First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

Don’t be fooled by fake emails offering updates to operating systems and other software! Cyber-extortionists are trying to take advantage of the millions of people looking for a fr ...

Configure Windows 10 like a privacy pro

Configure Windows 10 like a privacy pro

Windows 10 has only been around for a couple of days, but it is running on more than 67 million computers worldwide already. The new operating system is being aggressively pushed t ...

Start Testing the New Bitdefender 2016 Beta

Start Testing the New Bitdefender 2016 Beta

Help us perfect the best security software of 2016 by visiting http://www.bitdefender.com/beta/ to download the new Bitdefender 2016 beta kits. You get early access to some of the ...

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Update: The antivirus upgrade system built into Windows 10 won’t immediately check for a compatible version of the product. There is a three hour delay and this is not something we ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

Gen Y Makes Security and Privacy Top Priorities While Surfing Online

Security and privacy are more important than page load speeds, customization or social integration features during online browsing, according to a study by Refuel Agency on Generation Y members. Image source: Flickr Some 70% of the respondents say security is important in a browser and 68% care about privacy. Webpage loading speed and user friendly features come third and fourth. Customizability and social...

Super Hacker Myth Debunked by Data, Says Gartner Vice President

Gartner Vice President Anton Chuvakin says reams of data will provide clues and traces of hacking attempts and prove that “super hackers” do not exist. He says it’s all a matter of continuous incidence response. The analyst said old security incident response models are ineffective when dealing with modern hackers and, although these aggressors use covert tactics to hide their presence, they still leave log...

Vulnerability in Pocket Addon for Firefox Could Have Affected Company Servers

A server-side vulnerability found in the save-for-later service would have allowed attackers to gain access to all user data and even populate their reading lists with malicious links. Because the bookmarking app had poor networking design, the researcher was able to retrieve user information relating to IP addresses, saved URLs, and - with the help of some redirects – access to the etc/passwd file that con...

32 Million Users Exposed After Breach On Cheating Site Ashley Madison

A 9.7 gigabytes data dump of some 32 million users subscribed to cheating site Ashley Madison has been released by hacker group Impact Team following demands to take the website offline. Similar threats have been made in the past, following another security incident involving the website. This time, hackers published the full database when their demands weren’t met. Avid Life Media, owner of Ashley Media, h...

Issue With En Route Automation Modernization System Grounds US East Coast Flights, FAA Says

US East Coast flights were disrupted on Saturday due to a memory issue in the En Route Automation Modernization (ERAM) system, prompting the FAA (Federal Aviation Administration) to launch an official investigation. Data from flight control systems could apparently not be deleted from storage units, despite air traffic controllers’ attempts, placing the ERAM system into a processing frenzy. Although the FAA...

Silenced for two years by Volkswagen, car hackers reveal their paper into security hole

Two years ago, a trio of researchers were preparing to present the findings of their investigation into the security of car immobilisers used by luxury cars. The way these devices are supposed to work is like this: You sit in your car, and push the "Start" button. The engine should remain immobilised, and refuse to start, unless a cryptographic algorithm on the key's RFID transponder correctly verifies the...

OS X Zero-Day Flaw Found by Italian Teen

A new zero-day vulnerability enabling remote access to computers running Apple’s OS X operating system has been revealed by 18-year old Italian security researcher Luca Todesco. The exploit, published on GitHub,d relies on two bugs to cause memory corruption in the kernel, enabling the researcher to bypass Apple’s OS X kASLR (kernel address space layout randomization). Although kASLR is designed to prevent...

10 Tips to Safeguard Your Photos like a Pro Photographer

Pictures are among our most valuable digital assets. They are also the most popular type of file stored or shared via cloud services. Statistics show that 82% of people who use internet storage space do so to safeguard their photos against accidents. But what about professional photographers who take thousands of photos at wedding or performances? Even the most experienced digital artists have admitted to d...

CISCO Networking Devices Updated With Malicious IOS Bootstrap, Thanks to Stolen Admin Credentials

Recent reports involving stolen administrative credentials enabled attackers to update the IOS bootstrap running on CISCO switches and routers with maliciously crafted ROMMON images, CISCO announced. The process allows attackers to remotely manipulate CISCO IOS devices even after reboot, persisting until the malicious ROMMON image is removed. Although the company gave no details as to who reported the incid...

Windows Vulnerability Enables Attackers to Booby-Trap USB Devices

A new vulnerability found in all Windows versions has been patched by Microsoft after it was allegedly exploited in the wild. The Mount Manager Component could allow an attacker to booby-trap a USB and execute malicious code when mounted on a Windows machine. “An elevation of privilege vulnerability exists when the Mount Manager component improperly processes symbolic links,” reads the Security Bulletin. “A...

© 2012 Powered By Bitdefender

Scroll to top