New Scareware Campaign Tricks Users with Fake Antivirus

New Scareware Campaign Tricks Users with Fake Antivirus

A new type of scareware advertisement tricks users into believing their systems are infected and need expert help to remove the malware, Bitdefender warns. The malware-spreading me ...

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Bitdefender Warns Stock Brokers of New ‘Wolf of Wall Street’ Scam

Millions of penny stock spam emails have been flooding inboxes these days, spreading a new ‘Wolf of Wall Street’ scam and inflating stock values of a mineral deposit company based ...

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs. The alleged sexy videos ...

Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

Bitdefender’s Pick. Amazon, Google and Apple Ramp up Competition in Internet of Things; Hackers Await

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled fo ...

ShellShock Roundup: What to do if You are Vulnerable

ShellShock Roundup: What to do if You are Vulnerable

A security vulnerability on the GNU Bourne Again Shell reported Wednesday is claiming victims in the wild. The flaw – known to the tech world as CVE-2014-6271 and CVE-2014-7169 - a ...

Malware Writers Target SMB Employees with Fake Policy Violation

Malware Writers Target SMB Employees with Fake Policy Violation

A new cyber-crime attack tricks SMB employees into downloading Zbot and other Trojans by accusing them of violating company policy, according to antivirus software provider Bitdefe ...

NSA Agents Physically Infiltrated Communication Companies from China, Germany and South Korea

The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their "physical subversion" programs. The Intercept reported that the National Security Agency used "under cover" agents to access important systems and data from the communication industry. "The documents describe...

Bitdefender’s Pick. Ada Lovelace Day. Celebrating the world’s original coder!

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what we know today. Some of them also caught a glimpse of the future and envisioned the technology we are using now or are about to see. Keeping an eye on the visionaries helps us prepare for the future.  [divide] There’s a good reaso...

Schoolgirl aged 15 left humiliated when teachers showed her bikini photo in assembly

Remember when you were a teenager? And you had thousands of friends on Facebook? No? That doesn’t describe my childhood, either, but it rings true to many of today’s teens. According to a survey, a child’s social media development begins at nine and over the next four year period, their online activity evolves from just viewing online content to using social media platforms. Social networking safety issues...

CyanogenMod-Powered Users Susceptible to Man-in-the-middle Attacks

Android users running the popular CyanogenMod third-party ROM could fall victim to man-in-the-middle (MitM) attacks, apparently possible because of the re-use of sample Java code. According to a news report from The Register, CyanogenMod developers re-used a snippet of code provided by Oracle as proof of concept code to process SSL certificates and validate hostnames. The 10 year old piece of code, publicly...

Facebook Links Most Removed from Google Searches

145,000 people requested to be erased from Google records since the “right to be forgotten” process began May 29, according to Google’s latest Transparency report. After the Court of Justice of the European Union decided that search engines give individuals the right to delete any personal data which is not of public interest, Google was swamped with some 1000 demands a day, mostly from Europeans. So far, F...

Judge Rejects Defense Motion Stating Silk Road was Illegally Hacked by FBI

US New York District Court Judge Katherine Forrest has rejected defense lawyer's Ross Ulbricht motion that claimed the FBI illegally hacked the Silk Road server without a warrant and so violated Ulbricht's Fourth Amendment rights, according to Wired. The motion was rejected due to Ulbricht's failure to fully demonstrate that the Silk Road server belonged to him, thus losing the standing to make any privacy...

200,000 naked Snapchat images leaked, after third-party hack

Are you, or is a member of your family, in the habit of exchanging intimate private pictures via Snapchat? If so, I hope you won't be relying on them remaining private. Because, as has been known for some time, there will always be ways for Snapchat images to be preserved by recipients - even if you were hoping they would expire and delete themselves a few seconds after being viewed. Now, in an event dubbed...

Kmart hacked – payment systems compromised by malware

It's not proving to be a good year for US retailers, and it's just got worse. Kmart announced on Friday that it had detected a serious security breach involving its store payment data system, and that since at least early September debit and credit card numbers used at the retailer's bricks-and-mortar stores had been stolen. Kmart's president Alasdair James summarised the situation in the advisory posted in...

Apple Tops Phishing Targets in First Half of 2014, Report Says

Apple was the most hijacked brand in the first half of 2014 with a total of 21,951 attacks, or 17.7 percent of all phishing attacks, according to a report by the Anti-Phishing Working Group (APWG). PayPal came second with 17,811 attacks and Chinese shopping site Taobao was third, suffering 16,418 phishing assaults. iPhones "can be used to lock a user out of their phone and ransom it back to them for money,"...

Amazon Cloud Services Used More Often in Web Attacks; WordPress is the Most Targeted CMS

Amazon’s Cloud Services have been increasingly used in web attacks as the trend has increased over the past year, according to Imperva’s Web Application Attack Report. While most web application attacks have been generated from the US, the report also revealed that Infrastructure as a Service (IaaS) providers generated more web attacks due to their increased market share. "This is an interesting beginning t...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top