New Scareware Campaign Tricks Users with Fake Antivirus

New Scareware Campaign Tricks Users with Fake Antivirus

A new type of scareware advertisement tricks users into believing their systems are infected and need expert help to remove the malware, Bitdefender warns. The malware-spreading me ...

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Millions of penny stock spam emails have been flooding inboxes these days, spreading a new ‘Wolf of Wall Street’ scam and inflating stock values of a mineral deposit company based ...

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs. The alleged sexy videos ...

Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

ShellShock Roundup: What to do if You are Vulnerable

ShellShock Roundup: What to do if You are Vulnerable

A security vulnerability on the GNU Bourne Again Shell reported Wednesday is claiming victims in the wild. The flaw – known to the tech world as CVE-2014-6271 and CVE-2014-7169 - a ...

Malware Writers Target SMB Employees with Fake Policy Violation

Malware Writers Target SMB Employees with Fake Policy Violation

A new cyber-crime attack tricks SMB employees into downloading Zbot and other Trojans by accusing them of violating company policy, according to antivirus software provider Bitdefe ...

Google Strengthens Accounts with USB Security Key

Google users are now able to secure their accounts with a physical USB security key acting as a second factor in the authentication process, according to a Google blog post. Google has been exploring the possibilities of hardware authentication since 2012, however the official announcement came a day ago. “Today we’re adding even stronger protection for particularly security-sensitive individuals,” Nishit S...

Mac OS X Yosemite Leaks User Location and Search Results to Apple

Spotlight, the search tool embedded in Apple’s latest desktop operating system, is collecting search and location data by default, according to news reports. Users started complaining about the issue on Twitter. The company confirmed that anyone who uses Spotlight or iOS8 will have his data sent back to Apple servers in real time. "When you use Spotlight, your search queries, the Spotlight Suggestions you s...

Safety Check – a new Facebook tool that hopefully you’ll never have to use

If you were caught up in the middle of a tsunami or an earthquake, I certainly hope your first thought wouldn't be to reach to your smartphone to post a message to your Facebook page or Twitter account. But, human nature being what it is, chances are that many would - after they have checked they are not in imminent danger - be keen to find out what the heck is going on by checking a social network, and rea...

Zero-Day Remote Code Execution Flaw Disclosed by Microsoft; Workarounds Issued

Microsoft has disclosed on Tuesday in a Security Advisory a Windows OLE zero-day remote code execution (RCE) vulnerability  in PowerPoint and released a quick fix. The vulnerability impacts all Windows versions, except Windows Server 2003 and it is currently being exploited via malicious Office files that contain OLE (Object Linking and Embedding) objects. "The vulnerability could allow remote code executio...

China Accused of Spying on Apple Users

Apple is the alleged victim of a man-in-the-middle attack organized by Chinese-hackers to capture users’ credentials, according to Chinese web monitor GreatFire.org. After similar attacks against Github, Google, Yahoo and Microsoft, it seems Chinese hackers tried to get access to usernames and passwords as well as other data stored on iCloud such as iMessages, photos and contacts. The Great Firewall of Chin...

New Scareware Campaign Tricks Users with Fake Antivirus

A new type of scareware advertisement tricks users into believing their systems are infected and need expert help to remove the malware, Bitdefender warns. The malware-spreading mechanism is quite simple: the fake AV ads pop up unexpectedly when browsing the web, after the user’s computer has been previously infected with adware. Malicious ads usually enter the system under the form of an innocent-looking b...

CaLLSTaCK Hacker Breaches 19 HostGator Servers Amid Hong Kong Protests

The hacker going by the moniker of CaLLSTaCK has announced the breach of 19 HostGator servers amid Hong Kong Protests and in connection with the #OpHongKong Anonymous campaign, according to Security Affairs. HostGator hosts today over 9 million domains and is one of the most popular hosting service. "We have taken control of name-servers and employing measures for domain hijacking,” CaLLSTaCK said via an em...

US Moving to Safer Payment Systems, Obama Says

“BuySecure”- a new initiative advocated by the US Presidency - will accelerate the adoption of EMV technology in US cards, thus, leading the way to safer payment transactions, according to an official White House announcement. 100 million Americans were affected by data breaches last year, the White House said. Driven by “America’s fastest-growing crime”, the President signed an Executive Order meant to str...

Facebook Designs Stolen Credentials Parsing System

Facebook has built an automated system designed to analyze data from online published credential leaks, according to their announcement. Facebook users are going to be prompted if their usernames and passwords match the ones leaked online. This measure is going to protect users who have been compromised in third-party data breaches and have the same credentials on Facebook. The primary source seems to be Pa...

Cross-Site Scripting Vulnerability in Mozilla’s Cross Reference Sub-Domains

Two of Mozilla's Cross Reference sub-domains suffer from a cross-site scripting (XSS) vulnerability, according to the report posted by security researcher Wang Jing on the Tetraph Blog. The vulnerability has been submitted in Mozilla's Bugzilla bug tracker on Sunday and has not yet received a fix. "This means all URLs under the above two domains can be used for XSS attacks targeting Mozilla's users," Wang J...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top