Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Bitdefender Offers Free Removal Tool for Red October Cyber-Espionage Piece

Details of a new cyber-espionage tool dubbed Red October emerged early this week This complex piece of malware is built in a modular manner and carries all the prerequisite for a successful attack, such as infection components, plugins and command and control mechanisms. The infection appears to have gone unnoticed for an incredible amount of time, judging by the timestamp of its components, even though som...

Flashlight among Android Apps That Rat Out Users (and Surprise Them)

Android users are surprised to find that the Flashlight apps for Android could rat out device owners, and many more seemingly innocent apps can track their location, according to the Carnegie Mellon University. Researchers argue people are surprised to learn that popular mobile applications are sharing their sensitive data. “There's no sensible reason why a flashlight app would need your location," said Jas...

Michael Jackson Hackers Escape Jail Time, Serve Community

The two British hackers who allegedly stole Michael Jackson’s music after breaking into Sony’s servers got away without prison time but were sentenced to complete 100 hours of community service, according to The Guardian. 27-year old James Marks and 26 year-old James McCormick confessed they were big fans of Michael Jackson, which made them search for evidence that his posthumous songs weren't interpreted b...

RSA Finds Laser-Focused Phishing Attacks Targeting Pre-Determined Victims

A new phishing kit was recently discovered and analyzed by EMC’s RSA Security division in which a specific group of victims was targeted for credentials theft. Assigning each address on the list a unique identifier, a user clicking the malicious link was first validated and then redirected to a phishing webpage if he made the list. Users not on the list were redirected to a 404 webpage. The “laser precision...

Malware Infecting US Power Plant SCADA Systems

Critical power generation systems inside two US power plants were infected with “known sophisticated malware” that spreads via USB drives, reports the US Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). The malware, which the team didn’t name, infected a handful of machines during a software update initiated by an outside technician. With supervisory con...

Cisco-Powered Linksys Routers Vulnerable to Remote Ownage

A serious flaw in the Linksys routers could allow an attacker to seize root privileges on the device, according to a blog post by pen-tester specialist DefenseCode. As shown in a video, successful exploitation of a Cisco Linksys WRT54GL model gives the attacker root access on the locally installed Linux-based firmware. DefenseCode claims the vulnerability resides in the latest Linksys firmware (4.30.14), bu...

South Korea Trains Hackers to Fight Cyber Crime

South Korea has launched a program that aims to find the best hackers and turn them into national defenders against internal and external cyber-attacks, according to CNN Seoul. The South Korean government, in collaboration with the Korea Information Technology Research Institute (KITRI), has set up a six-month training program called “Best of the Best” to transform the country’s smartest hackers into nation...

‘Police Ransomware’ Becomes Java 0-Day-Borne

The recently discovered vulnerability disclosed on Thursday has been finally patched by Oracle, but exploitation in the wild continues on computers that have not been updated yet. With exploitation code included in world’s most frequently used exploit packs such as BlackHole, Nuclear Pack and the Cool Exploit Kit, cyber-criminals have started to take advantage of the huge pool of vulnerable computers by pla...

Aaron Swartz Allegedly Driven to Suicide by Prosecutors

Family claims Reddit Co-Founder Aaron Swartz was driven to suicide by prosecutors who accused him of stealing private documents from the Massachusetts Institute of Technology in 2011. The 26-year old, who hanged himself Friday night, was facing a long prison sentence after allegedly hacking JSTOR, a subscription service used by the institute. His family and girlfriend believe the government and academic off...

The Cisco Phone in the Boardroom Eavesdrops on Private Talks

Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say  At the 29th Chaos Communication Congress, researchers Ang Cui and Michael Catello made public a proof of concept on how critical kernel vulnerabilities in Cisco Native Unix can be exploited to transform all Cisco Unified IP Phones 7900 Series in a network into remote bugging devices.   This basically allows att...

© 2012 Powered By Bitdefender

Scroll to top