, as users sue for emotional distress

The story of the Ashley Madison hack continues to twist and turn. Aside from the initial hack and subsequent distribution of the Ashley Madison user database (complete with millions of unverified email addresses), the hackers have also released further files from inside Avid Life Media, the company which owns the now infamous adultery website. Amongst those files were leaked emails between the company's CEO...

Gen Y Makes Security and Privacy Top Priorities While Surfing Online

Security and privacy are more important than page load speeds, customization or social integration features during online browsing, according to a study by Refuel Agency on Generation Y members. Image source: Flickr Some 70% of the respondents say security is important in a browser and 68% care about privacy. Webpage loading speed and user friendly features come third and fourth. Customizability and social...

Super Hacker Myth Debunked by Data, Says Gartner Vice President

Gartner Vice President Anton Chuvakin says reams of data will provide clues and traces of hacking attempts and prove that “super hackers” do not exist. He says it’s all a matter of continuous incidence response. The analyst said old security incident response models are ineffective when dealing with modern hackers and, although these aggressors use covert tactics to hide their presence, they still leave log...

Vulnerability in Pocket Addon for Firefox Could Have Affected Company Servers

A server-side vulnerability found in the save-for-later service would have allowed attackers to gain access to all user data and even populate their reading lists with malicious links. Because the bookmarking app had poor networking design, the researcher was able to retrieve user information relating to IP addresses, saved URLs, and - with the help of some redirects – access to the etc/passwd file that con...

© 2012 Powered By Bitdefender

Scroll to top