Facebook Tag Scams are Back with Malicious Payload

Facebook Tag Scams are Back with Malicious Payload

Bad week-end for Facebook users: a malicious tagging campaign ended up infecting at least 5 thousand computer users with a backdoor. This three-day campaign has been actively mirro ...

Win a MacBook Air with Bitdefender #hugamac

Win a MacBook Air with Bitdefender #hugamac

Here’s your chance to win a brand new 13” MacBook Air by just posting a selfie with your current Mac, followed by the hashtag #hugamac. You can use Facebook, Twitter, and even Inst ...

Hottest Snapchats – Another Early 2015 Facebook Scam!

Hottest Snapchats – Another Early 2015 Facebook Scam!

A spam campaign revealing the 10 “hottest snapchats” is a new entry to the long list of Facebook scams flooding the social media platform in 2015, according to Bitdefender Online T ...

Bitdefender’s Pick. Celebrating Asimov, the writer who focused on AI and coined the term ‘robotics’

Bitdefender’s Pick. Celebrating Asimov, the writer who focused on AI and coined the term ‘robotics’

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Top 10 Data Breaches of 2014; Lessons Learned for a Safer 2015

Top 10 Data Breaches of 2014; Lessons Learned for a Safer 2015

2014 was a memorable year for large-scale cybersecurity breaches. Target started the year on the wrong foot, exposing 110 million people’s personal information. Then, Sony Pictures ...

Top 5 Social Media Security Predictions of 2015

Top 5 Social Media Security Predictions of 2015

Mobile ransomware, targeted job fraud, and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015, security software solutions pro ...

Stalkers, Nude Photos and Beheadings: Top Facebook Scams and Malware Attacks in 2014

Stalkers, Nude Photos and Beheadings: Top Facebook Scams and Malware Attacks in 2014

Millions of people fell for Facebook scams in 2014. They lost money, reputation and even their jobs after simply clicking on the wrong social media link. Though security experts, c ...

American Company Fights Card Phishing. Greeting Card, That Is.

A new technology to fend off greeting card phishing is reportedly being put in place by service provider American Greetings in collaboration with security outlet Agari. The technology is dubbed DMARC (Domain-based Message Authentication, Reporting and Conformance) and will add a layer of protection for users who send and receive electronic greeting cards. On the technical side, DMARC is a verification syste...

Waiting for the Other Shoe to Drop on Facebook

Shopping tip of the day: don’t take free shoe offers on Facebook at face value. One look at the page that asks for a Like & Share tribute will give you an idea of what it’s like to walk in Loubouscammers or Blahnitricksters. Putting our hippest foot forward, we get caught in a truly enlightening convers(e)ation  on manners. This is where we find out that it’s polite to wave and smile or just nod (but no...

Most Employers to Monitor Social Media for Security

Six times more corporations will be stalking social media by 2015 to prevent security breaches, said a recent Gartner report. The IT research organization found that 60 per cent of companies will monitor channels such as Facebook and LinkedIn to prevent e-threats in three years from now. According to Gartner, many employers already monitor social media, but less than 10 per cent use the same techniques for...

Self-Appointed “Justice League” Joins Online Privacy Fight

A new organization named Internet Defense League is joining the fight against CISPA and other such organizations in the hopes of acting as an early-warning system against online privacy threats. The self-appointed internet freedom fighter group, led by Reddit co-founder Alexis Ohanian, hopes to strike hard and early at federal bills such as SOPA or PIPA . By signing up websites to help spread the word of an...

Smart Devices and Their Blind Spot

If Internet-connected device, other than your regular PC, seemed eccentric a few years back, today smartphones are a standard. And a fast growing number and variety of smart appliances follow this trend of web-connectivity and data-exchange. Of course unlimited Internet access comes with 24-hour-a-day risk. From mid-range television sets and smart meter installations to intelligent stoves, microwaves or fri...

Everything You Need to Know About Flamer.A – World’s Most Sophisticated Cyber-Weapon

In 2010, the world stopped spinning for a moment, as evidence of a highly complex piece of malware hitting a nuclear research facility in Iran started to emerge. Two years later, the discovery of another e-threat shows that the team behind Stuxnet and Duqu had another offspring that was even more complex and persistent. The e-threat - dubbed Trojan.Flamer.A – was also isolated in Iran earlier in May. Prelim...

Nebraska Student Information System Breached by Cyber Attack

The Nebraska Student Information System (NeSIS) was breached in a cyber-attack and record of 650,000 individuals were compromised. The University of Nebraska is leading an investigation to identify the hacker and the motives. With numbers, addresses, grades, transcripts, housing and financial aid information exposed, the University of Nebraska assures everyone that no credit card data was exposed and it has...

Free [not]Beer Internet for All from #opindia_back, Benign Till June 9?

Anonymous India calls for a non-violent protest against Internet censorship on June 9, 2012. Vehicles and “harmful items”, as well as “fire or burning at all” are banned. Guy Fawkes masks, banners and recording devices are welcome.  Prospective participants are advised to keep at least 50 meters away from police but hand over “anyone who causes violence” to the authorities. “Behind this mask is an idea and...

Cyber Attack Hits 123,000 Thrift Savings Plan Members; No Data Misused

The US Federal Retirement Thrift Investment Board (FRTIB) said a cyber attack against one of its third party service providers, Serco Inc., apparently did not result in misuse of data of its Thrift Savings Plan (TSP). The unauthorized access reported by the FBI in April is estimated to have led to personal information exposure for approximately 123,000 TSB participants. “There is no indication that any of t...

Chinese Microbloggers to Play It Nice?

Ever since the Chinese government’s temporary ban on its comment feature, SinaWeibo, the Chinese Twitter homologue, has been devising new terms and conditions to help verify users’ identity and eliminate forbidden forms of communication. Among other things, users should not send messages that “spread rumors, disrupt social order, and destroy societal stability” or that “call for disruption of social order t...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top