You Are Here: Home » E-Threats

Forget luxury cars, you can get your data stolen with this Facebook scam

We’ve seen dozens of scams in our digital lives post Facebook, yet this particular one captured my attention with the impressive number of Likes and Shares. Over 90k people are following a Facebook community that promises to give away free luxury cars in exchange for Likes, Shares and some personal data. The flow is as follows – the user lands on the “Range Rover 2016.” Page/community after seeing in his Ne...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sites, so you could book a flight or order a smart TV on her behalf? Ionut Cernica did exactly that. He helped Facebook patch a serious login vulnerability that allowed rogue users to access online accounts via Facebook’s social logi...

Music streaming can leave homes open to hacking

As far-fetched as it may sound, listening to music might endanger your privacy, Bitdefender research shows. Bitdefender IoT researchers analyzed a Wi-Fi audio receiver and found it susceptible to brute-force attacks and poor authentication practices. The risk of unsafe protocols The MUZO Cobblestone works as a Wi-Fi audio receiver or as a standalone music player and can be connected to home routers to allow...

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitdefender researchers analyzed the LIFX bulb – a successful crowdfunding project started in September 2012 - and found it vulnerable to traffic interception. Coincidentally, the LIFX product has been subjected to a hacking experimen...

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of revenue for the attacker. Last year we not only saw the proliferation of aggressive adware, but also some new CAPTCHA-bypassing threats that subscribed users to a premium-rated number, both hosted in Google Official marketplace. A new...

Phishing surges, file-sharing takes lead as most targeted industry of Q1

Phishing through file-sharing services has soared in the past three months, making cloud-based file distribution services the most targeted sector of the first quarter of the year, Bitdefender found. Globally, file-sharing is being used to spread phishing scams more than the retail and payment industries, the traditional favorites of hackers. Almost one in five malicious URLs uses a file-sharing service to...

9000+ Department of Homeland Security staff have their details leaked by hacker

Any time you interact with an organisation that has "security" in their name, it's understandable that you would expect them to be good at security. Right? You would hope them to be shining examples for everyone else about how to do things right, how to batten down the hatches and protect sensitive information from falling into the hands of the bad guys. But, as the US Department of Homeland Security (DHS)...

He hacked, he stole porn, he spied. But British man isn’t going to jail

Is there any consistency in how hackers are treated by courts around the world? It's a rhetorical question, of course, because we all know the answer. Of course there is no consistency. Just take the case of convicted British hacker Ryan Thompson this week, for instance. 26-year-old Thompson was sentenced to a six month suspended prison sentence at Warrington Crown Court last Friday after admitting hacking...

“Deceptive site ahead”: Google helps protect users from deceitful download buttons

There is a good chance you benefit from Google's Safe Browsing API without even realising it. Popular browsers such as Chrome, Firefox and Safari use the Google Safe Browsing service to check whether a webpage they are about to visit is suspicious, or is known to contain any threats (such as phishing forms or malware). Google Safe Browsing already helps protect surfers from some of the risk of downloading a...

CryptoWall 4.0 returns to the wild, posing as good guy

The infamous CryptoWall ransomware family is back, encrypting files under the false pretenses of testing AV solutions for their’ “suitability” to protect data. “CryptoWall Project is not malicious and is not intended to harm a person and his/her information data. The project is conducted for the sole purpose of instruction in the field of information security, as well as certification of antivirus products...

© 2012 Powered By Bitdefender

Scroll to top