You already live in a smart home. Now make it safe.

You already live in a smart home. Now make it safe.

Smart homes have become a reality as technology reaches the point where anything can be transformed into a smart thing. We’ve surrounded ourselves with internet-connected devices t ...

Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

The Internet of Things (IoT) or Internet of Threats, as we often call it, has been labeled "the next Industrial Revolution" by journalists because of the way it will change the way ...

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Whenever you go on holiday, you end up taking all your personal data. The information on your personal phone, laptop or other smart device is at more risk of being compromised or s ...

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

It happened! Last night, this blog received the Grand Prix Prize for the Best Overall Security Blog at the European Security Blogger Awards in London! An award we are happy to shar ...

Smart switch may turn off your Wi-Fi for good

Smart switch may turn off your Wi-Fi for good

You might be risking your privacy, and even physical security, if you use a next-generation switch to control appliances in your home. Image source: Flickr In analyzing several IoT ...

Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Vulnerability in Vaillant Heating Systems Allows Unauthorized Access

A critical security vulnerability in the heating and power systems of German company Vaillant allows unauthorized people access the systems, turn them off and damage them at will. Vaillant has sent all its customers a warning, recommending they manually disconnect the vulnerable devices, namely ecoPower 1.0, from the network and wait for one of their employees to fix the systems on site. Image credit: Vaill...

‘Hacker’ Search Engine Can Open Millions of Back Doors

A search engine developed in 2009 can be used to uncover back doors and low-security devices such as servers, routers, webcams and printers. The Sentient Hyper-Optimized Data Access Network, or Shodan, crawls the Internet to find devices that try to remain undiscovered. According to the developer, more than 500 million devices are searched every month. Hackers may take advantage of the search engine because...

Cybersecurity Costs to Rise $800 million in New US Budget

Cybersecurity will get $800 million extra from the new US budget, as President Barack Obama announced a greater need to protect American computers from attacks, according to Reuters. Anti-hacking efforts will rise to $4.7 billion, while the Pentagon’s budget will be cut by $3.9 billion. Money will be mainly invested in “reconnaissance, surveillance, development, maintenance and analysis.” In this way, the P...

Security Researcher Hacks Flight System to Control a Jet

A security researcher managed to “hijack” a flight deck system and change a plane’s course in a hacking skill demonstration, according to the BBC. Hugo Teso, an authorized pilot, gave the aviation computer systems new navigation instructions. He then gained total control of the simulated jet he had built using spare parts bought from eBay. “I expected them to have security issues but I did not expect them t...

Fraudsters Impersonate Skype Team to Compromise German Users Systems

Germans speaking users are targeted by crooks that compromise their systems and download other malware on their devices depending on the campaign variety they have in mind. Today it can be banking credentials. Tomorrow it can be social networking login data. The next day they use people’s systems to initiate a DDoS attack against who-knows what company or institution website. The present sample is an e-mail...

Google Glasses Banned in Strip Clubs Too

While some bars have already expressed reluctance in accepting customers with Google Glasses, strip joints joined the bandwagon as the technology could be too disruptive and intrusive. Having the potential of being used to constantly record and broadcast videos; it raises serious privacy concerns for casinos, strip clubs, theaters and other places. Although Google Glasses have not yet been released, some ha...

Hassle-free Website Authentication with Mozilla’s Persona

The recently released second Beta of Mozilla’s Persona web-login technology introduced a new Identity Bridging feature that enables users to login to websites with no credentials other than their email address. While the first beta of Persona required that users register an email address with a Persona Identity Provider server (IdP), the new beta removes the need for first authenticating the email address w...

Android Malware Delivered Via Botnet Spam

A new IRS tax spam campaign pumped up by the Cutwail botnet has been found to deliver „goodies” for Android users as well, according to Dell’s SecureWorks Counter Threat Unit. Called Stels, this Android Trojan is a multi-purpose tool impersonating an Adobe Flash update. If it gets installed, the malware can intercept SMS messages, collect contact information and initiate phone calls, as well as install addi...

Popular Router Brands Vulnerable, Metasploit Module Available

A number of highly popular router brands including Linksys, D-Link and Netgear, can be exploited to allow administrative access over the device. Although mainly used for home networking, these devices are often deployed in companies in non-critical infrastructures (for wireless networks for guests not interconnected with the corporate network) being less expensive than their professional counterparts. Accor...

User Privacy Plunges as Android Aggressive Aware and Malware Rise

With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is increasingly taking a backseat to profit for developers and advertisers. More and more unknown third parties now have access to user browsing history, phone numbers, email address and everything they need to compile comprehensive and...

© 2012 Powered By Bitdefender

Scroll to top