How do you play your part for a better Internet?

How do you play your part for a better Internet?

The Internet is an astonishingly resourceful place - unlimited information on almost any subject in the world is at our fingertips. We use it to document our writings, chat with fr ...

Data Privacy Day: Reminding Us of Data Protection

Data Privacy Day: Reminding Us of Data Protection

Every year on January 28th we are reminded of the importance of our personal data and how it could be misused against us. More than 47 European countries along with United States a ...

Beware, Facebook Scam Shares Porn on Your Groups!

Beware, Facebook Scam Shares Porn on Your Groups!

A new Facebook tag scam is spreading pornographic content in Facebook groups, Bitdefender warns. We came across an evolved version of the known Facebook tag scam that manages to in ...

In 2016, growing IoT comes with new opportunities — and new threats

In 2016, growing IoT comes with new opportunities — and new threats

The Internet of Things is becoming a bigger part of consumers’ daily lives, thanks in large part to smart phones with larger screens that people use to control smart devices, accor ...

Ten facts you might not know about Linux

Ten facts you might not know about Linux

Today is Linus Torvalds’ 46th birthday! He is the inventor and lead developer of Linux kernel, the core of the operating system we all know and use today under various shapes and s ...

Tech trends: what to expect in 2016

Tech trends: what to expect in 2016

‘Cyber-security’, ’encryption’, ‘the Cloud’ and ‘machine learning’ have been among the buzzwords of 2015. We expect them to be at least as trendy next year, with technology compani ...

Biggest cyber-security events of 2015; lessons learned for a safer 2016

Biggest cyber-security events of 2015; lessons learned for a safer 2016

2 million compromised records 38% increase in security incidents First hacked smart car First ransomware for Linux Launch of Windows 10 and privacy concerns 14 million US governmen ...

Password Security in Immediate Danger, Deloitte Claims

Computer users will have a hard time keeping passwords private this year. At least, that’s the view of Big Four auditing firm Deloitte. The findings of Deloitte’s TMT Predictions 2013 report reveal rampant re-use of passwords, which puts computer users at risk when these passwords are leaked and bruteforced with modern technologies. “If you take a site with over six million users and you take ten thousand p...

Future Malware to Be Injected into Systems via Electromagnetic Interference

Modern malware can infect computers in quite a number of ways, but future infections will be able to take over networks not even connected to the Internet. The infiltration mechanism under research at the Intelligence and Information Warfare Directorate (I2WD) is based on the interference induced in conductors such as network cables, which act as wireless antennae broadcasting information being transferred...

Bitdefender Offers Free Removal Tool for Red October Cyber-Espionage Piece

Details of a new cyber-espionage tool dubbed Red October emerged early this week This complex piece of malware is built in a modular manner and carries all the prerequisite for a successful attack, such as infection components, plugins and command and control mechanisms. The infection appears to have gone unnoticed for an incredible amount of time, judging by the timestamp of its components, even though som...

Flashlight among Android Apps That Rat Out Users (and Surprise Them)

Android users are surprised to find that the Flashlight apps for Android could rat out device owners, and many more seemingly innocent apps can track their location, according to the Carnegie Mellon University. Researchers argue people are surprised to learn that popular mobile applications are sharing their sensitive data. “There's no sensible reason why a flashlight app would need your location," said Jas...

Michael Jackson Hackers Escape Jail Time, Serve Community

The two British hackers who allegedly stole Michael Jackson’s music after breaking into Sony’s servers got away without prison time but were sentenced to complete 100 hours of community service, according to The Guardian. 27-year old James Marks and 26 year-old James McCormick confessed they were big fans of Michael Jackson, which made them search for evidence that his posthumous songs weren't interpreted b...

RSA Finds Laser-Focused Phishing Attacks Targeting Pre-Determined Victims

A new phishing kit was recently discovered and analyzed by EMC’s RSA Security division in which a specific group of victims was targeted for credentials theft. Assigning each address on the list a unique identifier, a user clicking the malicious link was first validated and then redirected to a phishing webpage if he made the list. Users not on the list were redirected to a 404 webpage. The “laser precision...

Malware Infecting US Power Plant SCADA Systems

Critical power generation systems inside two US power plants were infected with “known sophisticated malware” that spreads via USB drives, reports the US Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). The malware, which the team didn’t name, infected a handful of machines during a software update initiated by an outside technician. With supervisory con...

Cisco-Powered Linksys Routers Vulnerable to Remote Ownage

A serious flaw in the Linksys routers could allow an attacker to seize root privileges on the device, according to a blog post by pen-tester specialist DefenseCode. As shown in a video, successful exploitation of a Cisco Linksys WRT54GL model gives the attacker root access on the locally installed Linux-based firmware. DefenseCode claims the vulnerability resides in the latest Linksys firmware (4.30.14), bu...

South Korea Trains Hackers to Fight Cyber Crime

South Korea has launched a program that aims to find the best hackers and turn them into national defenders against internal and external cyber-attacks, according to CNN Seoul. The South Korean government, in collaboration with the Korea Information Technology Research Institute (KITRI), has set up a six-month training program called “Best of the Best” to transform the country’s smartest hackers into nation...

‘Police Ransomware’ Becomes Java 0-Day-Borne

The recently discovered vulnerability disclosed on Thursday has been finally patched by Oracle, but exploitation in the wild continues on computers that have not been updated yet. With exploitation code included in world’s most frequently used exploit packs such as BlackHole, Nuclear Pack and the Cool Exploit Kit, cyber-criminals have started to take advantage of the huge pool of vulnerable computers by pla...

© 2012 Powered By Bitdefender

Scroll to top