Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Most companies lack processes, governance, required to stop cyber attacks

More than half of companies (54%) perceive the lack of governance and control processes as the biggest gaps in stopping attacks on endpoints, according to a recent survey of IT professionals in the US . On average, respondents believe 49 percent of attacks on an organization’s endpoints can be realistically stopped with enabling technologies, processes and in-house expertise. The main obstacle to mitigating...

Forget luxury cars, you can get your data stolen with this Facebook scam

We’ve seen dozens of scams in our digital lives post Facebook, yet this particular one captured my attention with the impressive number of Likes and Shares. Over 90k people are following a Facebook community that promises to give away free luxury cars in exchange for Likes, Shares and some personal data. The flow is as follows – the user lands on the “Range Rover 2016.” Page/community after seeing in his Ne...

Instagram Vulnerability Lands $10,000 Bounty for 10-Year-Old

Facebook-owned Instagram was deemed vulnerable by 10-year-old Jani from Helsinki, who revealed that he could delete comments and descriptions on any Instagram account. The vulnerability enabled Jani to insert malicious code into the comment section of Instagram, effectively allowing him to delete anything – even profiles – with no authorization from the targeted account. “I tested if Instagram can withstand...

How will cybersecurity look like in 2020? Five threat scenarios

Researchers from UC Berkeley’s School of Information tried to answer this immensely challenging question in their most recent report, Cybersecurity Futures 2020. The paper explores how technology and security will be transformed in the uncertain and not-so-distant future. Briefly, here are five scenarios the researchers have envisioned for the next four years - to be taken with a pinch of salt, they say. Th...

Spammed-out malware campaign contains offensive hidden message for anti-virus CEO

There is no love lost between the people who write malware and the anti-virus companies who work hard to protect innocent users against them. And occasionally that animosity spills out into the actual malicious code written by online criminals. Sometimes it might present itself in the form of code to attempt to avoid detection by a particular product, or techniques to avoid analysis in malware labs. But som...

Companies fear zero day and denial of service attacks most

Zero-day attacks are the most serious type of incidents and compromises for companies, according to 71 percent of respondents in a recent survey. DDoS was second, mentioned by 68 percent of respondents. Most respondents also say the consequences of an exploit of an existing software vulnerability greater than 3 months old (53 percent) and ransomware (51 percent) can be severe. Companies still struggle to ha...

IoT security spending to reach $348 million this year

The IoT security budget will rise 23.7 percent to $348 million in 2016 and reach $547 million by 2018, according to a new Gartner report. As more people become interested in connected cars, as well as spending on industry-grade equipment that requires proper security, the IoT security market will grow exponentially. "The market for IoT security products is currently small but it is growing as both consumers...

7 million Minecraft Pocket Edition players put at risk after Lifeboat hack

Over seven million members of the independent Minecraft "Lifeboat" community have had their security and privacy put at risk after hackers breached servers and stole usernames, email addresses and MD5-hashed passwords.7 million Minecraft Pocket Edition players put at risk after Lifeboat hack Over seven million members of the independent Minecraft "Lifeboat" community have had their security and privacy put...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sites, so you could book a flight or order a smart TV on her behalf? Ionut Cernica did exactly that. He helped Facebook patch a serious login vulnerability that allowed rogue users to access online accounts via Facebook’s social logi...

Careless employees remain the biggest security threat in 2016, study shows

Negligent or careless employees who don’t follow security policies are the biggest threat to endpoint security in organizations, according to a recent survey. Eighty-one percent of respondents say the biggest challenge is minimizing the threat of negligent or careless employees, from 78 percent in 2015. Since 2013, the percentage of respondents who say threats caused by malware infections that are stealthie...

© 2012 Powered By Bitdefender

Scroll to top