Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

The Internet of Things (IoT) or Internet of Threats, as we often call it, has been labeled "the next Industrial Revolution" by journalists because of the way it will change the way ...

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Whenever you go on holiday, you end up taking all your personal data. The information on your personal phone, laptop or other smart device is at more risk of being compromised or s ...

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

It happened! Last night, this blog received the Grand Prix Prize for the Best Overall Security Blog at the European Security Blogger Awards in London! An award we are happy to shar ...

Smart switch may turn off your Wi-Fi for good

Smart switch may turn off your Wi-Fi for good

You might be risking your privacy, and even physical security, if you use a next-generation switch to control appliances in your home. Image source: Flickr In analyzing several IoT ...

Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Password Security in Immediate Danger, Deloitte Claims

Computer users will have a hard time keeping passwords private this year. At least, that’s the view of Big Four auditing firm Deloitte. The findings of Deloitte’s TMT Predictions 2013 report reveal rampant re-use of passwords, which puts computer users at risk when these passwords are leaked and bruteforced with modern technologies. “If you take a site with over six million users and you take ten thousand p...

Future Malware to Be Injected into Systems via Electromagnetic Interference

Modern malware can infect computers in quite a number of ways, but future infections will be able to take over networks not even connected to the Internet. The infiltration mechanism under research at the Intelligence and Information Warfare Directorate (I2WD) is based on the interference induced in conductors such as network cables, which act as wireless antennae broadcasting information being transferred...

Bitdefender Offers Free Removal Tool for Red October Cyber-Espionage Piece

Details of a new cyber-espionage tool dubbed Red October emerged early this week This complex piece of malware is built in a modular manner and carries all the prerequisite for a successful attack, such as infection components, plugins and command and control mechanisms. The infection appears to have gone unnoticed for an incredible amount of time, judging by the timestamp of its components, even though som...

Flashlight among Android Apps That Rat Out Users (and Surprise Them)

Android users are surprised to find that the Flashlight apps for Android could rat out device owners, and many more seemingly innocent apps can track their location, according to the Carnegie Mellon University. Researchers argue people are surprised to learn that popular mobile applications are sharing their sensitive data. “There's no sensible reason why a flashlight app would need your location," said Jas...

Michael Jackson Hackers Escape Jail Time, Serve Community

The two British hackers who allegedly stole Michael Jackson’s music after breaking into Sony’s servers got away without prison time but were sentenced to complete 100 hours of community service, according to The Guardian. 27-year old James Marks and 26 year-old James McCormick confessed they were big fans of Michael Jackson, which made them search for evidence that his posthumous songs weren't interpreted b...

RSA Finds Laser-Focused Phishing Attacks Targeting Pre-Determined Victims

A new phishing kit was recently discovered and analyzed by EMC’s RSA Security division in which a specific group of victims was targeted for credentials theft. Assigning each address on the list a unique identifier, a user clicking the malicious link was first validated and then redirected to a phishing webpage if he made the list. Users not on the list were redirected to a 404 webpage. The “laser precision...

Malware Infecting US Power Plant SCADA Systems

Critical power generation systems inside two US power plants were infected with “known sophisticated malware” that spreads via USB drives, reports the US Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). The malware, which the team didn’t name, infected a handful of machines during a software update initiated by an outside technician. With supervisory con...

Cisco-Powered Linksys Routers Vulnerable to Remote Ownage

A serious flaw in the Linksys routers could allow an attacker to seize root privileges on the device, according to a blog post by pen-tester specialist DefenseCode. As shown in a video, successful exploitation of a Cisco Linksys WRT54GL model gives the attacker root access on the locally installed Linux-based firmware. DefenseCode claims the vulnerability resides in the latest Linksys firmware (4.30.14), bu...

South Korea Trains Hackers to Fight Cyber Crime

South Korea has launched a program that aims to find the best hackers and turn them into national defenders against internal and external cyber-attacks, according to CNN Seoul. The South Korean government, in collaboration with the Korea Information Technology Research Institute (KITRI), has set up a six-month training program called “Best of the Best” to transform the country’s smartest hackers into nation...

‘Police Ransomware’ Becomes Java 0-Day-Borne

The recently discovered vulnerability disclosed on Thursday has been finally patched by Oracle, but exploitation in the wild continues on computers that have not been updated yet. With exploitation code included in world’s most frequently used exploit packs such as BlackHole, Nuclear Pack and the Cool Exploit Kit, cyber-criminals have started to take advantage of the huge pool of vulnerable computers by pla...

© 2012 Powered By Bitdefender

Scroll to top