Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Microsoft will release what is touted to be the largest overhaul of the Windows operating system ever in less than one month. The Developer Preview builds made available to Windows ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

London Olympics Forbidden Items: Weaponry and Wi-Fi

The London Olympic Committee has published a list of prohibited items that might deny you entry to the London 2012 venues. While most items are the usual suspects at sports events, such as weapons, alcohol, fireworks or illegal substances, some electronic devices, such as walkie-talkies, radio scanners and access points have been banned. The main reason for the ban on walkie-talkies, scanners and jammers is...

Smartphones Vulnerable to Remote Infection; Proof-of-Concept Attack Available

Mobile phones equipped with Near Field Communication technology may fall victim to a new type of attack that does not require physical interaction with the phone. A proof of concept attack demonstrated by security researcher Charlie Miller of Accuvant Labs uses Near Field Communication technology paired with well-known vulnerabilities in the Android platform to compromise the integrity of the smartphone.  ...

Cyber Gang Arrested for Making Bogus Doctors, Architects

A Chinese cyber gang was arrested for gaining over £30 million by selling bogus degrees and certificates in fields such as medicine, financial services, or architecture obtained after hacking governmental web sites, according to China Daily. Police searched across 12 provinces, and arrested 165 people who allegedly attacked 185 government sites. More than 30,000 people are also suspected of paying up to £1,...

One in Six Sex Offenders Lives Double Life on the Internet, Study Finds

One in six convicted US sex offenders lives a double life on the Internet to stay undetected after prison, according to a study by Utica College. Preliminary results showed more than 16 percent of sexual predators use elaborate online techniques to escape Police tracking. Other methods to avoid monitoring on the Internet include using multiple aliases, social security numbers, and dates of birth. They also...

Bogus Android Battery App Steals Phone Numbers and Emails

A Trojan that steals contact details from Android-running devices was spotted with a bogus battery optimization app. Luring users with the promise of increased battery performance upon installation, the Trojan covertly scans address books and broadcasts phone numbers and email addresses to an attacker-controlled domain. After sending all contact details, it displays an image with a GONE visibility state, fo...

Japan’s Finance Ministry Spied On by Trojan for Two Years

Japan’s Finance Ministry recently discovered a data-leaking Trojan on its computers that has been running for almost two years. During a security sweep of their network infrastructure, a third-party security firm found the Trojan and notified the institution. Of the 2,000 computers checked, 123 were infected with the Trojan that appeared to be present since January 2010. The Finance Ministry said no taxpaye...

Anonymous Could Expose More Than 600K IPS Customer Details

Anonymous recently launched Operation Australia with a plan to target major websites and reveal confidential data that would expose more than 600K of customer data of a major local Internet Service Provider. Anonymous said it will leak more than 40GB of data and promised that no individuals’ personal details will be compromised. The hacktivists recently said that “something big” will go down soon and the ex...

Intuit Withdrawals on the Malware and ID Theft Champs-Élysées

Bogus funds withdrawal mails claiming to be from financial software company Intuit seek to steal users’ identity, infecting them with malware. The Intuit spam wave began a few days ago with most e-mails coming from a fake support address of the software provider, subjects containing the words “payroll processing” in one form or another, and various bogus senders. “Dear XXXX@.net, we obtained your payroll on...

Hacking Hardware for Less than $50 Can Open 4 Million Hotel Rooms

A security flaw in keycard door locks from Onity could trouble the sleep of more than 4 million hotel guests around the world. According to a demonstration by 24-year old security researcher Cody Brocious in a BlackHat pre-briefing, the electronic part of the Onity locking system can be easily tricked into opening the door for unauthorized users through the 5-volt DC port it exposes. Even though the keycard...

Microsoft Upgrades Skype with Eavesdropping ‘Features’

After acquiring Skype for roughly 8.5 billion dollars, Microsoft’s update to the service’s architecture could reportedly make in-call eavesdropping much easier. Image credit: Skype With Voice-over-IP taking the lion’s share of web-based communication, it’s reasonable to assume the information carried by Skype would be of great importance for government agencies. However, its decentralized, peer-to-peer arch...

© 2012 Powered By Bitdefender

Scroll to top