First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

Don’t be fooled by fake emails offering updates to operating systems and other software! Cyber-extortionists are trying to take advantage of the millions of people looking for a fr ...

Configure Windows 10 like a privacy pro

Configure Windows 10 like a privacy pro

Windows 10 has only been around for a couple of days, but it is running on more than 67 million computers worldwide already. The new operating system is being aggressively pushed t ...

Start Testing the New Bitdefender 2016 Beta

Start Testing the New Bitdefender 2016 Beta

Help us perfect the best security software of 2016 by visiting http://www.bitdefender.com/beta/ to download the new Bitdefender 2016 beta kits. You get early access to some of the ...

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Update: The antivirus upgrade system built into Windows 10 won’t immediately check for a compatible version of the product. There is a three hour delay and this is not something we ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

Team Poison hacker believed killed by US drone strike

It is reported that a notorious British-born hacker has been killed by a US drone strike near the city of Raqqa in Syria. 21-year-old Junaid Hussain was a prominent member of the Islamic State group, and believed to be the leader of the CyberCaliphate hacking group, known for its antics defacing websites and hijacking social media accounts to spread propaganda. Source: Twitter Hussain, who referred to himse...

The Ashley Madison mystery: why would use your work email address?

The Ashley Madison hack, and leak of its user database, continues to enrapture the public, and delight online news editors keen to fill their webpages with salacious content. Many choose to ignore the very real harm and human cost that could result from information which should have remained private, and ask what are - to be fair - quite reasonable questions. Like, why on earth would you use your work email...

Over 95% of Millennials Feel Companies and Governments Fail to Protect Personal Data

Fewer than 5 per cent of Millennials in the US and UK believe their digital identity and personal data are completely protected, according to a study by Atomik Research. Image source: Wikimedia When asked about the impact on their privacy of an increasingly digitally connected world, such as rising use of mobile devices and tablets, nearly 70% of Millennials believed the risk to their online safety will inc...

AT&T Wi-Fi Hotspot Allegedly Used for Injecting Ads

One of AT&T’s free Wi-Fi hotspots is allegedly injecting ads that annoy users, slow browsing and clutter web pages, according to Jonathan Mayer, a computer scientist at Stanford. While browsing the airport’s AT&T-powered Wi-Fi network, Mayer noticed ads appearing on educational, government and ad-supported sites such as The Wall Street Journal. He investigated the source and found three lines of cod...

Half of Security Specialists Need More Than Two Days to Detect and Repair Breaches

Some 50% of security specialists took two days or longer to detect and remediate breaches, while another 7% knew neither the dwell time nor how to solve the issues, according to a survey by SANS Institute. Source: Jisc The length of time from an attacker’s initial entry into a network to the detection correlates most closely to the total cost of a breach. The longer an attacker has free access on a network,...

Wikipedia Now Censored in Russia

Several Russian-based ISPs are blocking free online library Wikipedia after content editors refused to delete an “offending article,” according to news reports. The URL of a page describing how to use charas, a type of cannabis, was banned by the court of a small Russian town, Cherny Yar. The illegal character of the information posted to Wikipedia has been confirmed by expert analysis and a corresponding d...

Poetic justice after burglar who taunted police on Facebook is captured

It's not unusual these days for the police to make use of social media to help them in the fight against crime. What is peculiar is for the criminals they are hunting for to respond via the net. 21-year-old Logan Hale of Polk County, Florida, was wanted for his alleged involvement in an armed burglary, so it's no surprise that a mugshot of the fugitive was posted on the local sheriff's Facebook page. Under...

FTC Granted Authority as Corporate Cybersecurity Watchdog by US Court

The FTC has been granted legal rights to sue companies for failing cybersecurity practices when protecting their customer data, according to a ruling by the Third US Circuit Court of Appeals. The decision followed a legal complaint from the FTC against Wyndham Hotels, a company that experienced three security incidents in two years, resulting in the loss of hundreds of thousands of payment card accounts.  W...

Reports claim Ashley Madison discussed hacking competitor, as users sue for emotional distress

The story of the Ashley Madison hack continues to twist and turn. Aside from the initial hack and subsequent distribution of the Ashley Madison user database (complete with millions of unverified email addresses), the hackers have also released further files from inside Avid Life Media, the company which owns the now infamous adultery website. Amongst those files were leaked emails between the company's CEO...

Gen Y Makes Security and Privacy Top Priorities While Surfing Online

Security and privacy are more important than page load speeds, customization or social integration features during online browsing, according to a study by Refuel Agency on Generation Y members. Image source: Flickr Some 70% of the respondents say security is important in a browser and 68% care about privacy. Webpage loading speed and user friendly features come third and fourth. Customizability and social...

© 2012 Powered By Bitdefender

Scroll to top