Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

IT pros see Mac as safest OS; Windows, Android seen more vulnerable

Some 28 percent of IT and IT security practitioners say Android is the operating system most vulnerable to a data breach or cyberattack while 23 percent cite Windows, according to a survey by Ponemon Institute. The least vulnerable is the Mac, which was picked by 7 percent of respondents. However, recent developments show Mac users have become targets for cyber attacks. This March, Palo Alto Networks resear...

Alleged Syrian Electronic Army Hacker Extradited to the US

Alleged hacker Peter Romar, 36, has been extradited to the US following evidence of his involvement with the hacker group known as the Syrian Electronic Army (SEA). Expected to appear in the Eastern District of Virginia court on Tuesday, the German national is believed to have also helped extort money from US companies. Working with Firas Dardar, a member of the SEA, Romar would receive extortion payment fr...

Kiddicare customers at risk after data spills from test server

British retailer Kiddicare, which has made a name for itself selling pushchairs, car seats and more, has suffered a data breach that has exposed the personal information of its customers. Kiddicare has sent an email to affected customers saying that their names, delivery addresses, telephone numbers and email addresses have fallen into the hands of hackers - but that, thankfully, no payment details have bee...

Researcher Arrested for Hacking into Lee County Elections Website

Political consultant and cybersecurity company owner David Levin has been jailed on accusations of hacking into the state elections website on Jan. 4 and Jan. 31. The Florida Department of Law Enforcement accused Lee, who turned himself in just hours after an arrest warrant was issued in his name, of three counts of third-degree-felony property crimes. After six hours in Lee County Jail, Lee paid a $15,000...

Most companies lack processes, governance, required to stop cyber attacks

More than half of companies (54%) perceive the lack of governance and control processes as the biggest gaps in stopping attacks on endpoints, according to a recent survey of IT professionals in the US . On average, respondents believe 49 percent of attacks on an organization’s endpoints can be realistically stopped with enabling technologies, processes and in-house expertise. The main obstacle to mitigating...

Forget luxury cars, you can get your data stolen with this Facebook scam

We’ve seen dozens of scams in our digital lives post Facebook, yet this particular one captured my attention with the impressive number of Likes and Shares. Over 90k people are following a Facebook community that promises to give away free luxury cars in exchange for Likes, Shares and some personal data. The flow is as follows – the user lands on the “Range Rover 2016.” Page/community after seeing in his Ne...

Instagram Vulnerability Lands $10,000 Bounty for 10-Year-Old

Facebook-owned Instagram was deemed vulnerable by 10-year-old Jani from Helsinki, who revealed that he could delete comments and descriptions on any Instagram account. The vulnerability enabled Jani to insert malicious code into the comment section of Instagram, effectively allowing him to delete anything – even profiles – with no authorization from the targeted account. “I tested if Instagram can withstand...

How will cybersecurity look like in 2020? Five threat scenarios

Researchers from UC Berkeley’s School of Information tried to answer this immensely challenging question in their most recent report, Cybersecurity Futures 2020. The paper explores how technology and security will be transformed in the uncertain and not-so-distant future. Briefly, here are five scenarios the researchers have envisioned for the next four years - to be taken with a pinch of salt, they say. Th...

Spammed-out malware campaign contains offensive hidden message for anti-virus CEO

There is no love lost between the people who write malware and the anti-virus companies who work hard to protect innocent users against them. And occasionally that animosity spills out into the actual malicious code written by online criminals. Sometimes it might present itself in the form of code to attempt to avoid detection by a particular product, or techniques to avoid analysis in malware labs. But som...

Companies fear zero day and denial of service attacks most

Zero-day attacks are the most serious type of incidents and compromises for companies, according to 71 percent of respondents in a recent survey. DDoS was second, mentioned by 68 percent of respondents. Most respondents also say the consequences of an exploit of an existing software vulnerability greater than 3 months old (53 percent) and ransomware (51 percent) can be severe. Companies still struggle to ha...

© 2012 Powered By Bitdefender

Scroll to top