Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

Bitdefender’s Pick. The Digital Dilemma: How new technologies can jeopardize the movies

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

No More PORN?! 7 Type of Valentine’s Scams to Avoid this Year

Pornography is no longer scammers’ favorite bait! After analyzing a wave of scams spreading worldwide before the Valentine’s Day celebration, Bitdefender researchers have found tha ...

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

Banking Trojan Lurking Inside Innocent Fax Messages, Bitdefender Warns

A massive spam wave is installing banking Trojan Dyreza on tens of thousands of computers to steal sensitive financial data from unsuspecting customers, Bitdefender malware analyst ...

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Facebook Tag Scam Spreads like Wildfire, New Tactics Emerge

Two weeks ago, we wrote about the re-emergence of tag scams on Facebook. What seemed to be a basic worm at that time turned into inspiration for multiple cyber-criminal gangs. This ...

CTB Locker Ransomware Targets French Companies

CTB Locker Ransomware Targets French Companies

A spam campaign delivering CTB Locker is targeting employees from French companies, Bitdefender researchers found. The  spam e-mails  carry an attachment,a .cab file and a message ...

Facebook Tag Scams are Back with Malicious Payload

Facebook Tag Scams are Back with Malicious Payload

Bad week-end for Facebook users: a malicious tagging campaign ended up infecting at least 5 thousand computer users with a backdoor. This three-day campaign has been actively mirro ...

Security Hole Shipped With Ubisoft Games Spotted, Fixed

Attackers can reportedly use a bug in the Uplay browser plugin from game publisher Ubisoft to run arbitrary code on the gamer’s PC. Image credit: Ubisoft The exploit was discovered by programmer Tavis Ormandy, a Google employee who successfully leveraged the bug in the browser plugin shipped with UPlay (a component that installs along with Ubisoft’s most recent gaming titles). By simply pointing the browser...

Coders Preparing Two-Month Hackathon on a Remote Tropical Island

A 2 month hackathon on a remote tropical island is one of these days’ hot topics of discussion these days on the ycombinator forum, as reported by the BBC. Project comehackwithus aims to bring together coding masterminds looking for an exotic location attractive enough to merit the travel, while also allowing potential participants to focus on work. Like all other ambitious “looks like fun, but it’s just wo...

Hackers Snatch Data of 8.7 Million South Korean Mobile Users; Data Sold for More Than $800,000

Two hackers accused of stealing the names, phone numbers, and residential registration numbers of 8.7 million mobile users were arrested on Sunday by South Korean authorities, according to AFP. The company targeted in the attack, KT, the second biggest mobile telephony operator in South Korea, had reported the incident to the police on July 13. The illegal accessing of customers’ data had apparently gone on...

Philanthropist Phisher Gives Bogus Yahoo Prize from Gmail Account

Bitdefender Labs spotted a new wave of phishing e-mails targeting the Irish and British. Users are supposed to send their personal information to pick up the bogus Yahoo prize from a manager registered at rival e-mail service, Gmail. Soon after the breach that made 453,000 Yahoo Voice credentials vanish, cyber-crooks started targeting Irish and Brits with an old lottery phishing technique. Victims receive a...

London Olympics Forbidden Items: Weaponry and Wi-Fi

The London Olympic Committee has published a list of prohibited items that might deny you entry to the London 2012 venues. While most items are the usual suspects at sports events, such as weapons, alcohol, fireworks or illegal substances, some electronic devices, such as walkie-talkies, radio scanners and access points have been banned. The main reason for the ban on walkie-talkies, scanners and jammers is...

Smartphones Vulnerable to Remote Infection; Proof-of-Concept Attack Available

Mobile phones equipped with Near Field Communication technology may fall victim to a new type of attack that does not require physical interaction with the phone. A proof of concept attack demonstrated by security researcher Charlie Miller of Accuvant Labs uses Near Field Communication technology paired with well-known vulnerabilities in the Android platform to compromise the integrity of the smartphone.  ...

Cyber Gang Arrested for Making Bogus Doctors, Architects

A Chinese cyber gang was arrested for gaining over £30 million by selling bogus degrees and certificates in fields such as medicine, financial services, or architecture obtained after hacking governmental web sites, according to China Daily. Police searched across 12 provinces, and arrested 165 people who allegedly attacked 185 government sites. More than 30,000 people are also suspected of paying up to £1,...

One in Six Sex Offenders Lives Double Life on the Internet, Study Finds

One in six convicted US sex offenders lives a double life on the Internet to stay undetected after prison, according to a study by Utica College. Preliminary results showed more than 16 percent of sexual predators use elaborate online techniques to escape Police tracking. Other methods to avoid monitoring on the Internet include using multiple aliases, social security numbers, and dates of birth. They also...

Bogus Android Battery App Steals Phone Numbers and Emails

A Trojan that steals contact details from Android-running devices was spotted with a bogus battery optimization app. Luring users with the promise of increased battery performance upon installation, the Trojan covertly scans address books and broadcasts phone numbers and email addresses to an attacker-controlled domain. After sending all contact details, it displays an image with a GONE visibility state, fo...

Japan’s Finance Ministry Spied On by Trojan for Two Years

Japan’s Finance Ministry recently discovered a data-leaking Trojan on its computers that has been running for almost two years. During a security sweep of their network infrastructure, a third-party security firm found the Trojan and notified the institution. Of the 2,000 computers checked, 123 were infected with the Trojan that appeared to be present since January 2010. The Finance Ministry said no taxpaye...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top