Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Millions of penny stock spam emails have been flooding inboxes these days, spreading a new ‘Wolf of Wall Street’ scam and inflating stock values of a mineral deposit company based ...

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs. The alleged sexy videos ...

Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

ShellShock Roundup: What to do if You are Vulnerable

ShellShock Roundup: What to do if You are Vulnerable

A security vulnerability on the GNU Bourne Again Shell reported Wednesday is claiming victims in the wild. The flaw – known to the tech world as CVE-2014-6271 and CVE-2014-7169 - a ...

Malware Writers Target SMB Employees with Fake Policy Violation

Malware Writers Target SMB Employees with Fake Policy Violation

A new cyber-crime attack tricks SMB employees into downloading Zbot and other Trojans by accusing them of violating company policy, according to antivirus software provider Bitdefe ...

Russian Hackers Promise Anti-Government Software, Deliver Kelihos Trojan Instead, Bitdefender Warns

Russian Hackers Promise Anti-Government Software, Deliver Kelihos Trojan Instead, Bitdefender Warns

A self-proclaimed hacker community from Russia installs data-stealing malware on users’ machines by pretending the software was designed to attack Western governments and the US, a ...

Four Million Plug and Play Devices Become Potential Tools in DDoS Attacks

Millions of home and office devices, including routers, media servers, webcams, smart TVs and printers are vulnerable and can be used to launch large-scale denial-of-service attacks, according to an advisory by cloud provider Akamai. “The rise of reflection attacks involving UPnP devices is an example of how fluid and dynamic the DDoS crime ecosystem can be”, Akamai says. Since July 2014, Akamai’s Prolexic...

Cross-Site Scripting (XSS) Vulnerability in New York Times’ Articles Before 2013

New York Times articles’ pages from the nytimes[dot]com domain, dated before 2013 suffer from an XSS cross-site scripting vulnerability, according to the report posted by security researcher Wang Jing on the Tetraph Blog. Cross-site scripting (XSS) vulnerabilities usually reside in web applications and can be used by attackers to modify the normal flow of the web page. "For XSS attacks, one important thing...

Facebook Bug Bounties for Ads Code Just Doubled

Facebook doubled the bounties for security vulnerabilities discovered in the code behind its advertising system, according to PC World. Researchers who find bugs in the ads code will be paid at least $1,000, and not $500 as until now. Typical vulnerabilities include wrong permission checks, insufficient rate-limiting, edge-case CSRF issues, and Flash problems in the ads code. The social network announced it...

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Millions of penny stock spam emails have been flooding inboxes these days, spreading a new ‘Wolf of Wall Street’ scam and inflating stock values of a mineral deposit company based in Canada, according to the Bitdefender Antispam Lab. With over 3 million unique samples, the wave started to grow last Thursday and soon became the largest stock spam attack in 2014, and also the most successful. The transactions...

SSL 3.0 “Poodle” Flaw Opens Encrypted Data to Eavesdropping

A vulnerability in the design of the SSL 3.0 protocol can be exploited to intercept secure cookies transmitted between clients and servers in a reasonable amount of time, Google announced in blog post. Three Google researchers uncovered the “Poodle” (Padding Oracle On Downgraded Legacy Encryption) flaw which affects a large number of Internet-connected servers that can to fall back to the vulnerable SSL v3...

NSA Agents Physically Infiltrated Communication Companies from China, Germany and South Korea

The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their "physical subversion" programs. The Intercept reported that the National Security Agency used "under cover" agents to access important systems and data from the communication industry. "The documents describe...

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what we know today. Some of them also caught a glimpse of the future and envisioned the technology we are using now or are about to see. Keeping an eye on the visionaries helps us prepare for the future.  [divide] There’s a good reaso...

Schoolgirl aged 15 left humiliated when teachers showed her bikini photo in assembly

Remember when you were a teenager? And you had thousands of friends on Facebook? No? That doesn’t describe my childhood, either, but it rings true to many of today’s teens. According to a survey, a child’s social media development begins at nine and over the next four year period, their online activity evolves from just viewing online content to using social media platforms. Social networking safety issues...

CyanogenMod-Powered Users Susceptible to Man-in-the-middle Attacks

Android users running the popular CyanogenMod third-party ROM could fall victim to man-in-the-middle (MitM) attacks, apparently possible because of the re-use of sample Java code. According to a news report from The Register, CyanogenMod developers re-used a snippet of code provided by Oracle as proof of concept code to process SSL certificates and validate hostnames. The 10 year old piece of code, publicly...

Facebook Links Most Removed from Google Searches

145,000 people requested to be erased from Google records since the “right to be forgotten” process began May 29, according to Google’s latest Transparency report. After the Court of Justice of the European Union decided that search engines give individuals the right to delete any personal data which is not of public interest, Google was swamped with some 1000 demands a day, mostly from Europeans. So far, F...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top