Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Any phone can get hacked via a global cellular network vulnerability

A vulnerability in the Signaling System Seven (SS7) has been recently exploited to track location, snoop on messages and phone calls on any type of smartphone, researchers found. Karsten Nohl, a German hacker, demonstrated how, by leveraging the flaw, he was able to track all this personal information from an iPhone owned by US Congressman Ted Lieu. First, it's really creepy, and second, it makes me angry,"...

Hack the Pentagon, and you could win $150,000

Hackers are trying to break into The Pentagon. There's nothing unusual about that, of course. The difference this time is that The US Department of Defense is inviting hackers to find security vulnerabilities in some of its public websites, and is offering bounty payments of up to $150,000 for those who discover flaws. There are, of course, some rules about the "Hack the Pentagon" bug bounty program, as the...

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitdefender researchers analyzed the LIFX bulb – a successful crowdfunding project started in September 2012 - and found it vulnerable to traffic interception. Coincidentally, the LIFX product has been subjected to a hacking experimen...

Five security takeaways from the Panama Papers breach

By now, you’ve probably heard about the monster story of the moment – Panama Papers. The security breach hit a Panama-based law firm that helps companies hide money in offshore jurisdictions. When a trove of leaked documents revealing the real wealth of tycoons and world leaders was publicly disclosed, it started an unprecedented scandal over tax havens, one that even threatens to derail several governments...

Snowden predicts massive attacks on iPhones after FBI hacked the 5C

Edward Snowden, the former NSA contractor turned whistleblower, says the unlocking procedure used by the FBI to break into the iPhone 5c involved in the attack in San Bernardino will result in new attacks on iPhones by the end of the year. Image source: Wikipedia “FBI's refusal to close security holes found during iPhone hack will result in attack being globally available by year's end,” Snowden wrote on hi...

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have seen in the early stages of IoT development, gadgets designed for our home can talk with each other, yet they risk being overheard when communicating sensitive data. Bitdefender believes the IoT can reach its full potential only...

Uber forfeited data on 12 million drivers and riders to US authorities in H2 2015

Uber received 33 law enforcement requests in the last six months of 2015 involving data for more than 12 million drivers and riders, according to a company report. “The document shows that we comply with the majority of law enforcement requests, while ensuring they go through the proper legal process”, the company says. “We might be asked to share the precise GPS coordinates of the pickup and drop-off locat...

Now all WordPress.com sites can benefit from HTTPS encryption

There is some great news for those who believe in a more secure and more private web. WordPress, the world's most popular blogging platform, has announced that all of the millions of users hosting their sites on the wordpress.com servers, will be able to force the use of HTTPS encryption - for free. HTTPS, usually denoted by the little green padlock in your web browser's URL bar, can help you feel more conf...

Only Four in 10 US Adults Trust Governments to Handle Personal Biometric Data

Some 42 percent of US adults in a recent survey said they trust governments to handle their biometric data. Image source: Pixabay Organizations that consumers view as traditionally handling sensitive information, or those that serve important life functions such as hospitals and banks, are the most trusted, at 64 percent. A third of consumers are neutral on using these technologies due to a lack of understa...

WhatsApp implements full end-to-end encryption (finally)

Have you opened your WhatsApp app recently? If you see a pop-up that reads “messages you send to this chat and calls are now secured with end-to-end encryption,” your messages are more private than ever! It means your messages are immune to snooping and can’t be intercepted by hackers, governments or any other prying eyes. Not even WhatsApp itself. From now on when you and your contacts use the latest versi...

© 2012 Powered By Bitdefender

Scroll to top