PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Security Hole Shipped With Ubisoft Games Spotted, Fixed

Attackers can reportedly use a bug in the Uplay browser plugin from game publisher Ubisoft to run arbitrary code on the gamer’s PC. Image credit: Ubisoft The exploit was discovered by programmer Tavis Ormandy, a Google employee who successfully leveraged the bug in the browser plugin shipped with UPlay (a component that installs along with Ubisoft’s most recent gaming titles). By simply pointing the browser...

Coders Preparing Two-Month Hackathon on a Remote Tropical Island

A 2 month hackathon on a remote tropical island is one of these days’ hot topics of discussion these days on the ycombinator forum, as reported by the BBC. Project comehackwithus aims to bring together coding masterminds looking for an exotic location attractive enough to merit the travel, while also allowing potential participants to focus on work. Like all other ambitious “looks like fun, but it’s just wo...

Hackers Snatch Data of 8.7 Million South Korean Mobile Users; Data Sold for More Than $800,000

Two hackers accused of stealing the names, phone numbers, and residential registration numbers of 8.7 million mobile users were arrested on Sunday by South Korean authorities, according to AFP. The company targeted in the attack, KT, the second biggest mobile telephony operator in South Korea, had reported the incident to the police on July 13. The illegal accessing of customers’ data had apparently gone on...

Philanthropist Phisher Gives Bogus Yahoo Prize from Gmail Account

Bitdefender Labs spotted a new wave of phishing e-mails targeting the Irish and British. Users are supposed to send their personal information to pick up the bogus Yahoo prize from a manager registered at rival e-mail service, Gmail. Soon after the breach that made 453,000 Yahoo Voice credentials vanish, cyber-crooks started targeting Irish and Brits with an old lottery phishing technique. Victims receive a...

London Olympics Forbidden Items: Weaponry and Wi-Fi

The London Olympic Committee has published a list of prohibited items that might deny you entry to the London 2012 venues. While most items are the usual suspects at sports events, such as weapons, alcohol, fireworks or illegal substances, some electronic devices, such as walkie-talkies, radio scanners and access points have been banned. The main reason for the ban on walkie-talkies, scanners and jammers is...

Smartphones Vulnerable to Remote Infection; Proof-of-Concept Attack Available

Mobile phones equipped with Near Field Communication technology may fall victim to a new type of attack that does not require physical interaction with the phone. A proof of concept attack demonstrated by security researcher Charlie Miller of Accuvant Labs uses Near Field Communication technology paired with well-known vulnerabilities in the Android platform to compromise the integrity of the smartphone.  ...

Cyber Gang Arrested for Making Bogus Doctors, Architects

A Chinese cyber gang was arrested for gaining over £30 million by selling bogus degrees and certificates in fields such as medicine, financial services, or architecture obtained after hacking governmental web sites, according to China Daily. Police searched across 12 provinces, and arrested 165 people who allegedly attacked 185 government sites. More than 30,000 people are also suspected of paying up to £1,...

One in Six Sex Offenders Lives Double Life on the Internet, Study Finds

One in six convicted US sex offenders lives a double life on the Internet to stay undetected after prison, according to a study by Utica College. Preliminary results showed more than 16 percent of sexual predators use elaborate online techniques to escape Police tracking. Other methods to avoid monitoring on the Internet include using multiple aliases, social security numbers, and dates of birth. They also...

Bogus Android Battery App Steals Phone Numbers and Emails

A Trojan that steals contact details from Android-running devices was spotted with a bogus battery optimization app. Luring users with the promise of increased battery performance upon installation, the Trojan covertly scans address books and broadcasts phone numbers and email addresses to an attacker-controlled domain. After sending all contact details, it displays an image with a GONE visibility state, fo...

Japan’s Finance Ministry Spied On by Trojan for Two Years

Japan’s Finance Ministry recently discovered a data-leaking Trojan on its computers that has been running for almost two years. During a security sweep of their network infrastructure, a third-party security firm found the Trojan and notified the institution. Of the 2,000 computers checked, 123 were infected with the Trojan that appeared to be present since January 2010. The Finance Ministry said no taxpaye...

© 2012 Powered By Bitdefender

Scroll to top