You Are Here: Home » E-Threats

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Millions of penny stock spam emails have been flooding inboxes these days, spreading a new ‘Wolf of Wall Street’ scam and inflating stock values of a mineral deposit company based in Canada, according to the Bitdefender Antispam Lab. With over 3 million unique samples, the wave started to grow last Thursday and soon became the largest stock spam attack in 2014, and also the most successful. The transactions...

SSL 3.0 “Poodle” Flaw Opens Encrypted Data to Eavesdropping

A vulnerability in the design of the SSL 3.0 protocol can be exploited to intercept secure cookies transmitted between clients and servers in a reasonable amount of time, Google announced in blog post. Three Google researchers uncovered the “Poodle” (Padding Oracle On Downgraded Legacy Encryption) flaw which affects a large number of Internet-connected servers that can to fall back to the vulnerable SSL v3...

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs. The alleged sexy videos of the British actress drop more Trojans than actual pictures and, just as in many other sex tape scams, users don’t get to see the promised content. The scam comes a couple of weeks after a nude photo leak threat targeting Watson...

ComputerCOP: The most dangerous way to spy on your kids’ online activity?

It's perfectly understandable that many parents are concerned about what their children might be doing on the internet. Are they the victims of cyberbullying? Discussing drugs or joining criminal gangs? Visiting adult websites? Being groomed by paedophiles or sharing inappropriate photographs online? The list goes on... But one thing you need to be very careful about is what technology - if any - you use to...

Apple Pay or Google Wallet – What’s the Safest Way to Pay?

Apple Pay, Apple’s upcoming digital payment platform, is not on the market yet. But rumor has it that it will deliver the most secure environment ever used for in-store transactions. With massive data breaches hitting retailers and eroding trust in credit card payments, we thought we’d take a closer look at the embedded security features this alternative payment system will allegedly bring to the table. Is...

ShellShock Roundup: What to do if You are Vulnerable

A security vulnerability on the GNU Bourne Again Shell reported Wednesday is claiming victims in the wild. The flaw – known to the tech world as CVE-2014-6271 and CVE-2014-7169 - allows a remote attacker to run arbitrary code (read malware) on a vulnerable server under certain conditions. The most vulnerable targets to date are web servers that run Apache CGI scripts written in Bash or calling system() or p...

From Pencils to Tablets: The Changing Security Risks of 21st Century Schooling

Each fall, back-to-school preparation for students around the world is focusing less and less on pens and notepads and more on tablets, smartphones and other cool gadgets. To support a dynamic 21st century learning environment, schools have started to embrace the bring-your-own-device (BYOD) or bring-your-own-technology (BYOT) trend by introducing special IT policies and software. But until this becomes the...

Linux, OS X Users May Be Vulnerable to Bash Flaw Exploit

A bug discovered in Bash Shell, a command-line interface used by Linux and Unix, could leave web servers, systems and embedded devices such as routers vulnerable to cyber-attacks. Cyber-criminals are getting ready to launch multiple attacks, and Bitdefender warns users and sys admins to be cautious with the vulnerability.  Although code allowing the exploit of Bash-using CGI scripts is already available on...

Malware Writers Target SMB Employees with Fake Policy Violation

A new cyber-crime attack tricks SMB employees into downloading Zbot and other Trojans by accusing them of violating company policy, according to antivirus software provider Bitdefender. The spam wave started to accelerate a week ago with dozens of unique .ARJ compressed files infecting computers, as the Bitdefender AntiSpam Laboratory has determined.  The malware attack is based on Zbot or Zeus, which inclu...

Dyre malware targets millions of Salesforce users, stealing passwords and bypassing 2FA

We're all used to the idea of malware which snoops upon our online banking, attempting to steal our login credentials to help hackers gain access to our bank accounts. Many of us are also aware of spyware trojan horses that target users of other websites, including popular webmail services or social networks, in the hope of plundering private information or using the platforms as a springboard for other att...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top