Bitdefender’s Pick. Father of Linux Turns 45 This Month

Bitdefender’s Pick. Father of Linux Turns 45 This Month

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Hackers Grab Yahoo Credentials through Mail Activity Reports Campaign

Hackers Grab Yahoo Credentials through Mail Activity Reports Campaign

Yahoo users are being targeted by a new phishing campaign that helps hackers grab their credentials and hijack accounts. Bitdefender was already blocking the malicious URLs spreadi ...

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

We hate to sound gloomy before the holidays, but Christmas not only brings joy and presents. It comes with increasing cyber-crime activity as well, as Hacker Grinch prepares new sc ...

Bitdefender’s Pick. Computer Security Day Recalls Infamous Virus to Caution Users

Bitdefender’s Pick. Computer Security Day Recalls Infamous Virus to Caution Users

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

Thousands Fall with Each Hour for Free Audi R8 Facebook Scam

Thousands Fall with Each Hour for Free Audi R8 Facebook Scam

Over 200,000 Facebook users have fallen prey to a like-farming scam promising two free Audi R8 cars, and thousands join the victim list with each hour, according to antivirus softw ...

‘Facebook at Work’ Could Increase Security Risks

‘Facebook at Work’ Could Increase Security Risks

The ‘Facebook at Work’ project could raise even more security and privacy issues than the regular social network, according to Bitdefender security experts. The antivirus software ...

Free Bitdefender Adware Removal Tool for PC Goes Online; Reclaim Your Computers Now

Free Bitdefender Adware Removal Tool for PC Goes Online; Reclaim Your Computers Now

The free Adware Removal Tool for PC is now online. Bitdefender officially released today the application that helps users get rid of annoying software, according to a press release ...

Moms Soothe Toddlers With Smartphones

Moms are increasingly swapping dummies and pacifiers for high-tech gadgets to calm bored or cranky toddlers and babies, according to a study by Asda. Some 27 per cent of mothers questioned in the survey prefer handing their babies a smartphone rather than a soothing toy. Though 40 per cent of moms restrict playtime to a couple of minutes, another 10 per cent admitted to leaving their tech-savvy babies to pl...

Top 10 Android Games for Budget-Aware, Malware Wary Users

Games are supposed to be fun.  However, knock offs of popular Android games downloaded from obscure marketplaces can be anything but. The Android mobile OS has seen its share of threats mostly spread through infected apps distributed via third-party markets. The runaway hit Angry Birds, as just one example, has been used on several occasions to disseminate malware. The more popular an Android game is, the m...

Winds of Change on Facebook: Subscription-Based Apps and Location-Specific Advertising

Facebook announced plans to further support app developers’ revenue growth by introducing a subscription payment system for all Facebook.com and mobile web apps. According to a blog post on the Facebook Developers page, this feature will be available as of July this year and is designed for developers to “establish a recurring revenue stream and offer updated content or premium experiences for a monthly fee...

Sci-Fi-Like Network Monitoring System Scans Darknet for Possible Attacks

A 3D real-time network monitoring and alert system named DAEDALUS (Direct Alert Environment for Darknet And Livenet Unified Security) was created to scan malicious packets sent by viruses inside a local network, rather than monitoring outbound traffic. Introducing the the concept in a 2009 research paper, Japan’s National Institute of Information and Communications Technology (NICT) argues that it’s more ef...

Reckz0r’s Pastebin Bank Dump is Old News; Hacking Challenge Continues

Fresh news spread on Twitter of “over 79 large banks” breached by newly risen hacker Reckz0r, together with a Pastebin dump created by the same author to prove his deed, is building concern over cyber crooks. “Today's target is VISA & Mastercard, I will be only leaking a portion of the credit card information, as I cannot leak the entire data, it's too large, and this is the certain proof that i've hack...

iOS 6 Tightens Grip on Apps’ Access to Personal Data

Following a series of allegations of privacy infringement, apps running iOS 6 must require explicit user permission to access calendars, reminders, contacts and photos. In February 2012, Arun Thampi, a Ruby/iOS Developer in Singapore, made a discovery that sparked up a heated privacy-protection debate. Thampi found out that Path, a popular app in the App Store, accessed his address book and sent its content...

Cyber-Crime Prevention May Prove More Costly to UK Government Coffers

Only a fraction of the estimated £640 million the UK government spends every year toward measures against cybercrime is channeled toward law enforcement, according to a cybercrime study commissioned by the UK’s Ministry of Defence and carried out by a team of Cambridge University scholars, in cooperation with German, Dutch and American scientists. A shift of focus from surveillance and preventative actions...

Android App Earns Scammers Over 20 Million Yen

A malware-infected Android app that scammed users out of 20 million yen (£160,740) lead to the arrest of six men in Tokyo. Posing as a video playback app, the malware affected 9,252 users who visited an adult site believed to have been created to deliver the virus. Two IT executives were involved in the scam and the six-man operation was dismantled shortly after officials started investigating. Once install...

Trojan Sneaks into LinkedIn Spam Attachments

Malware is starting to take advantage of LinkedIn’s popularity, with bogus e-mails allegedly coming from the professional social network. Some of the scams that have become antiquated on Facebook are now spreading on LinkedIn, luring users to install malicious attachments on their computers. The Trojan that sneaks into LinkedIn spam messages injects an invisible iframe into a webpage and then redirects you...

Intel Chips Prone to Hacks – 64-bit OSs Deemed Vulnerable

Intel CPUs are prone to hacker attacks after a vulnerability in the way they implement the SYSRET instruction was discovered in their x86-64 extension. The vulnerability could allow hackers to execute code with kernel privileges while in a non-administrator account, or to gain control of a host operating system after escaping a virtual machine. The U.S. Computer Emergency Readiness Team (US-CERT) issued a s...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top