PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Android Mobile Malware Report – August 2012

We’ve seen our share of malware, adware and other interesting Android threats this summer. With autumn upon us, it’s time to recap the sizzling highlights that plagued our top 10 Android mobile malware summer charts. Although we didn’t start to break down adware until July, it’s worth mentioning that June kick started what we would later discover to be an avalanche of adware. In July, 77.34% of the total An...

Digital Agency Takes Heat for Apple UUID Leak, FBI Breach still Plausible

One million apple UUIDs, along with a significant amount of Apple customer data that leaked earlier last week by AntiSec members proved to come from digital agency Blue Toad, not from the FBI, as initially thought. The Florida-based publishing company learned of a severe data breach affecting its servers after David Schuetz, a researcher with mobile device security consulting firm Intrepidus Group, noticed...

GoDaddy Wipes out Significant Chunk of the Web in DNS Service Outage

More than 45 million domain names managed by hosting giant GoDaddy went dark yesterday in what appears to be one of the biggest failures of the DNS system in the history of the Internet. The unscheduled downtime triggered panic attacks among both webmasters who might have thought they were victims of hacks, and end-users who suddenly lost internet connection with their favorite websites. Image credit: GoDad...

Op Big Brother on for Oct. 20; Worldwide Surveillance Systems under Anon Threat

Anonymous released a new call to protest for Oct. 20 - this time against global surveillance systems, according to an annonews post. The main reason behind the protest is Anon’s supposition that surveillance systems all over the world were created even before a real terrorist threat was officially acknowledged and that their true purpose is to infringe upon freedom. “We call you to act now against overall S...

Mac OS X Keychain Data Revealed by Root Access Tool

Mac OS X keychain password data was exposed by a means of a free tool that requires root access. Dubbed keychaindump, the tool scans for the memory space of the process that handles the keychain function (securityd), trying to find the keychain master key. The keychain file is encrypted several times with different keys, but obtaining the keychain master key enables the decryption cascade. The login passwor...

“Activate the new security system” is a phishing scam targeting Italians

Ingenious phishing scam targets Italy’s post office and bank operator, Poste Italiane, with e-mails designed to con users into willingly give away authentication data to their online money accounts. The fake e-mail officially informs customers they can no longer use the prepaid PostePay service if they don’t activate the new web security system of Poste Italiane by August 16th 2013. Fig. 1 Bogus e-mail alle...

Linux Version of Chrome Ships with New Sandbox

The sandboxing system implemented in Google’s Chrome browser has undergone a major overhaul in development version 23.0.1255.0 with the introduction of a brand new sandbox on Linux and ChromeOS for renderers. The new sandbox uses a feature called Seccomp-BPF that gives the Linux kernel a higher degree of control in imposing restrictions to the application, as well as to evaluate system call numbers and thei...

Apple Issues Fix for Zero-Day Vulnerability in OS X

The Java vulnerability discovered in August has prompted Apple to issue their own patch for Mac OS X customers. According to this security announcement, the free update for Java for OS X 2012-005 and Java for Mac OS X 10.6 in all Mac OS versions from Snow Leopard to date is available immediately. The company decided to release its own patch for the Java 0-day vulnerability discovered in August. The fix is t...

Romney Tax Returns Apparently Safe; Extorters’ Unauthorized Access Claims Denied

No evidence has been found to support the claim that presidential candidate Mitt Romney’s tax returns in its custody have been accessed by unauthorized individuals, according to auditing firm PriceWaterhouseCoopers. "At this time there is no evidence that our systems have been compromised or that there was any unauthorized access to the data in question," according to a statement by Maggie O'Donovan-Bolton,...

Where to in the #OpAssange Hacking Frenzy Targeting the UK?

Julian Assange’s now famous balcony speech seems to have struck a sensitive chord with the hacker world. A series of Pastebin dumps purporting to offer unauthorized access to various UK organizations’ servers and data bases as a sign of support for Assange seem to indicate that the UK’s share of the online universe has come under heavy hacking fire. On August 30, an unknown Pastebin user denying any connect...

© 2012 Powered By Bitdefender

Scroll to top