Data Privacy Day: Reminding Us of Data Protection

Data Privacy Day: Reminding Us of Data Protection

Every year on January 28th we are reminded of the importance of our personal data and how it could be misused against us. More than 47 European countries along with United States a ...

Beware, Facebook Scam Shares Porn on Your Groups!

Beware, Facebook Scam Shares Porn on Your Groups!

A new Facebook tag scam is spreading pornographic content in Facebook groups, Bitdefender warns. We came across an evolved version of the known Facebook tag scam that manages to in ...

In 2016, growing IoT comes with new opportunities — and new threats

In 2016, growing IoT comes with new opportunities — and new threats

The Internet of Things is becoming a bigger part of consumers’ daily lives, thanks in large part to smart phones with larger screens that people use to control smart devices, accor ...

Ten facts you might not know about Linux

Ten facts you might not know about Linux

Today is Linus Torvalds’ 46th birthday! He is the inventor and lead developer of Linux kernel, the core of the operating system we all know and use today under various shapes and s ...

Tech trends: what to expect in 2016

Tech trends: what to expect in 2016

‘Cyber-security’, ’encryption’, ‘the Cloud’ and ‘machine learning’ have been among the buzzwords of 2015. We expect them to be at least as trendy next year, with technology compani ...

Biggest cyber-security events of 2015; lessons learned for a safer 2016

Biggest cyber-security events of 2015; lessons learned for a safer 2016

2 million compromised records 38% increase in security incidents First hacked smart car First ransomware for Linux Launch of Windows 10 and privacy concerns 14 million US governmen ...

CryptoWall 4.0 returns to the wild, posing as good guy

CryptoWall 4.0 returns to the wild, posing as good guy

The infamous CryptoWall ransomware family is back, encrypting files under the false pretenses of testing AV solutions for their’ “suitability” to protect data. “CryptoWall Project ...

Gozi Malware Creators Charged in the US; the Russian Faces 95 years in Prison

US authorities have charged three Europeans, including one Russian, for writing and distributing the Gozi malware to steal tens of millions of dollars from bank accounts, according to a press release by prosecutors. Prosecutors say the hackers injected the Gozi malware into a million computers worldwide, including 40,000 in the US and some systems belonging to NASA. The accused Russian national risks a maxi...

SERT Points Russia as Leader in Exploit Kit Development

A report by the Security Engineering Research Team revealed that 70 percent of exploit kits reviewed were developed in Russia. In the fourth quarter, 58 percent of targeted vulnerabilities were 2 years old, confirming that cyber criminals still successfully use them. One of the most popular exploit kits in 2012 was BlackHole 2.0, which was used to distribute 18 percent of malware samples analyzed by the SER...

Vodafone Malware Campaign Goes Large Scale; the Dutch Are at Gunpoint

The recent “Vodafone” malware campaign targeting Brits went international as several waves of spam loaded with Trojan Gamarue landed in the Dutch region. The Bitdefender Labs expect the MMS campaign to spread to even more countries and languages. Dutch users are at cyber-gunpoint these days as a dangerous dropper infects them with malware capable of mining sensitive details and sending them to a machine con...

Twitter Flaw Surrenders Private Messages to Third-Party Apps

Third party apps that use Twitter accounts for authentication could have accessed private direct messages without users’ knowledge. The flaw in Twitter’s API was discovered by IOActive’s CTO, Cesar Cerrudo and was fixed by Twitter following its report. The bug was discovered during the registration process in which developers select the level of access apps have on user accounts. Features such as “read only...

`Confidential Message’ Infects Employees with Password Stealer

Malware writers target companies and public and private institutions by tricking employees into downloading a password stealer disguised as a confidential corporate document addressed to employees only. The document in the form of a ZIP file is attached to an e-mail addressed to company employees under the confidentiality mark. The sender’s address is spoofed to make it look as if the mail is sent by DocuSi...

Canadian College Student Allegedly Expelled for ‘Reporting Bug’

Computer Science student Ahmed Al-Khabaz was reportedly expelled after reporting a security hole in the Omnivox software application its college was using. The story, as per the report in the National Post, goes like this: while working on a mobile app to let fellow students access their college accounts, 20-year old Al-Khabaz stumbled on a serious bug that would allow anyone unrestricted access to the 250,...

Google Ring of Power Could Render Passwords Obsolete

Google Vice President of Security Eric Grosse and Engineer Mayank Upadhyay published a paper proposing a ring-finger authentication device to replace classic password-based authentication to strengthen websites’ authentication. Saying that typing passwords can be time consuming and far more vulnerable, an authentication token worn as jewelry could prove far more secure, the Google staffers said. Two-step au...

Password Security in Immediate Danger, Deloitte Claims

Computer users will have a hard time keeping passwords private this year. At least, that’s the view of Big Four auditing firm Deloitte. The findings of Deloitte’s TMT Predictions 2013 report reveal rampant re-use of passwords, which puts computer users at risk when these passwords are leaked and bruteforced with modern technologies. “If you take a site with over six million users and you take ten thousand p...

Future Malware to Be Injected into Systems via Electromagnetic Interference

Modern malware can infect computers in quite a number of ways, but future infections will be able to take over networks not even connected to the Internet. The infiltration mechanism under research at the Intelligence and Information Warfare Directorate (I2WD) is based on the interference induced in conductors such as network cables, which act as wireless antennae broadcasting information being transferred...

Bitdefender Offers Free Removal Tool for Red October Cyber-Espionage Piece

Details of a new cyber-espionage tool dubbed Red October emerged early this week This complex piece of malware is built in a modular manner and carries all the prerequisite for a successful attack, such as infection components, plugins and command and control mechanisms. The infection appears to have gone unnoticed for an incredible amount of time, judging by the timestamp of its components, even though som...

© 2012 Powered By Bitdefender

Scroll to top