First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

Don’t be fooled by fake emails offering updates to operating systems and other software! Cyber-extortionists are trying to take advantage of the millions of people looking for a fr ...

Configure Windows 10 like a privacy pro

Configure Windows 10 like a privacy pro

Windows 10 has only been around for a couple of days, but it is running on more than 67 million computers worldwide already. The new operating system is being aggressively pushed t ...

Start Testing the New Bitdefender 2016 Beta

Start Testing the New Bitdefender 2016 Beta

Help us perfect the best security software of 2016 by visiting http://www.bitdefender.com/beta/ to download the new Bitdefender 2016 beta kits. You get early access to some of the ...

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Dyre Threat – Infected Emails Diversify Tactics to Target Thousands of Users, Bitdefender Finds

Another global spam campaign spreading banking Trojan Dyre hit users Inboxes in recent days, using various approaches to maximize damage, Bitdefender malware analysts found. Thousa ...

Bitdefender Products Ready to Embrace Windows 10

Bitdefender Products Ready to Embrace Windows 10

Update: The antivirus upgrade system built into Windows 10 won’t immediately check for a compatible version of the product. There is a three hour delay and this is not something we ...

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

OS X Zero-Day Flaw Found by Italian Teen

A new zero-day vulnerability enabling remote access to computers running Apple’s OS X operating system has been revealed by 18-year old Italian security researcher Luca Todesco. The exploit, published on GitHub,d relies on two bugs to cause memory corruption in the kernel, enabling the researcher to bypass Apple’s OS X kASLR (kernel address space layout randomization). Although kASLR is designed to prevent...

10 Tips to Safeguard Your Photos like a Pro Photographer

Pictures are among our most valuable digital assets. They are also the most popular type of file stored or shared via cloud services. Statistics show that 82% of people who use internet storage space do so to safeguard their photos against accidents. But what about professional photographers who take thousands of photos at wedding or performances? Even the most experienced digital artists have admitted to d...

CISCO Networking Devices Updated With Malicious IOS Bootstrap, Thanks to Stolen Admin Credentials

Recent reports involving stolen administrative credentials enabled attackers to update the IOS bootstrap running on CISCO switches and routers with maliciously crafted ROMMON images, CISCO announced. The process allows attackers to remotely manipulate CISCO IOS devices even after reboot, persisting until the malicious ROMMON image is removed. Although the company gave no details as to who reported the incid...

Windows Vulnerability Enables Attackers to Booby-Trap USB Devices

A new vulnerability found in all Windows versions has been patched by Microsoft after it was allegedly exploited in the wild. The Mount Manager Component could allow an attacker to booby-trap a USB and execute malicious code when mounted on a Windows machine. “An elevation of privilege vulnerability exists when the Mount Manager component improperly processes symbolic links,” reads the Security Bulletin. “A...

How to disable a car’s brakes just by sending an SMS

Last month, security researchers grabbed the headlines dramatically by demonstrating how they had found a way to remotely hack into a Jeep as it drove down the highway at 70mph, mess with its controls, and cut its engine. Car manufacturer Chrysler was compelled to recall 1.4 million cars for a security update in response. But now a different team of security researchers have found what appears to be an even...

Stolen Press Releases Used to Generate $30 Million From Illegal Trades, FBI Says

Nine people were charged with stealing over 150,000 unpublished press releases from top business news outlets in the “biggest scheme of its kind,” the FBI says. The stolen information was allegedly used to generate $30 million in illegal profits from stock market trades. Between 2010 and 2015, a pair of Ukraine-based computer hackers broke into servers of newswire companies Marketwired L.P., PR Newswire Ass...

Over Two-Thirds of US Companies Plan to Spend More On Security, CFOs Say

Some 69% of US companies have increased investments in data security in the past year, while 92% have a formal data security plan, according to the 2015 CFO Outlook annual Pulse, a survey by Bank of America. Source: Flickr The top five strategic activities of CFOs, beyond the finance role, are technological advances (61%), risk management (60%), data management (59%), human resource issues (49%) and communi...

First Ransomware Disguised as Windows 10 Upgrade, Bitdefender Warns

Don’t be fooled by fake emails offering updates to operating systems and other software! Cyber-extortionists are trying to take advantage of the millions of people looking for a free system upgrade to Windows 10. Cybercriminals are spreading CTB Locker via fake emails claiming to install Windows 10 kits, Bitdefender Antispam Labs found. Attackers demand 2 Bitcoins (worth $600) be paid within 96 hours to res...

Default Configuration on Windows Server Update Services Puts Companies at Risk, Researchers Warn

Companies that rely on default configurations for Windows Server Update Services to manage and distribute updates to endpoints in the corporate environment could be vulnerable to cyberattacks. Both Windows Update and WSUS could be vulnerable to man-in-the-middle attacks, enabling attackers to infiltrate corporate networks, because of default WSUS deployment settings that do not enable SSL. “WSUS deployments...

Two in Three CIOs Admit Lacking in API Security Measures

Some 70% of IT professionals have no processes in place to ensure data accessed by applications consuming their APIs is managed securely, according to the Global State of API Security Survey 2015. Source: Pixabay An API, or application program interface, is a set of routines, protocols and tools for building software applications that explain how software components should interact. The survey reveals that...

© 2012 Powered By Bitdefender

Scroll to top