How do you play your part for a better Internet?

How do you play your part for a better Internet?

The Internet is an astonishingly resourceful place - unlimited information on almost any subject in the world is at our fingertips. We use it to document our writings, chat with fr ...

Data Privacy Day: Reminding Us of Data Protection

Data Privacy Day: Reminding Us of Data Protection

Every year on January 28th we are reminded of the importance of our personal data and how it could be misused against us. More than 47 European countries along with United States a ...

Beware, Facebook Scam Shares Porn on Your Groups!

Beware, Facebook Scam Shares Porn on Your Groups!

A new Facebook tag scam is spreading pornographic content in Facebook groups, Bitdefender warns. We came across an evolved version of the known Facebook tag scam that manages to in ...

In 2016, growing IoT comes with new opportunities — and new threats

In 2016, growing IoT comes with new opportunities — and new threats

The Internet of Things is becoming a bigger part of consumers’ daily lives, thanks in large part to smart phones with larger screens that people use to control smart devices, accor ...

Ten facts you might not know about Linux

Ten facts you might not know about Linux

Today is Linus Torvalds’ 46th birthday! He is the inventor and lead developer of Linux kernel, the core of the operating system we all know and use today under various shapes and s ...

Tech trends: what to expect in 2016

Tech trends: what to expect in 2016

‘Cyber-security’, ’encryption’, ‘the Cloud’ and ‘machine learning’ have been among the buzzwords of 2015. We expect them to be at least as trendy next year, with technology compani ...

Biggest cyber-security events of 2015; lessons learned for a safer 2016

Biggest cyber-security events of 2015; lessons learned for a safer 2016

2 million compromised records 38% increase in security incidents First hacked smart car First ransomware for Linux Launch of Windows 10 and privacy concerns 14 million US governmen ...

[Infographic] What goes furthest in 60 seconds?

Today we launched the free 60-Second Virus Scanner desktop app, which adds a layer of elite cloud-based protection to PCs worldwide in an all-out assault on malware. It scans your computer in just 60 seconds. Wonder what else can happen in just 60 seconds? Check out the infographic below to see what and how far things can travel in that short time. Powered by Bitdefender Antivirus and 60-Second Virus Scanne...

Employees Sneak Company Data via File Sharing Services, Study Shows

More and more employees are relying on file sharing services to store company data, even if they know they are not allowed to, according to a study published by storage company Nasuni. The research, based on the answers of about 1,300 corporate IT users, reveals that company data frequently lands on consumer-grade storage providers that can’t be controlled or managed by corporate IT teams. The study reveale...

UK Infrastructure Targeted by Hostile States in Cyberwarfare, Officials Say

British infrastructure is targeted by hostile states but officials refused to say what had been hit, The Guardian reports. Within range are companies providing “essential services upon which daily life depends” such as electricity, gas and water. A senior government official admitted the British critical infrastructure had been mapped, and the owners of national infrastructure are still being supported by t...

Israeli Website Hack Leads to Leak of 20,000 Accounts

The Anonymous hacker group announced the hacking of an Israeli-based website, wcites.co.li, by revealing 20,000 accounts containing clear text passwords,  user names, ID’s, emails, gender, and location information. The leak was pledged in the name of #OpIsrael, which started after the airstrikes on Palestine, by a hacker known as c0mandEr0r. Posting the data on AnonPaste, he claims that some 80,000 accounts...

Cloud-Based Browsers Can Be Abused with Twist on a Google Technique

A twist on a technique developed by Google could let cyber-criminals hack cloud-based mobile browsers and crack passwords anonymously, according to security researchers from North Carolina State University and the University of Oregon. Researchers used the “MapReduce” technique developed by Google, typically used for distributed computing on clusters of machines, to perform large-scale tasks that had nothin...

U.N. Nuclear Agency Emails Leaked by Hackers

The International Atomic Energy Agency confirmed that one of its former servers was breached by hackers and more than 100 email addresses belonging to IAEA experts were leaked online. Saying that an investigation is underway to determine if other information has been compromised, IAEA spokeswoman Gill Tudor extended apologies for the incident and said the server had been shut down for some time. "The IAEA's...

Serious Security Holes Exposed in Samsung, HP and Dell Printers, Researchers Say

Samsung printers were deemed vulnerable after researchers discovered a hard-coded backdoor administrator account that could enable attackers to rewrite firmware or read network information. The account can be accessed via the Simple Network Management Protocol interface and enables intruders to collect information from any device tied in to the network. The same security advisory emphasizes that Dell printe...

Romanian Versions of Google, Yahoo Homepages Defaced by Algerian Hacker

Earlier today, the web pages associated with Google and Yahoo search pages have been hijacked to a defacement page. The page was up for more than one hour but is now fixed. Preliminary investigation reveals that neither Google, nor Yahoo servers have been hacked or otherwise compromised. Instead, the attackers have changed the DNS records for the domains to point the domain names to a server in the Netherla...

iOS Application Points Legit Users as Pirates on Twitter

Cracked applications that refuse to work when installed on devices are sooo last year, a recent incident involving iPhones, iPads and the famous Oxford Dictionary of English reveals. If, up until now, pirate users would only worry about ending up with a non-working application, they should now be concerned with being publicly pointed at as thieves. According to author Jenn Frank, due to a flaw in the digita...

Apache Module for Mass iFrame Injection Sells for 1K, Automates Exploitation

The web plays a crucial role in malware dissemination, and cyber-criminals are doing all they can to automate infection. If exploit packs have already become mainstream, crooks have taken the game a step further by offering an Apache module capable of injecting iFrames on all pages hosted on the server. The module is compatible with the Apache web server branch 2.x and allegedly sells on underground forums...

© 2012 Powered By Bitdefender

Scroll to top