Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Companies Pay $6,500 an Hour to Recover from DDoS Attacks

Companies pay $6,500 an hour to recover from a DDoS attack and up to $3,000 a day to mitigate and recover from malware infections, according to a report by Solutionary. The security service provider said that sophisticated malware, DDoS attacks, the BYOD trend and Web application security are the top four threats that concern organizations. The costs of cyber-attack recovery, based on real-world cases, incl...

Sports Retailer Sues Visa for Security Breach

Sports retailer Genesco is suing Visa for $13.3 million following a security breach, alleging the Payment Card Industry's fines are too arbitrary, according to eWEEK. The specialty sports-apparel company filed a lawsuit against Visa on March 7 to recover losses from fraudulent transactions. The Payment Card Industry's Data Security Standards force companies to respect several security standards or else face...

Google Helping Webmasters with “How Not to Get Hacked” Tips

Google launched a new campaign aimed at helping webmasters to quickly recover from hacked websites. Posting tutorials, tips and tricks and other information that could speed up recovery, Google’s initiative is the latest in a line of anti-hacking campaigns. Teaching website owners how to bounce back in the event of a hack, Google’s “Webmasters help for hacked sites” website covers topics ranging from why ha...

US Security Advisor Warns China to End Cyber Attacks

Warning China to put an end to cyber-attacks, National Security Advisor Tom Donilon said the US will take any measures necessary to protect itself from intrusions. Large companies and businesses have expressed concerns over recent cyber-attacks as proprietary technologies and classified information may have been leaked "through cyber intrusions emanating from China.” "The international community cannot affo...

OSX Backdoor Used in Facebook Attack Snuck Past Gatekeeper

A new family of Mac OS X malware used to breach Facebook, Apple and a couple of other high-profile companies is using an exploitation technique to bypass the basic defense mechanism in OS X. Introduced in Mac OS X Mountain Lion, Gatekeeper acts as a control mechanism to allow or block software based on the source it comes from. Gatekeeper has three levels of security that allow a Mac OS X user to install ap...

Beyoncé, Kim Kardashian and Jay-Z Found Their Finance Data Posted Online

Hackers got their hands on US celebrities’ finance details and posted them on a dedicated website suspected to be tied to Russia. Jay-Z, Beyoncé, Mel Gibson, Ashton Kutcher, Kim Kardashian and Britney Spears were among the stars that had private data displayed for all to see. Hackers also targeted top government officials including US Vice-President Joe Biden, former Secretary of State Hillary Clinton, form...

New Scam Targets Curly-Haired Facebook Fans

A new Facebook page is attempting to trick the curly-haired masses on the world’s most popular social site with an offer of free hair straighteners, according to Hoax Slayer. The scammers apparently aim to gather enough likes and shares so they can sell the page to other scammers, without ever straightening a single curly hair. “We have got 569 GHD Hair straighteners that can't be sold because they have bee...

Mobile Malware Creators Pay $100 for Active Google Play Accounts

Malware developers targeting Google’s Android platform are reportedly seeking new ways to establish trustworthy delivery channels for their creations. Cyber-criminals are listening to the old business adage that “one has to spend money to make money.” According to a report by tech journalist Brian Krebs, an Android virus writer is offering as much as $100 for a verified developer account tied to a dedicated...

Blackberry Removes Four Apps from Store for Privacy Infringement

Four third-party applications were removed yesterday from BlackBerry World over privacy concerns. According to a note from the phone manufacturer, the four applications were not malicious, but “forgot” to inform the user that they were uploading the user’s contact list, network identifiers, device identifiers, and the smartphone location to the application vendor’s server. The applications in question inclu...

Deutsche Telekom Security Dashboard Shows Cyber-Attacks in Real Time

Deutsche Telekom has launched a website that reports attacks on honeypot systems in real time. Russia is the top country under cyber-attack, followed by Taiwan, Germany and Ukraine, according to a press release. The online portal www.sicherheitstacho.eu is based on more than 90 sensors worldwide that act as early warning systems. More than 200,000 new versions of viruses, trojans and worms appear every day,...

© 2012 Powered By Bitdefender

Scroll to top