PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

Anon- WikiLeaks Partnership Behind ‘Syria Files’ Leak

An Anonymous Op Syria press release sets the record straight about the July 5th disclosure of more than 2 million e-mails of Syrian officials and companies in what appears to be WikiLeaks’ most consistent “revelation” yet. In a press conference in London the day the leak hit the Internet, a WikiLeaks representative characterized the super massive load of files as "embarrassing to Syria – it helps us to unde...

Computers Affected by DNS-Changer to Lose Web Connectivity on July 9

More than 250,000 computers are expected to lose connectivity to the Internet on July 9th as the FBI pulls the plug on a series of DNS servers involved in a malware scheme. DNS is an Internet service that translates Internet addresses (readable by the user) into IP addresses (readable by computers). They are similar to a phone directory where each name has a corresponding number, except that it holds websit...

Dad Catches Daughter on Webcam and Deploys Malefic Trojan

A bogus Facebook video of a daughter who got busted on webcam strikes users with a harmful Trojan. The malware can grab sensitive information and send it to a remote machine. Sick of promoting the “dad catches daughter on webcam” scam in English, cyber-crooks went to scammers’ school this summer, pulled an overnight “Omlette du fromage”, and translated the old masquerade into German and Serbian. If German s...

Tornado Alert in Illinois Triggered by Unidentified Hacker

The villagers of two small towns in Illinois were awoken in fear by the sound of sirens, as the tornado alert system fell in the hands of unidentified hackers. For more than half an hour, the sirens played alerts of natural disaster and military attack until they were taken offline. According to a report published by Chicago Tribune, the tornado alert system was switched on at around 9 p.m. for three minute...

Zeus Malware Grabs Your Money via Facebook, Gmail

A new variant of the notorious Zeus malware is targeting Facebook and Gmail. The fresh scam asks unwary users to “link” their credit card information with either Facebook or Google and transform these accounts into digital wallets. Whenever the user tries to bring up Facebook or Gmail from an infected PC, they are presented with the genuine service login page, but, in the background, Zeus injects its code i...

Phishing Attacker in Georgia Faces up to 50 Years in Prison

A phishing attacker in Georgia was convicted of multiple banking hacks and faces up to 50 years in prison and a $1 million fine, according to a FBI press release. 32-year old Osarhieme Uyi Obaygbona was accused of conspiracy to commit wire fraud, identity theft, and gaining unauthorized access to protected computers. Because of his attacks, Chase Bank, Bank of America, ADP, and Brank Bank & Trust Co. al...

Website Defacement Reveals Turkish, Libyan and Syrian Brotherhood

The Turkish Foreign Ministry was hacked, and photos of Prime Minister Recep Tayyp Erdogan embracing Syrian president and Libyan dictator Muammar Gaddafi were posted online, according to media reports. The headline above the images read “Ministry of War and Slavery, not Foreign Affairs,” while the caption read “Brothers yesterday, enemies today.” RedHack hackers also grabbed personal data of hundreds of fore...

Android SMS Bot Uses Twitter to Hide C&C Server

An Android SMS bot that uses Twitter and spreads through spam attachments read from Android-running devices was spotted in the wild. With the ability to hide its launcher icon, the SMS bot makes it difficult for users to spot its detection after the installation process is completed. Its foreground process is named "Be social! plugin" and it activates when it receives intents like android.intent.action.BOOT...

Ethical Hackers Seek to Keep Olympic Games Safe

More than 200,000 hours were logged in by Atos, the lead technology company in charge of cyber-security for the Olympic Games, for simulated attacks on their IT infrastructure. With over 11,500 computers and servers across Britain, Atos starts running its Olympic Technology Operations Center next week. The company recruited "ethical hackers" to carry out a series of attacks aimed at finding security flaws t...

Ice Cream Sandwich Clickjacking Easy as Pie

A research team at North Carolina State University developed a proof-of-concept prototype rootkit for Android 4.0.4 OS to demonstrate that clickjacking attacks can be pulled off effortlessly. The novelty behind this rootkit is that it attacks the Android framework rather than performing deep modifications of the underlying kernel, like previous exploits did. For example, the rootkit could hide or redirect a...

© 2012 Powered By Bitdefender

Scroll to top