You Are Here: Home » Tips and Tricks

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new gadgets, innovative technologies and geeky events, but also give you security tips and tricks on how easy it could be to stay safe online. Developing award-winning technologies that fight off even the newest malware outbreaks is...

Eight great ways to avoid embarrassing privacy leaks

Selfies have become the digital currency on social media. People are going to extreme extents to take the perfect selfie, putting their lives on the line to share their extraordinary experiences. And celebrities are leading the way, “breaking” the Internet with unconventional pictures that evoke floods of comments. This massive wave of content is driven by mobile apps, like Snapchat, Periscope and Instagram...

It was a dark and scary night … A modern Halloween tale

You’re at home, lounging on the sofa. It’s Halloween, but you don’t get overly excited about it  -just a quiet evening watching your favorite scary movie on your new TV. After all, you’ve invested a lot in your home comfort- a smart TV, a Nest thermostat, smart lightbulbs, an intelligent door lock – everything made so you never have to leave the house. While you’re sipping your hot chocolate, getting cozy a...

Are parental controls keeping up the pace? One in 10 kids 15 or under wants to access pornography sites

One in 10 children no older than 15 is interested in accessing pornographic content, recent Bitdefender data reveals. This may not come as a surprise, since pornography has basically been around since forever. But, thanks to the Internet, it has increased sharply in accessibility and hyper-interactivity. Children are closely supervised by parents or the staff at their schools but, when they turn on their co...

10 Tips to Safeguard Your Photos like a Pro Photographer

Pictures are among our most valuable digital assets. They are also the most popular type of file stored or shared via cloud services. Statistics show that 82% of people who use internet storage space do so to safeguard their photos against accidents. But what about professional photographers who take thousands of photos at wedding or performances? Even the most experienced digital artists have admitted to d...

Configure Windows 10 like a privacy pro

Windows 10 has only been around for a couple of days, but it is running on more than 67 million computers worldwide already. The new operating system is being aggressively pushed to all Windows users who own a valid license for Windows 7 or Windows 8/8.1, provided they want the upgrade and their computer meets the minimum requirements. The average of 11 million new customers per day is somehow understandabl...

Travel Scams Are Back, Expedia Customers Victims of Phishing

It’s that time of the year -- scammers are taking advantage of people looking to book a room over the holidays. Expedia, one of the largest travel sites in the world, warns about a phishing scam targeting unsuspecting customers, according to news reports. Source: expedia.com Some Expedia customers have been emailed and called from someone pretending to work at the reputable company, after a breach at a thir...

How to Avoid Becoming a Victim of Ransomware – Part III

Before we proceed, here is a quick catch-up, in case you’ve missed the first two articles describing what ransomware is and how it works:  Part I and Part II. By now, it looks like there’s no escape from ransomware, especially since it also targets mobile devices, threatening to lock users out of their smartphones or tablets. Remember Koler? Unfortunately, encrypted communications between attackers and elus...

Money or Data? The Ultimate Guide to Understanding Ransomware – Part I

Not long ago, a man committed suicide after an automatically generated notice from a computer virus threatened him with jail unless he paid a ransom thousands of dollars. The year was 2014. As incredible as the story seems, it marked the first known time a computer virus actually killed somebody. The next generations stole cash from users around the globe, and Cryptolocker raised the stakes - holding data o...

The Truth Behind Alternative Passwords

Weak passwords are known as the soft spot of any online security strategy. Hackers regularly break into website databases, steal passwords and then use them to access user accounts. Even when passwords are encrypted, cyber-criminals often find ways to crack them. So it was only natural for users and security specialists to think of new ways to secure accounts and devices. Here is an overview of the newest a...

© 2012 Powered By Bitdefender

Scroll to top