PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Social Media in the News: Facebook Tweaks Sharing Control with New Plugin; Colin Powell Warns Users ‘Too Interconnected’

Facebook has just launched the Shared Activity plugin which allows users to control the visibility of their actions while using apps developed for the platform, according to a blog post signed by Andrew Chen. The plugin allows Facebook users to set a default audience for in-app activities or adjust the size of the public that previous published actions reach. “For example, when an individual uses a music ap...

Zero-Day Exploit Found on Samsung Galaxy S3

A team of Android security experts successfully hacked a Samsung Galaxy S3 by revealing two Android exploits at the Mobile Pwn2Own competition at EUSecWest in Amsterdam. A memory corruption exploit was triggered via Near Field Communication, enabling researchers to upload malicious code and access secure data. The second exploit found involved privilege escalation by enabling an app to execute malicious cod...

Internet Explorer Fix Tool Available; Critical Security Update on Hold until Tomorrow

Microsoft released a “fix it” tool for the Internet Explorer vulnerability that became public earlier this week and scheduled a security update for tomorrow. According to security researchers, variants of the new Internet Explorer exploit are used to infect users with remote access Trojans targeting specific industries, and can covertly grab personal information. “More customers could be affected,” Microsof...

Google Talk and NASA Subdomain Hacked, Fox News Mobile Page Still Defaced

As many as 1,000 usernames and passwords were leaked on the Internet after Google Talk was allegedly hacked by a Team Alad33n member nicknamed Galad33n, according to a Pastebin dump. Several other attackers defaced a couple of Fox News websites and a NASA subdomain in what appear to be separate security breaches. “Google has left it's [SIC] data unsecured, some passwords are not encrypted, some are, scroll...

Thousands of Hacks and Cracks on YouTube Spin Endless Surveys for Money; Fake Antivirus Check Lists Increase Allure

The hacking and cracking business just started a marketing push with intensive YouTube video distribution. Several bogus accounts have been created recently, with thousands of videos providing instructions on various cracking/hacking tools and luring users to click on potentially dangerous short links. To make things look perfectly secure, fake antivirus check lists are posted in the video descriptions. The...

Island Dispute Sets Off Chinese Cyber-attack against Japan; 19 Japanese Websites Hit, 300 Targeted

China appears to have begun a cyber-war against Japan amid the two countries’ dispute over East China Sea islands, notes zdnet. At least 19 Japanese websites were hit, according to a report from Japan’s National Police Association (NPA). NPA said on Wednesday that information about 300 Japanese organizations being targeted surfaced on the message board of Honker, a Chinese hacker group, and that thousands o...

U.S. to Apply Self-Defense Rule if Cyber Attacks Turn Hostile

The United States views any cyber-attack that results in death, injury or destruction as implicitly triggering the self-defense rule. Claiming that cyberspace is not “law-free,” State Department legal adviser Harold Koh said the U.S. will abide by international law and take proportionate actions that won’t harm individuals. Although countries in the United Nations have adopted and shared these views, Koh no...

Fighting Cybercrime with $2.3 Million Cyber Security Scholarship

Kansas State University has launched a cyber security program in an effort to prevent future cybercrime attacks against the United States.  The National Science Foundation awarded $2.3 million to the university, so students interested in cyber security can go pro. With critical infrastructure systems enabling remote access, millions of hacking attempts are made each day to gain control of those systems. Tra...

POS Hacking Sandwich Reels in $ 10 Million; 2 Plead Guilty as Charged

Romanian nationals Iulian Dolan and Cezar Butu pleaded guilty to conspiracy to commit computer  and access device fraud in a POS hacking scheme targeting hundreds of Subway restaurants in the U.S and accounting for $ 10 million losses for customers, reports cio.com. Four Romanians came under judicial fire from the New Hampshire District Court on account of this hack in December 2011. Adrian Tiberiu Oprea, t...

Attackers Feast on 0-day Exploit for IE 7, 8 and 9 On Windows XP, Vista, and 7

A new 0-day exploit enabling remote code execution in Internet Explorer 7, 8, and 9 on Windows XP, Vista and Windows 7 could let attackers execute malicious code in the context of the current user. Attackers could craft websites that take advantage of a vulnerability in the way Internet Explorer accesses objects that have been deleted or improperly allocated. “An attacker who successfully exploited this vul...

© 2012 Powered By Bitdefender

Scroll to top