Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Xbox Live Accounts of Microsoft Employees Hacked Using Social Engineering

Xbox Live accounts of Microsoft employees were breached via “several stringed social engineering techniques,” the company said. Although the breach didn’t relate to a vulnerability in Microsoft’s systems, the company is investigating the incident by working with law enforcement and the companies used in the social engineering scheme. By obtaining social security numbers of the targeted employees, hackers we...

South Korea Television and Banks Hacked; Fingers Pointed at North Korea

Several broadcasters and banks in South Korea were hacked in one of the country’s largest cyber-attacks, and fingers are once again pointed at neighbors to the north, according to The Guardian. The computer networks of KBS, MBC and YTN, and those of the Shinhan and Nonghyup banks were targeted in a simultaneous cyber-attack, which is still under investigation. While television networks were not seriously af...

Origin Flaw Puts Millions of Players at Risk, Report Finds

A newly discovered flaw in the Origin distribution platform could allow cyber-criminals to install malware on machines regardless of the operating system. The technique was documented in a paper by security researchers Luigi Auriemma and Donato Ferranta presented at the BlackHat conference in Amsterdam. This is the same team of researchers who found a similar vulnerability in the Steam browser protocol last...

High-End Digital Cameras can Forward Pictures to Attackers

High-end DSLR cameras come with a multitude of features for sharing pictures, but do they really reveal the contents only to their owners? According to security researchers Daniel Mende and Pascal Turbing, digital cameras such as the Canon EOS 1DX can be manipulated to take pictures and upload them without the user’s explicit consent. This particular camera model comes with a built-in server called WFT (Wir...

Spanish Targeted on Facebook by ‘Who Deleted You’ and ‘Free Credits’ Scams

Spanish curiosity is once again exploited by cyber-criminals, who are making money from two main scams. “Quien te elimino de Facebook” (“Who deleted you on Facebook”) and “Creditos de Facebook gratis” (“Free Facebook Credits”) are making rounds on the social network, spreading through fraudulent websites on Google’s blog service, Blogger. More than 42,000 Spanish users have already liked the scam that promi...

The Perfect Hardware Spy Tool for $35 Plus Change

A new computer espionage tool built on the $35 Raspberry Pi microcomputer has been detailed in a presentation at this year’s BlackHat conference in Amsterdam. This highly-advanced hardware keylogger is small enough to fit into a laptop docking station and powerful enough to intercept keystrokes, sniff network traffic, take screenshots, and more. The Raspberry PI is a credit card-sized computer with a 700 MH...

Bank of America on Short List of Scammers’ Spam Lures

The dust has barely set on the Bank of America security breach, and crooks unleashed a series of aggressive spam campaigns that include the Bank of America in the title as bait. In the context of a security breach, the name of the bank was used to catch customers’ attention, infect them with malware, have them type in sensitive data or entice them into sending money in advance for a service they will never...

Computer Leasing Company Harvested 185,000 E-mails with Private Information from Customers

Computer and furniture leasing company Aaron’s took 185,000 e-mails with highly sensitive information from its customers via spyware installed on the leased machines. The spyware application provided by DesignerWare came preinstalled on the laptops leased through Aaron’s. It was designed to allow the rental company to kill the laptop remotely if customers fell beyond payment, but also was able to record key...

Brazilian Doctors Used Fake Fingers to Trick Biometric Clocking Devices

Doctors at the Ferraz de Vasconcelos hospital in Sao Paulo have taken Brazilian scams a step further and fabricated fake fingers out of silicone to fool clocking systems on the premises. The scam was caught on tape and then disclosed by Globo Television on their website [Portuguese content]. According to the report, employees of the hospital created clones of their thumb prints and distributed them to fello...

Companies Pay $6,500 an Hour to Recover from DDoS Attacks

Companies pay $6,500 an hour to recover from a DDoS attack and up to $3,000 a day to mitigate and recover from malware infections, according to a report by Solutionary. The security service provider said that sophisticated malware, DDoS attacks, the BYOD trend and Web application security are the top four threats that concern organizations. The costs of cyber-attack recovery, based on real-world cases, incl...

© 2012 Powered By Bitdefender

Scroll to top