You Are Here: Home » E-Threats

Dyre Banking Trojan Still Phishing for Data, US-CERT Warns

A new phishing campaign employs the Dyre banking Trojan to steal account credentials from enterprises and financial institutions, according to an alert by the Department of Homeland Security. In the advisory, US-CERT said the phishing campaign uses various tactics, but mostly malicious PDF email attachments to download malware. “Phishing emails used in this campaign often contain a weaponized PDF attachment...

New Scareware Campaign Tricks Users with Fake Antivirus

A new type of scareware advertisement tricks users into believing their systems are infected and need expert help to remove the malware, Bitdefender warns. The malware-spreading mechanism is quite simple: the fake AV ads pop up unexpectedly when browsing the web, after the user’s computer has been previously infected with adware. Malicious ads usually enter the system under the form of an innocent-looking b...

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Millions of penny stock spam emails have been flooding inboxes these days, spreading a new ‘Wolf of Wall Street’ scam and inflating stock values of a mineral deposit company based in Canada, according to the Bitdefender Antispam Lab. With over 3 million unique samples, the wave started to grow last Thursday and soon became the largest stock spam attack in 2014, and also the most successful. The transactions...

SSL 3.0 “Poodle” Flaw Opens Encrypted Data to Eavesdropping

A vulnerability in the design of the SSL 3.0 protocol can be exploited to intercept secure cookies transmitted between clients and servers in a reasonable amount of time, Google announced in blog post. Three Google researchers uncovered the “Poodle” (Padding Oracle On Downgraded Legacy Encryption) flaw which affects a large number of Internet-connected servers that can to fall back to the vulnerable SSL v3...

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs. The alleged sexy videos of the British actress drop more Trojans than actual pictures and, just as in many other sex tape scams, users don’t get to see the promised content. The scam comes a couple of weeks after a nude photo leak threat targeting Watson...

ComputerCOP: The most dangerous way to spy on your kids’ online activity?

It's perfectly understandable that many parents are concerned about what their children might be doing on the internet. Are they the victims of cyberbullying? Discussing drugs or joining criminal gangs? Visiting adult websites? Being groomed by paedophiles or sharing inappropriate photographs online? The list goes on... But one thing you need to be very careful about is what technology - if any - you use to...

Apple Pay or Google Wallet – What’s the Safest Way to Pay?

Apple Pay, Apple’s upcoming digital payment platform, is not on the market yet. But rumor has it that it will deliver the most secure environment ever used for in-store transactions. With massive data breaches hitting retailers and eroding trust in credit card payments, we thought we’d take a closer look at the embedded security features this alternative payment system will allegedly bring to the table. Is...

ShellShock Roundup: What to do if You are Vulnerable

A security vulnerability on the GNU Bourne Again Shell reported Wednesday is claiming victims in the wild. The flaw – known to the tech world as CVE-2014-6271 and CVE-2014-7169 - allows a remote attacker to run arbitrary code (read malware) on a vulnerable server under certain conditions. The most vulnerable targets to date are web servers that run Apache CGI scripts written in Bash or calling system() or p...

From Pencils to Tablets: The Changing Security Risks of 21st Century Schooling

Each fall, back-to-school preparation for students around the world is focusing less and less on pens and notepads and more on tablets, smartphones and other cool gadgets. To support a dynamic 21st century learning environment, schools have started to embrace the bring-your-own-device (BYOD) or bring-your-own-technology (BYOT) trend by introducing special IT policies and software. But until this becomes the...

Linux, OS X Users May Be Vulnerable to Bash Flaw Exploit

A bug discovered in Bash Shell, a command-line interface used by Linux and Unix, could leave web servers, systems and embedded devices such as routers vulnerable to cyber-attacks. Cyber-criminals are getting ready to launch multiple attacks, and Bitdefender warns users and sys admins to be cautious with the vulnerability.  Although code allowing the exploit of Bash-using CGI scripts is already available on...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top