Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

While Looking for the Perfect Vacation, Keep a Watchful Eye out for the Perfect Scam

As the travel industry heavily started promoting summer deals earlier; scammers, too, have plunged into the trend with spammed malware campaigns using holiday hooks. Flight confirmation emails are the top lure this season, followed by hotel deals, extravagant cruise packages and vacation loans. In season, holiday spam can reach up for up to 6% of all spam. And if a regular “business spam day” means some 1.8...

Four in Five IT Managers Believe Employees Deliberately Disobey Security Policies

A study conducted by privileged identity management company Liberman Software reveals that about 80 percent of corporate IT managers believe their company’s employees deliberately ignore security best-practices at work. The survey, based on the opinions of about 250 security professionals in the corporate sector, also show that more than half of the same end-users would not care much even if these security...

Apple Password Reset Bug Allows Anyone to Hijack User Accounts

A step-by-step tutorial showing how to change Apple ID passwords posted on the underweb has caused a massive headache to the Cupertino-based technology vendor. The tutorial has forced Apple to put the password recovery process in maintenance mode over the weekend to protect customers’ accounts. The step-by-step account hijacking guide [the tutorial is not working anymore] reveals a gaping security hole in t...

Microsoft Reveals How it Assists Global Police with Data Requests

In its first transparency report, Microsoft revealed how it helped police worldwide with information on the company’s users. In 2012, the company assisted some 75.378 police requests for client information linked to ongoing criminal investigations. Some 2.1 percent of these requests sought information on content created by people, including documents, images and e-mails stored on servers or sent via Microso...

Teenager Jailed for Distributing Child Pornography

A 17-year-old resident of Georgia in the US was arrested for hacking private phones and stealing explicit photos of children. He then posted the photos on illegal adult websites. According to 9News, Michael William Cook, of Acworth, Georgia, targeted people under 18. He sent his victims a text message that appeared to originate from a photography company (Maxi Focus Photography) and invited users to install...

Session Fixation Flaw Keeps Cookies Alive for Major Services after Logout

A new flaw in cookie handling that makes log-ins persistent has been discovered by security researcher Rishi Narang. When a user logs into an account, the server sends a cookie – a small piece of text – that holds his session ID and tells the server he successfully passed authentication and should be served content without a further log-in prompt when navigating between pages. Cookies are set to expire, eit...

Yontoo Trojan Used to Inject Advertisements in Browsers on Mac OS X

A new Mac OS X Trojan that injects advertisements in browser has been identified by Bitdefender’s Mac OS X researchers. This piece of malware does not attack the operating system, but rather disguises itself as a plugin for watching web videos to lure unwary victims into downloading, executing and installing a number of browser plugins for Safari, Chrome and Firefox. The infection occurs when the user visit...

Researchers Unleash Human-Like Botnet; Chameleon Mines $6 million a Month

Researchers at Spider.io discovered a ‘human-like’ botnet counting over 120,000 infected systems, and costing advertisers more than $6 million a month, according to Spider.io. Chameleon is the first botnet to directly impact display advertisers rather than text-link advertisers. “At least 7 million distinct ad-exchange cookies are associated with the botnet per month,” the researchers said. "Advertisers are...

Hacker Creates Worldwide Map of Vulnerable Devices

A hacker created a worldwide map of more than 100,000 vulnerable devices after “playing around” with a scripting tool. The “Carna” botnet was named after the Roman goddess that protected inner organs because it was “a good choice for a bot that runs mostly on embedded routers.” Carna ran from June to October last year and was allegedly never detected. Many of the open machines were based on Linux and allowe...

Xbox Live Accounts of Microsoft Employees Hacked Using Social Engineering

Xbox Live accounts of Microsoft employees were breached via “several stringed social engineering techniques,” the company said. Although the breach didn’t relate to a vulnerability in Microsoft’s systems, the company is investigating the incident by working with law enforcement and the companies used in the social engineering scheme. By obtaining social security numbers of the targeted employees, hackers we...

© 2012 Powered By Bitdefender

Scroll to top