Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Nokia Browser Relies on Man-in-the-Middle Tactics to Cut Down on Data Bill

At a time when most service providers embrace HTTPS by default, Finnish mobile phone manufacturer Nokia is doing the exact opposite. According to security researcher Gaurang Pandya, user data sent encrypted through the Nokia Xpress browser is decrypted on the Nokia / OVI servers to be compressed for speed and bandwidth saving purposes. This means that all HTTPS requests sent by the user to various services...

Thai Police Arrest Alleged ZeuS Mastermind

Thai police arrested a 24-year old Algerian hacker allegedly behind several ZeuS botnets, according to The Bangkok Post and security researcher Brian Krebs. The man was on the FBI Wanted List for several years after earning a luxury lifestyle with tens of millions of dollars out of cyber-crime. Computer science graduate Hamza Bendelladj might be a major operator of botnets powered by the ZeuS banking Trojan...

Hacker’s Cat with Virus Collar `Arrested’ by Japanese Police

Japanese police have “arrested” a cat carrying a computer virus that a hacker installed on a memory card attached to the pet’s collar, according to the AFP. Cyber cops managed to find the feline on an island near Tokyo after being teased for several months with e-mail riddles sent to the media. The riddles promised journalists the “chance for a big scoop” and used “mountainside” and other clues to lead them...

Critical Java Exploit Spreads like Wildfire; No Fix Available

While half of the globe was busy yesterday having the “lols” about the Japanese kitten rigged with a malware-infested flash device attached to its collar, serious stuff was going down in Javaland. UPDATE: On January 13, Oracle issued a partial fix for the issue. The patch is now available on the Oracle web portal and updates the java version to 1.7 Update 11. You are advised to update immediately, but manif...

Bogus LinkedIn Messages Speculate Work Comeback to Infect Users with Trojans

Malware writers are again taking advantage of LinkedIn’s popularity and users’ social media engagement after the holidays. With many people back to work and eager to strengthen their professional connections, the malicious campaign comes in really handy for the attackers. The New Year opened with an aggressive spam campaign that infects LinkedIn account holders with Trojans and other malicious software host...

UK Defense Committee Draws New Rules of Engagement in Case of Military Cyber Attacks

The UK Defense Committee published a report in which it underlined the importance of cyber security defenses and the risks of having military communication technologies compromised if subjected to attacks. With 650 million pounds ($1 billion) to be invested in cyber security over the next four years, the Defense Committee places a strong emphasis on the danger of cyber-attacks. Developing new and effective...

US Banks Hacked in State-Sponsored Iranian Attacks, Officials Say

Recent denial of service attacks on US banks are believed to have been triggered by state-sponsored actions lead by Iran. The US government firmly believes the attacks are Iran’s way of retaliating against cyber-attacks led by the United States against Iranian power plants and nuclear facilities, according to private security experts. The strained relationship between the two countries may have caused Iran...

Rent Custom Cool Exploit Kit for 10,000 Bucks a Month

The author of the world’s most popular exploit kit - the BlackHole - decided to expand his business and demand huge sums of money for a high-end crime pack dubbed Cool Exploit Kit. Unlike others, this pack is pitched as exclusive clientele and will contain fresh, unmitigated exploits. Exploit packs are collections of browser and browser plug-in exploits hosted on compromised or malicious websites. When vict...

Serious Flaw in Facebook Allows Arbitrary Account Hijacking

Blind trust does not cut it when you’re a social network with a billion active users.  That’s what Facebook found out after white-hacker Sow Ching Shiong reported a serious vulnerability that allows virtually anyone to seize control of a user account without knowing the original login password or having access to the victim's e-mail. Long story short, Facebook allows a hacked account to apply for a password...

Baby Please Check My Facebook Profile (and My Trojan)

Malware writers are once again counting on the female allure to draw in yearning and unwary men. “Hi baby, please check my facebook profile,” or “I miss you, check my new photo please” are just a few of the lines meant to trick users into clicking on malicious websites. Scammers even use authentic pictures of international models grabbed from their social network accounts. A new spam campaign targeting soci...

© 2012 Powered By Bitdefender

Scroll to top