Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

One in five employees would sell passwords to an outsider

One in five employees would sell his private passwords to a third-party organization and 44% would do so for less than $1,000, while some would sell their corporate credentials for less than $100, a recent survey shows. Some 27% of US respondents would sell work-related passwords, followed by Germany (20%), the UK and France (16%) and the Netherlands and Australia (12%). Most respondents who would sell thei...

USA offers $100,000 bounty for alleged Syrian Electronic Army members

The US Department of Justice believes it has identified three members of the notorious Syrian Electronic Army, who have in recent years made a name for themselves with their high profile hacks against media organisations, targeted spear-phishing attacks, and redirecting well-known websites to display propaganda in support of the Syrian Government and President Bashar al-Assad. In a press release, the US gov...

Half of IT professionals say their systems have been compromised in the last 24 months, survey shows

Some 44 percent of IT professionals said their endpoint systems have been compromised within the last 24 months, while 15 percent reported that they didn’t know how many threats were detected through proactive hunting, a recent survey shows. More than a quarter of respondents were notified of a breach by a third party. One in four employees surveyed admit they couldn’t acquire the information about unauthor...

Ten ways Twitter improved online security

A decade ago the world was Twitter-less – no Tweeted birthday greetings, Oscar selfies, real-time presidential announcements or calls for prayers. But neither did we have vile trolls and defacement Tweets on hacked accounts of public figures. Twitter changed the way 332 million active users communicate online. But it also fueled serious privacy debates, as every Tweet further dilutes the concept of online p...

Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Hackers are believed to be working with foreign governments to take down U.S. infrastructure or break into U.S. computer systems, according to a Cyber Command statement to the members of Congress. Adm. Michael S. Rogers, head of U.S. Cyber command, believes criminals groups are being used to conduct cybercriminal activities against the United States on behalf of foreign governments, allowing state-sponsors...

Malicious scripts spammed out to infect computers with ransomware

Although over 100,000 new malware variants may be discovered every day by security researchers, that doesn't mean that the criminals behind the attacks need to be equally inventive in their methods to infect users. In fact, truth be told, the methods used to compromise users' computers are often close to the same types of attacks that we saw twenty years ago. Why the lack of innovation? Because the existing...

Threat Intelligence Sharing Act Kick-Started by US Homeland Security

Following the US Cybersecurity Information Sharing Act of 2015 passed by Congress and signed by President Obama, the Department of Homeland Security started sharing threat intelligence with businesses. While companies can voluntarily adhere to the program and start sharing threat intelligence with the DHS, the program counts on the continuous cooperation of as many companies as possible. So far, six organiz...

FBI Warns of Vehicle Hacking

The US Federal Bureau of Investigation issued a warning about the vulnerability of “smart” cars to hacking attacks, stressing that manufacturers should carefully integrate new on-board systems that could allow attackers to remotely control critical vehicle functions. “Vehicle hacking occurs when someone with a computer seeks to gain unauthorized access to vehicle systems for the purposes of retrieving drive...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most prestigious independent testing labs in the world. And the latest awards from AV-Test and AV-Comparatives show once more that Bitdefender users enjoy the most advanced cyber-security in the world with unaffected computer performance...

iOS malware successfully infects non-jailbroken devices, researchers found

Palo Alto Networks researchers have revealed a new family of iOS malware that successfully infected non-jailbroken smartphones, named “AceDeceiver”. Image source: Flickr AceDeceiver manages to install itself without abusing enterprise certificates as some iOS malware has done over the past two years. AceDeceiver installs itself without any enterprise certificate, exploiting design flaws in Apple’s DRM mecha...

© 2012 Powered By Bitdefender

Scroll to top