Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Details on 87 Million Mexican Voters Available Online

The addresses of 87 million Mexican voters were recently accessible online to anyone with an internet connection -- all without authentication or protection by security mechanisms. Texan whistleblower Chris Vickery informed Mexican authorities of his findings, stating that the information could be used by criminals. While the information was available via AWS (Amazon Web Services), the company’s website doe...

Stolen usernames and passwords still cause almost a quarter of all data breaches

Companies and consumers alike love "the cloud". But the same security mistakes appear to be helping hackers steal data from cloud-based systems time and time again. And it's against that gloomy backdrop that a new report by the Cloud Security Alliance, "Identity Solutions: Security Beyond the Perimeter", makes a worthwhile read. According to surveys detailed in the Centrify-sponsored report, 22% of responde...

FBI paid over $1.3 million to hack into San Bernadino iPhone that contained ‘nothing of real significance’

Speaking at the Aspen Security Forum in London, FBI Director James Comey has suggested that the agency paid over $1.3 million in order to unlock the iPhone 5C used by Syed Farook Rizwan, one of the terrorists behind last December's attack in San Bernardino, California. Comey didn't come out in plain sight and state the cost of purchasing the exploit from gray-hat hackers, but an answer he gave to a journali...

Security is key concern for IoT developers, survey shows

Security is the main concern for almost half of the developers of IoT solutions, with interoperability and connectivity coming second and third, a recent survey shows. Image source: Eclipse IoT Working Group Some 48.3% of the developers working in organizations that have deployed IoT solutions identified security as their top concern, while 47.4% of all respondents fear security flaws in IoT products. “It s...

Music streaming can leave homes open to hacking

As far-fetched as it may sound, listening to music might endanger your privacy, Bitdefender research shows. Bitdefender IoT researchers analyzed a Wi-Fi audio receiver and found it susceptible to brute-force attacks and poor authentication practices. The risk of unsafe protocols The MUZO Cobblestone works as a Wi-Fi audio receiver or as a standalone music player and can be connected to home routers to allow...

Any phone can get hacked via a global cellular network vulnerability

A vulnerability in the Signaling System Seven (SS7) has been recently exploited to track location, snoop on messages and phone calls on any type of smartphone, researchers found. Karsten Nohl, a German hacker, demonstrated how, by leveraging the flaw, he was able to track all this personal information from an iPhone owned by US Congressman Ted Lieu. First, it's really creepy, and second, it makes me angry,"...

Hack the Pentagon, and you could win $150,000

Hackers are trying to break into The Pentagon. There's nothing unusual about that, of course. The difference this time is that The US Department of Defense is inviting hackers to find security vulnerabilities in some of its public websites, and is offering bounty payments of up to $150,000 for those who discover flaws. There are, of course, some rules about the "Hack the Pentagon" bug bounty program, as the...

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitdefender researchers analyzed the LIFX bulb – a successful crowdfunding project started in September 2012 - and found it vulnerable to traffic interception. Coincidentally, the LIFX product has been subjected to a hacking experimen...

Five security takeaways from the Panama Papers breach

By now, you’ve probably heard about the monster story of the moment – Panama Papers. The security breach hit a Panama-based law firm that helps companies hide money in offshore jurisdictions. When a trove of leaked documents revealing the real wealth of tycoons and world leaders was publicly disclosed, it started an unprecedented scandal over tax havens, one that even threatens to derail several governments...

Snowden predicts massive attacks on iPhones after FBI hacked the 5C

Edward Snowden, the former NSA contractor turned whistleblower, says the unlocking procedure used by the FBI to break into the iPhone 5c involved in the attack in San Bernardino will result in new attacks on iPhones by the end of the year. Image source: Wikipedia “FBI's refusal to close security holes found during iPhone hack will result in attack being globally available by year's end,” Snowden wrote on hi...

© 2012 Powered By Bitdefender

Scroll to top