Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

Pornography is no longer scammers’ favorite bait! After analyzing a wave of scams spreading worldwide before the Valentine’s Day celebration, Bitdefender researchers have found tha ...

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, Bitdefender malware analyst ...

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Two weeks ago, we wrote about the re-emergence of tag scams on Facebook. What seemed to be a basic worm at that time turned into inspiration for multiple cyber-criminal gangs. This ...

CTB Locker Ransomware Targets French Companies

CTB Locker Ransomware Targets French Companies

A spam campaign delivering CTB Locker is targeting employees from French companies, Bitdefender researchers found. The  spam e-mails  carry an attachment,a .cab file and a message ...

Facebook Tag Scams are Back with Malicious Payload

Facebook Tag Scams are Back with Malicious Payload

Bad week-end for Facebook users: a malicious tagging campaign ended up infecting at least 5 thousand computer users with a backdoor. This three-day campaign has been actively mirro ...

Win a MacBook Air with Bitdefender #hugamac

Win a MacBook Air with Bitdefender #hugamac

Here’s your chance to win a brand new 13” MacBook Air by just posting a selfie with your current Mac, followed by the hashtag #hugamac. You can use Facebook, Twitter, and even Inst ...

One in Four 19-Year-Olds in the U.S. Face Tight Parental Control Online

More than a quarter of young adults in the United States whose parents buy antivirus software may face online parental control, according to a Bitdefender survey. Some 25.3 percent parents of late teenagers and young adults (19 years old and older) consider parental control “very important” when buying antivirus software, according to a Bitdefender survey of 1,000 AV software buyers throughout the United St...

Biometrics to Become Standard Feature on Smart Mobile Devices

Biometrics for Smart Mobile Devices (SMDs) will become a standard feature by the end of the decade, says market research firm Goode Intelligence. The firm predicted 39 million users will own biometric devices by 2015. With BYOD devices being used for both personal and work activities, increased security measures are the next step. Identity management software is predicted as a standardized solution for incr...

Hacked Dropbox Accounts Used in Gambling Spam Campaign

Hacked Dropbox accounts were recently used in a spam campaign that affected a few hundred users. Usernames and passwords were allegedly accessed via third party websites two weeks back, but the recent spam campaign confirms the breach was real. The online file storage service confirmed that user accounts were accessed and an employee documents containing user emails was used in the spam campaign. Users from...

Facebook Lookalikes Hit ‘Adult Only’ Niche; Phishing and Spam Keep Business Going

Messages spreading via Yahoo! Messenger or via the e-mail deliver an interesting offer for 18+ eyes only. Recipients are invited to a Facebook-like network overtly declared or subtly implied to provide participants with adult entertainment. The combination of baits in these cases is brilliant: Facebook or Facebook-like friend requests from unknown persons are already part of the arsenal of online socializat...

Security Researcher Introduces Proof-of-Concept Tool to Infect BIOS, Network Cards, CD-ROMs

For the last decade, persistent e-threats in the form of malicious code sneaking into firmware, EPROMs or BIOS chips were just a bad dream for antivirus companies. This dream has now become a cruel possibility with the introduction of Jonathan Brossard’s proof-of-concept tool that can compromise the OS at boot by replacing the BIOS (Basic Input Output System). Named Rakshasa (after a demon in Hindu mytholog...

Security Hole Shipped With Ubisoft Games Spotted, Fixed

Attackers can reportedly use a bug in the Uplay browser plugin from game publisher Ubisoft to run arbitrary code on the gamer’s PC. Image credit: Ubisoft The exploit was discovered by programmer Tavis Ormandy, a Google employee who successfully leveraged the bug in the browser plugin shipped with UPlay (a component that installs along with Ubisoft’s most recent gaming titles). By simply pointing the browser...

Coders Preparing Two-Month Hackathon on a Remote Tropical Island

A 2 month hackathon on a remote tropical island is one of these days’ hot topics of discussion these days on the ycombinator forum, as reported by the BBC. Project comehackwithus aims to bring together coding masterminds looking for an exotic location attractive enough to merit the travel, while also allowing potential participants to focus on work. Like all other ambitious “looks like fun, but it’s just wo...

Hackers Snatch Data of 8.7 Million South Korean Mobile Users; Data Sold for More Than $800,000

Two hackers accused of stealing the names, phone numbers, and residential registration numbers of 8.7 million mobile users were arrested on Sunday by South Korean authorities, according to AFP. The company targeted in the attack, KT, the second biggest mobile telephony operator in South Korea, had reported the incident to the police on July 13. The illegal accessing of customers’ data had apparently gone on...

Philanthropist Phisher Gives Bogus Yahoo Prize from Gmail Account

Bitdefender Labs spotted a new wave of phishing e-mails targeting the Irish and British. Users are supposed to send their personal information to pick up the bogus Yahoo prize from a manager registered at rival e-mail service, Gmail. Soon after the breach that made 453,000 Yahoo Voice credentials vanish, cyber-crooks started targeting Irish and Brits with an old lottery phishing technique. Victims receive a...

London Olympics Forbidden Items: Weaponry and Wi-Fi

The London Olympic Committee has published a list of prohibited items that might deny you entry to the London 2012 venues. While most items are the usual suspects at sports events, such as weapons, alcohol, fireworks or illegal substances, some electronic devices, such as walkie-talkies, radio scanners and access points have been banned. The main reason for the ban on walkie-talkies, scanners and jammers is...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top