You Are Here: Home » Articles posted by Bianca Stanescu

Hottest Snapchats – Another Early 2015 Facebook Scam!

A spam campaign revealing the 10 “hottest snapchats” is a new entry to the long list of Facebook scams flooding the social media platform in 2015, according to Bitdefender Online Threats. The Labs of the security software provider blacklisted dozens of fraudulent websites promising snapchats and other leaked ‘goodies.’ The male-oriented campaign is promoted on websites with tags such as “trendingusa,” “vira...

Notepad++ Defaced by Islamist Hackers after ‘Je suis Charlie’ Edition

Islamist hackers defaced Notepad++ after the open-source text editor released a “Je suis Charlie” edition, according to Softpedia. The hacking group dubbed the ‘Fallaga Team,’ allegedly from Tunisia, breached the website on January 12. The hack surfaced two days after the launch of the special Notepad++ edition, created in support of the shooting incident at the ‘Charlie Hebdo’ newspaper in France. The hack...

Hackers Blackmail Swiss Bank for 10,000 Euros; Threaten Client Data Leak

A group of hackers blackmailed Banque Cantonale de Geneve (BCGE), threatening to disclose client information if the Swiss financial institution doesn’t pay a 10,000 euro-worth ransom, according to Softpedia. The cyber-gang dubbed ‘Rex Mundi’ gave this evening as deadline for the bank to pay the ransom. The hackers allegedly infiltrated last week into the systems of Banque Cantonale de Geneve but didn’t acce...

Sony Hackers Were Sloppy, FBI Head Says

FBI Director James Comey said the hackers who breached Sony Entertainment in November last year were “sloppy,” according to Dark Reading. The ‘Guardians of Peace’ (GOP) didn’t permanently use proxy servers to hide their identity, leaving clues about their North Korean roots. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs th...

Top 5 Social Media Security Predictions of 2015

Mobile ransomware, targeted job fraud, and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015, security software solutions provider Bitdefender warns. Studies in the last year on Facebook, LinkedIn and Twitter allowed Bitdefender security researchers to forecast future trends. While the trends seem mainly dangerous for individual social media users, grow...

Stalkers, Nude Photos and Beheadings: Top Facebook Scams and Malware Attacks in 2014

Millions of people fell for Facebook scams in 2014. They lost money, reputation and even their jobs after simply clicking on the wrong social media link. Though security experts, companies and tech-savvy users militate against Facebook cyber-attacks, unwary users fall victims to scams on the social network every day, and veteran users continue to fall for the same old e-threats. Here are the seven most dang...

‘LulzSec Leader’ Sabu Points to His Kids as the Weakness that Made Him an FBI Informant

Former LulzSec leader Hector Xavier Monsegur, or ‘Sabu,’ pointed to his kids as the “weakness” that turned him into an FBI informant after his arrest in 2011, according to CBS. The station aired Sabu’s first TV interview, making waves among Anonymous members, who complained about the way they were portrayed. “Shame on you CBS,” AnonymousXenc wrote on YouTube. “You clearly are missing the point. Anonymous Is...

Hackers Grab Yahoo Credentials through Mail Activity Reports Campaign

Yahoo users are being targeted by a new phishing campaign that helps hackers grab their credentials and hijack accounts. Bitdefender was already blocking the malicious URLs spreading in inboxes worldwide. The phishing campaign starts with messages that bypass the e-mail provider’s antispam filters, reaching the Inbox folder. The e-mails pose as "mail activity reports" and copy Yahoo’s email format to look l...

Over 30 Vulnerabilities Exposed in Google App Engine

Over 30 vulnerabilities that allow hackers to bypass critical security sandbox defenses were discovered in Google App Engine (GAE), according to The Hacker News. Security Explorations researchers identified the series of flaws in the Java environment of Google’s Platform as a Service. Attackers can exploit the vulnerabilities to achieve a complete Java VM security sandbox escape, as well as to execute arbit...

Hackers Can Attack Social Logins to Impersonate Users, IBM Study Shows

Cyber-criminals can exploit social logins, such as the “Sign In With Facebook/LinkedIn/etc” buttons, to hijack accounts and impersonate users through a technique dubbed SpoofedMe, according to IBM research. To run the attack, hackers register a spoofed account at a vulnerable identity provider using the victim’s email address. Cyber-criminals can then post misleading information and even malware on victims’...

© 2012 Powered By Bitdefender

Scroll to top