Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

European ATM Security Team Warns of Across-the-Board Attacks

The European ATM Security Team, or EAST, issued a warning that skimming attacks on all types of ATMs have intensified. Everything from bank ATMs to bus ticket machines and point-of-sale terminals have been hit by attacks, all resulting in significant financial losses. Common methods involving card skimming have been replaced by physically stealing ATM machines or placing fake display screens and pads that r...

US Emergency Phone Networks Fall Victim to Extortion Con

The Department of Homeland Security (DHS) and the FBI issued a warning to public-safety call centers about numerous attacks against public emergency communications networks in US in a new extortion scam.  The attack, called telephony denial of service (TDoS), overwhelms emergency phone lines with automatically generated calls aimed at crushing the networks and blocking legitimate incoming and outgoing calls...

Infected or Not? Five Symptoms of a Security Breach

Most viruses, worms and Trojans circulating nowadays have learned to be discreet to avoid detection. Unlike predecessors that displayed warnings on users’ monitors, modern malware operates silently because crooks understood that users will install an antivirus to clean their computer at the first sign of infection. But, no matter how stealthy these pieces of malware are, there are still signs that give them...

Google Translate Tricks Spam Filters

Using shortened website links, compromised blogs and Google’s own translate service, scammers managed to avoid filters in an effective new spam tactic. Pharmaceutical spam made its way to inboxes via compromised WordPress blogs that were used in conjunction with Yahoo’s URL shortening service to translate spammy websites.  Once clicked, users are redirected to websites promoting pharmaceutical content. “One...

Critical Flaw in Bind9 Software Can Kill DNS Servers

A freshly-discovered flaw in the Berkley Internet Name Daemon (BIND) could allow an attacker to bring the DNS server to a grinding halt through the use of regular expressions. The vulnerability is known as CVE-2013-2266 and affects Linux and Unix versions of BIND from 9.7.x, 9.8.0 to 9.8.5b1 and 9.9.0 to 9.9.3b1, but not similar versions running on Windows. When successfully exploited, the named process sta...

Amazon Simple Storage Buckets Leak Owner’s Data

Almost 2,000 storage buckets from cloud provider Amazon are inadvertently exposing confidential user data due to improper configuration by the customer, according to a study by Metasploit vendor Rapid7. Buckets are logical storage containers that companies use for purposes from mirroring downloads to storing office documents or local backups. They can be set as either public or private, and access to the fi...

Anonymous Member Could Spend Five Years behind Bars in Koch Attack

A 37-year-old Anonymous member faces up to five years in prison if found guilty of a DDoS attack against a multinational company, according to IT World. If convicted, he may also be forced to pay up to $500,000 fines. Eric J. Rosol from the US state of Wisconsin allegedly participated in the attack on a website of the Koch Industries back in February 2011. The firm is involved in several businesses, includi...

Internet Hit by Huge, but not Global, DDoS Attack

The DDoS attack that hit SpamHaus this week was huge, but not as global as first thought, according to Venture Beat. The Internet Traffic Report shows the response time has been “pretty steady for the past 30 days, with no discernible dip in the past week, and packet loss globally has remained steady at almost zero.” Venture Beat also looked at the InternetPulse, which revealed that the internet in the US w...

Forensics Recover Cloud Data from Smartphones

Remnants of files uploaded to cloud services were retrieved by researchers at the University of Glasgow, pointing to poor encryption and major security gap. By using forensic software on smartphones that uploaded files to cloud services, researchers were able to piece together bits of data that revealed the cloud location of the uploaded files and other sensitive information. "That smartphones can essential...

Mozilla Upgrade Angers Adware Industry

Mozilla’s announcement that it will block third-party cookies stirred controversy in the adware industry, raising complaints that halting the practice commonly used to target individual users with tailored ads is “dangerous and highly disturbing”. The decision will result in internet users being spammed by irrelevant ads instead of highly targeted ones, said Dan Jaffe, vice president of government relations...

© 2012 Powered By Bitdefender

Scroll to top