Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Microsoft will release what is touted to be the largest overhaul of the Windows operating system ever in less than one month. The Developer Preview builds made available to Windows ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

APIC Vulnerability in CISCO’s SDN Controller Allows Unauthenticated Remote Root Access

A vulnerability found in CISCO’s SDN controller could enable an attacker to exploit an improper implementation of access controls in the APIC file system and remotely access the APIC as a root user. The SDN (software defined-network) controller is a collection of modules that manages data flow between servers and routers/switches to enable intelligent networking. Attackers exploiting this vulnerability will...

One in Two Users Fears Personal Health Data Is Unsafe on Fitness Apps and Gadgets

More than 45% of wearable and mobile app users worry that hackers may steal their personal health information, according to a survey conducted by Healthline. One in four users is concerned about data on a Fitbit or a health-tracking app. Of the 15% of consumers that own a Fitbit or similar activity tracker, more than 80 percent say the device keeps them motivated to stick to their exercise routine. Source:...

BIND Flaw Exposes DNS Servers to Denial-of-Service Attacks

A recent flaw in the BIND open-source software used for DNS servers allows denial-of-service attacks on both authoritative and recursive DNS servers, by constructing a flawed UDP packet that exploits an error in the handling of queries for TKEY records. Dubbed as critical by the CVE-2015-5477 advisory, affected BIND servers include versions 9.1.0 up to 9.8.x, 9.9.0 up to 9.9.7-P1, and 9.10.0 up to 9.10.2-P2...

One in Three Employees Would Sell All Company Secrets for the Right Price

Some 35 percent of employees would sell information on company patents, financial records and customer credit card details for the right price, according to a survey on enterprise security practices by Loudhouse, a technology and B2B research firm. Source: Wikipedia The survey shows that 25% of employees would sell company data, risking both their jobs and criminal convictions, for less than $8,000. About 3...

De-anonymization of Tor Hidden Services With 88 Percent Certainty, Researchers Say

MIT researchers have devised a method for identifying anonymous Tor hidden services or hosts – with 88 percent certainty – by using a circuit fingerprinting attack to analyze traffic going through an attacker-controlled computer. Once the attacker’s computer starts acting as a Tor guard, the researchers say they used a machine learning algorithm that analyzes traffic patterns that go through the computer to...

See how a self-aiming sniper rifle can be remotely hacked

I must admit I raised an eyebrow. I'm not clear why any regular member of the public would really need a sniper rifle, let alone one which has a computer running Linux embedded inside it. But, it turns out, there is a market for so-called "smart" self-aiming sniper rifles - in America at least. And with help from the kind of modern technology built into the $13,000 Tracking Point TP750 rifle, even a lousy s...

Financial Companies to Provide Stronger Authentication Methods; How FIDO Works

Financial services companies have the most urgent need for safer payment methods as their clients demand privacy, security and convenience in all transactions, according to FIDO (Fast IDentity Online) Alliance, which groups more than 200 companies and government agencies, including financial institutions such as Wells Fargo, Goldman Sachs and JP Morgan Chase, among others. Source: Wikipedia Bank clients may...

Ethical Decisions May Be Embedded in Self-Driving Cars

Progress in self-driving vehicles led Chris Gerdes, a professor at Stanford University, and Patrick Lin, a professor of philosophy at Cal Poly, to experiment with ethical dilemmas that may come up when such vehicles become common. Considering that recent proof-of-concept hacking attempts on smart vehicles have proven that, with off-the-shelf equipment and adequate skills, someone could interfere with and co...

Security Has Reached Board-Level Thinking, Gartner Survey Finds

Some 71% of managers say IT risk management data influences decisions at the board level, according to Gartner's annual end-user survey for privacy and information security. Image source: Flickr The study’s authors found an increasing focus on IT risk as part of corporate governance. Almost 40% of respondents stated explicitly that the most senior person responsible for information security reports outside...

How to upgrade to Windows 10

Users running genuine Windows 7, 8 or 8.1 will be asked to upgrade to Windows 10, as Microsoft releases this week the largest overhaul of the Windows operating system ever. (Upgrade to Windows 10 - Image source: Flickr) Upgrading to Windows 10 is free until July 29, 2016 for all users who meet the hardware requirements. According to Microsoft, users can reserve a free upgrade to Windows 10 in the Get Window...

© 2012 Powered By Bitdefender

Scroll to top