Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

The Internet of Things (IoT) or Internet of Threats, as we often call it, has been labeled "the next Industrial Revolution" by journalists because of the way it will change the way ...

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Whenever you go on holiday, you end up taking all your personal data. The information on your personal phone, laptop or other smart device is at more risk of being compromised or s ...

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

It happened! Last night, this blog received the Grand Prix Prize for the Best Overall Security Blog at the European Security Blogger Awards in London! An award we are happy to shar ...

Smart switch may turn off your Wi-Fi for good

Smart switch may turn off your Wi-Fi for good

You might be risking your privacy, and even physical security, if you use a next-generation switch to control appliances in your home. Image source: Flickr In analyzing several IoT ...

Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Former Hostgator Employee Charged for Planting Backdoor on 2,700 Servers

Police apprehended 29-year-old Eric Gunnar Gisse of San Antonio, Texas and charged him with rooting 2,700 servers of his former employer, Hostgator. Gisse, a medium-level administrator, is believed to have installed the Trojan with the intent of remotely accessing all the rooted servers at will. Prosecutors with the district attorney’s office of Harris County in Texas accused Gisse of felony breach of compu...

FBI Issues Warning on Boston Marathon Fraud

The FBI issued a warning on Boston Marathon fraud after complaints of trickery via social media and e-mail scams. Since the April 15 explosions, cyber-criminals took advantage of human generosity and started to spread donation scams and spam loaded with malware. Soon after the explosions, a Twitter account that resembled a legitimate Boston Marathon account lured users into donating a dollar each to victims...

Five Times More Likely to Get Malware without AV

Computers with no antivirus are five times more likely to get infected with malware than those with protection, according to Microsoft. In the first quarter of 2012, the company found malicious e-mail attachments on almost 3 million computers and detected 7 million Keygens. The activation key generators that users install with “free” software, movies or games often come loaded with malware. Most users don’t...

Shock Waves from Texas and Boston Blasts Hit Internet in Form of Spam Waves

The blasts that killed 15 people and injured 160 at a Texas fertilizer plant yesterday triggered a global wave of malicious spam today, even as the internet is still infested with spam messages that exploit the Boston Marathon bombings to spread password-stealing malware. Only hours after the blasts in Texas, spammers injected keywords and subject headers related to the explosion into about 5 per cent of al...

Attackers Pull More and Bigger DDOS Attacks

Attackers have become more organized and better equipped to launch more frequent and bigger DDOS attacks this year, according to Prolexic. The volume, duration and frequency of distributed denial-of-service hits have significantly increased during the first quarter of 2013, and 11 percent had an average bandwidth of more than 60Gbps. The Florida-based company found an average attack bandwidth in this period...

Within Hours of Boston Bombing, Related Keywords Spread to 20% of Spam, Bitdefender Study Shows

Hours after the Boston Marathon tragic incident, the words “marathon,” “Boston” or “explosion” had made their way into the subject headers of one in five spam messages, according to a Bitdefender study. The data reveal a disturbing cycle of spammers and scammers seeking to take profits from people concerned about terrorism. Bitdefender anti-spam labs first spotted the trend in the hours after the bombing an...

Wireless Carriers May Face FTC Investigation for Lagging Android Security Updates

Wireless carriers may face FTC investigations because of lagging Android security updates, as the American Civil Liberties Union (ACLU) has filed a complaint stating that user are exposed to malware threats that endanger their privacy. Arguing that even off-the-shelf smartphones lack the latest security updates and that older models sometimes never receive the latest Android security updates, the ACLU belie...

US National Security Agency to Defend Against Cyber-Attacks from Military in Friendly Competition

Students from various US military academies will tackle the US National Security Agency in a friendly competition hosted by Lockheed Martin to simulate real-life hacking scenarios that affect government or private networks. The Cyber Defense Exercise (CDX) enables students to train under simulated attack conditions to build experience and prepare for actual scenarios. Saying that practice is vital for train...

Got Scammed…What Next?

The moment you suspect you got scammed, start mitigating the situation not matter if it’s a telemarketing scam, internet fraud, identity theft, counterfeit medicine, or business fraud. First off, disconnect the compromised device from the Internet. But don’t power it off. Some malware pieces are designed to discard their payload at reboot, making it impossible for someone to recover the sample and understan...

Vulnerability in Vaillant Heating Systems Allows Unauthorized Access

A critical security vulnerability in the heating and power systems of German company Vaillant allows unauthorized people access the systems, turn them off and damage them at will. Vaillant has sent all its customers a warning, recommending they manually disconnect the vulnerable devices, namely ecoPower 1.0, from the network and wait for one of their employees to fix the systems on site. Image credit: Vaill...

© 2012 Powered By Bitdefender

Scroll to top