Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Gozi Malware Creators Charged in the US; the Russian Faces 95 years in Prison

US authorities have charged three Europeans, including one Russian, for writing and distributing the Gozi malware to steal tens of millions of dollars from bank accounts, according to a press release by prosecutors. Prosecutors say the hackers injected the Gozi malware into a million computers worldwide, including 40,000 in the US and some systems belonging to NASA. The accused Russian national risks a maxi...

SERT Points Russia as Leader in Exploit Kit Development

A report by the Security Engineering Research Team revealed that 70 percent of exploit kits reviewed were developed in Russia. In the fourth quarter, 58 percent of targeted vulnerabilities were 2 years old, confirming that cyber criminals still successfully use them. One of the most popular exploit kits in 2012 was BlackHole 2.0, which was used to distribute 18 percent of malware samples analyzed by the SER...

Vodafone Malware Campaign Goes Large Scale; the Dutch Are at Gunpoint

The recent “Vodafone” malware campaign targeting Brits went international as several waves of spam loaded with Trojan Gamarue landed in the Dutch region. The Bitdefender Labs expect the MMS campaign to spread to even more countries and languages. Dutch users are at cyber-gunpoint these days as a dangerous dropper infects them with malware capable of mining sensitive details and sending them to a machine con...

Twitter Flaw Surrenders Private Messages to Third-Party Apps

Third party apps that use Twitter accounts for authentication could have accessed private direct messages without users’ knowledge. The flaw in Twitter’s API was discovered by IOActive’s CTO, Cesar Cerrudo and was fixed by Twitter following its report. The bug was discovered during the registration process in which developers select the level of access apps have on user accounts. Features such as “read only...

`Confidential Message’ Infects Employees with Password Stealer

Malware writers target companies and public and private institutions by tricking employees into downloading a password stealer disguised as a confidential corporate document addressed to employees only. The document in the form of a ZIP file is attached to an e-mail addressed to company employees under the confidentiality mark. The sender’s address is spoofed to make it look as if the mail is sent by DocuSi...

Canadian College Student Allegedly Expelled for ‘Reporting Bug’

Computer Science student Ahmed Al-Khabaz was reportedly expelled after reporting a security hole in the Omnivox software application its college was using. The story, as per the report in the National Post, goes like this: while working on a mobile app to let fellow students access their college accounts, 20-year old Al-Khabaz stumbled on a serious bug that would allow anyone unrestricted access to the 250,...

Google Ring of Power Could Render Passwords Obsolete

Google Vice President of Security Eric Grosse and Engineer Mayank Upadhyay published a paper proposing a ring-finger authentication device to replace classic password-based authentication to strengthen websites’ authentication. Saying that typing passwords can be time consuming and far more vulnerable, an authentication token worn as jewelry could prove far more secure, the Google staffers said. Two-step au...

Password Security in Immediate Danger, Deloitte Claims

Computer users will have a hard time keeping passwords private this year. At least, that’s the view of Big Four auditing firm Deloitte. The findings of Deloitte’s TMT Predictions 2013 report reveal rampant re-use of passwords, which puts computer users at risk when these passwords are leaked and bruteforced with modern technologies. “If you take a site with over six million users and you take ten thousand p...

Future Malware to Be Injected into Systems via Electromagnetic Interference

Modern malware can infect computers in quite a number of ways, but future infections will be able to take over networks not even connected to the Internet. The infiltration mechanism under research at the Intelligence and Information Warfare Directorate (I2WD) is based on the interference induced in conductors such as network cables, which act as wireless antennae broadcasting information being transferred...

Bitdefender Offers Free Removal Tool for Red October Cyber-Espionage Piece

Details of a new cyber-espionage tool dubbed Red October emerged early this week This complex piece of malware is built in a modular manner and carries all the prerequisite for a successful attack, such as infection components, plugins and command and control mechanisms. The infection appears to have gone unnoticed for an incredible amount of time, judging by the timestamp of its components, even though som...

© 2012 Powered By Bitdefender

Scroll to top