Bitdefender’s Pick. Father of Linux Turns 45 This Month

Bitdefender’s Pick. Father of Linux Turns 45 This Month

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Hackers Grab Yahoo Credentials through Mail Activity Reports Campaign

Hackers Grab Yahoo Credentials through Mail Activity Reports Campaign

Yahoo users are being targeted by a new phishing campaign that helps hackers grab their credentials and hijack accounts. Bitdefender was already blocking the malicious URLs spreadi ...

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

We hate to sound gloomy before the holidays, but Christmas not only brings joy and presents. It comes with increasing cyber-crime activity as well, as Hacker Grinch prepares new sc ...

Bitdefender’s Pick. Computer Security Day Recalls Infamous Virus to Caution Users

Bitdefender’s Pick. Computer Security Day Recalls Infamous Virus to Caution Users

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

Thousands Fall with Each Hour for Free Audi R8 Facebook Scam

Thousands Fall with Each Hour for Free Audi R8 Facebook Scam

Over 200,000 Facebook users have fallen prey to a like-farming scam promising two free Audi R8 cars, and thousands join the victim list with each hour, according to antivirus softw ...

‘Facebook at Work’ Could Increase Security Risks

‘Facebook at Work’ Could Increase Security Risks

The ‘Facebook at Work’ project could raise even more security and privacy issues than the regular social network, according to Bitdefender security experts. The antivirus software ...

Free Bitdefender Adware Removal Tool for PC Goes Online; Reclaim Your Computers Now

Free Bitdefender Adware Removal Tool for PC Goes Online; Reclaim Your Computers Now

The free Adware Removal Tool for PC is now online. Bitdefender officially released today the application that helps users get rid of annoying software, according to a press release ...

Pirate Bay Knocked Offline by Swedish Police

Torrent site Pirate Bay has been rendered temporarily unavailable after Swedish Police shut down several local servers, according to news reports. The operation was "a crackdown on a server room in Greater Stockholm" that was "in connection with violations of copyright law," said Paul Pintér, from the Swedish police. Other sites closed in the crackdown include the torrent portal's forum, Suprbay.org, image-...

‘LulzSec Leader’ Sabu Points to His Kids as the Weakness that Made Him an FBI Informant

Former LulzSec leader Hector Xavier Monsegur, or ‘Sabu,’ pointed to his kids as the “weakness” that turned him into an FBI informant after his arrest in 2011, according to CBS. The station aired Sabu’s first TV interview, making waves among Anonymous members, who complained about the way they were portrayed. “Shame on you CBS,” AnonymousXenc wrote on YouTube. “You clearly are missing the point. Anonymous Is...

Wearable Plain-Text Communication Exposed Through Brute-Force, Bitdefender Finds

The 6-digit pin code used to obfuscate Bluetooth communication between smartwatches and Android devices can be brute-forced into exposing messages in plain-text, according to Bitdefender’s Research Team. Everything from SMS messages to Facebook or Google Hangouts chats are constantly being forwarded to your smartwatch. So all this communication should be safe, right? It turns out that, with a little ingenui...

Hackers Grab Yahoo Credentials through Mail Activity Reports Campaign

Yahoo users are being targeted by a new phishing campaign that helps hackers grab their credentials and hijack accounts. Bitdefender was already blocking the malicious URLs spreading in inboxes worldwide. The phishing campaign starts with messages that bypass the e-mail provider’s antispam filters, reaching the Inbox folder. The e-mails pose as "mail activity reports" and copy Yahoo’s email format to look l...

Leaked emails reveal that hackers demanded money from Sony Pictures before attack

At 9:44am PST on November 21st, just three days before Sony Pictures' network was brought down in dramatic fashion by hackers with locked screens and grisly displays of skulls, the company's top executives received an unsolicited email. Subject: Notice to Sony Pictures Entertainment Inc. Message body: We've got great damage by Sony Pictures. The compensation for it, monetary compensation we want. Pay the da...

What Is End-to-End Encryption? Why Should You Care

It seems everyone is into end-to-end encryption these days. WhatsApp, Google or Dropbox. But what exactly is it? More than a cool catch phrase of the post-Snowden era, end-to-end encryption is considered the remedy to most e-privacy issues out there. Let’s take an in-depth look to understand the concept better. First of all, encryption is a way of converting all electronic data (files, passwords, images) in...

Over 30 Vulnerabilities Exposed in Google App Engine

Over 30 vulnerabilities that allow hackers to bypass critical security sandbox defenses were discovered in Google App Engine (GAE), according to The Hacker News. Security Explorations researchers identified the series of flaws in the Java environment of Google’s Platform as a Service. Attackers can exploit the vulnerabilities to achieve a complete Java VM security sandbox escape, as well as to execute arbit...

Hackers Can Attack Social Logins to Impersonate Users, IBM Study Shows

Cyber-criminals can exploit social logins, such as the “Sign In With Facebook/LinkedIn/etc” buttons, to hijack accounts and impersonate users through a technique dubbed SpoofedMe, according to IBM research. To run the attack, hackers register a spoofed account at a vulnerable identity provider using the victim’s email address. Cyber-criminals can then post misleading information and even malware on victims’...

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

We hate to sound gloomy before the holidays, but Christmas not only brings joy and presents. It comes with increasing cyber-crime activity as well, as Hacker Grinch prepares new scams and online attacks. Identity fraudsters claimed a new victim every two seconds in 2013, and the number of identity fraud victims rose to 13.1 million, according to Javelin Strategy & Research. These figures only express fr...

Twitter Makes Reporting Abusive Tweets Easier

Twitter will improve its reporting process to help users block inappropriate content, the company announced in a blog post. Changes include under-the-hood improvements to the tools used to review reported Tweets and accounts. “Everything that happens in the world, happens on Twitter – to the tune of more than 500 million Tweets every day. That can sometimes include content that violates our rules around har...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top