Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Facebook Users Share More Personal Information

Facebook users are sharing more personal information even as privacy concerns grow, according to the Carnegie Mellon University. A seven-year study has found evidence that the amount of information people publish on the social network changed over time, depending on the features Facebook introduced. From 2005 to 2009, users were more careful with privacy settings, progressively decreasing the amount of pers...

China Wants Development of Branded Mobile OS to Rid of Android

China's Ministry of Industry and Information Technology published a whitepaper arguing that local mobile companies should start focusing on developing an independent mobile operating system to escape dependency on Google’s Android. Recognizing that a new mobile OS might not compete with Apple, Google or Microsoft in terms of technical know-how, the document strongly encourages local mobile developers and ma...

Google Outs FBI National Security Letter Requests in Annual Transparency Report

Google released new figures detailing the number of National Security Letters (NSLs) requests coming from the FBI and other agencies that request user information when conducting national security investigations. In  2009, 2011, and 2012 there were between 1,000 and 1,999 NSL’s on user accounts, while in 2011 there were between 2,000 and 2,999 requests. Although Google did not post absolute numbers as they...

CloudFlare Suffers an Hour-Long Outage while Mitigating a DDoS Attack

What started as a small-scale DDoS attack on a computer server wiped out a chunk of the Internet managed by DDoS protection company CloudFlare. “The outage affected all of CloudFlare's services including DNS and any services that rely on our web proxy. During the outage, anyone accessing CloudFlare.com or any site on CloudFlare's network would have received a DNS error,” writes CloudFlare co-founder and CEO...

Emergency Java Security Patch – Update Now!

Oracle released another Java fix to patch the vulnerabilities uncovered this week.  In a Security Alert for CVE-2013-1493, the company advises all users to install the security patch as soon as possible considering the “severity of these vulnerabilities.” This particular update addresses a vulnerability known as CVE-2013-1493 (US-CERT VU#688246) and a security issue “affecting Java running in web browsers,”...

Backdoor Agent Infects ACH Clients with Fake Successful Transaction Notice

A Backdoor Agent is circulating with the aim of infecting Automated Clearing House clients via a fake payment receipt attached to notification e-mails, Bitdefender Labs has found. The e-mails are part of a rising wave of spam messages that carry a Trojan meant to grab users’ credit card details. “WIRE transaction is completed. $XXX has been successfully transferred. If the transaction was made by mistake pl...

User Information Accessed in Coordinated Hacking Attempt on Evernote

Web-based note-sharing service Evernote issued a security notice warning users of “suspicious activity” in their network that resulted in the exposure of usernames, cryptographically protected passwords, and e-mail addresses. No evidence of data tampering was discovered, and Evernote emphasized that no user payment information was exposed. By issuing a precautionary password reset notice to all its 50 milli...

Bitdefender Discovers Early Version of MiniDuke Malware

An early version of MiniDuke, the sophisticated cyberspy malware that caught media headlines this week after infecting governments and agencies in Europe and elsewhere, has been operating since at least May of 2012, internet security firm Bitdefender has discovered. MiniDuke was detected by Bitdefender Labs almost a year ago. The variant discovered by Bitdefender was added to the Bitdefender malware databas...

US Police Forensic Tools Can Collect Suspects’ Smartphone Data without Warrant, ACLU Says

US law enables police to use forensic tools that download call logs, text messages, geo-location, and proprietary technology data from suspect’s smartphones without a warrant, according to the American Civil Liberties Union (ACLU). The ACLU revealed a court document that outlines the type and amount of information collected by advanced forensic tools when a suspect’s device is under investigation. From visi...

HTML5 Browser Exploit Floods Hard Drives with Data

A recent HTML5 browser exploit enables websites to flood users with gigabytes of junk data, only to clog PCs and crash browsers. Web developer Feross Aboukhadijeh rigged a proof-of-concept website that exploits the vulnerability and adds 1 GB of data every 16 seconds on a solid state drive. Named FillDisk.com, the webpage can be accessed by anyone interested in learning more about the HTML5 vulnerability. T...

© 2012 Powered By Bitdefender

Scroll to top