Data Privacy Day: Reminding Us of Data Protection

Data Privacy Day: Reminding Us of Data Protection

Every year on January 28th we are reminded of the importance of our personal data and how it could be misused against us. More than 47 European countries along with United States a ...

Beware, Facebook Scam Shares Porn on Your Groups!

Beware, Facebook Scam Shares Porn on Your Groups!

A new Facebook tag scam is spreading pornographic content in Facebook groups, Bitdefender warns. We came across an evolved version of the known Facebook tag scam that manages to in ...

In 2016, growing IoT comes with new opportunities — and new threats

In 2016, growing IoT comes with new opportunities — and new threats

The Internet of Things is becoming a bigger part of consumers’ daily lives, thanks in large part to smart phones with larger screens that people use to control smart devices, accor ...

Ten facts you might not know about Linux

Ten facts you might not know about Linux

Today is Linus Torvalds’ 46th birthday! He is the inventor and lead developer of Linux kernel, the core of the operating system we all know and use today under various shapes and s ...

Tech trends: what to expect in 2016

Tech trends: what to expect in 2016

‘Cyber-security’, ’encryption’, ‘the Cloud’ and ‘machine learning’ have been among the buzzwords of 2015. We expect them to be at least as trendy next year, with technology compani ...

Biggest cyber-security events of 2015; lessons learned for a safer 2016

Biggest cyber-security events of 2015; lessons learned for a safer 2016

2 million compromised records 38% increase in security incidents First hacked smart car First ransomware for Linux Launch of Windows 10 and privacy concerns 14 million US governmen ...

CryptoWall 4.0 returns to the wild, posing as good guy

CryptoWall 4.0 returns to the wild, posing as good guy

The infamous CryptoWall ransomware family is back, encrypting files under the false pretenses of testing AV solutions for their’ “suitability” to protect data. “CryptoWall Project ...

Biggest cyber-security events of 2015; lessons learned for a safer 2016

2 million compromised records 38% increase in security incidents First hacked smart car First ransomware for Linux Launch of Windows 10 and privacy concerns 14 million US government employees exposed An embarrassing celebrity iCloud hack New strains of Android ransomware These facts and numbers define 2015 in terms of cyber-security. It’s time to draw the line and review the most remarkable events of 2015 t...

77,000 Steam accounts are hacked and raided every month

Valve, the developers of the Steam online gaming platform, says that its members are facing a serious problem. Accounts have always been hijacked on the gaming site, by hackers who have stolen passwords, but now the problem is said to have risen twenty-fold, with some 77,000 Steam accounts hacked every month. Steam accounts are hijacked when a hacker manages to break into an account without the owner's perm...

Watch out for malware disguised as unpaid invoices!

Once again email users are being warned to be wary of unsolicited attachments arriving in their inboxes after online criminals spammed out a malware campaign designed to infect recipient's computers. The emails pose as unpaid invoices, using a wide range of senders' names and reference numbers. Here is an example: Dear Customer Your invoice appears below. Please remit payment at your earliest convenience. T...

Consumers in Developed Markets Will Own up to Four Devices Each by 2018, Gartner says

The average consumer in a mature market will own and use more than three personal devices by 2018, according to a recent report by Gartner. The advisory company estimates that the installed base of devices will total 7.8 billion units (including wearables, phones, tablets and PCs) in 2016 and is on pace to reach 8.3 billion units in 2018. During the next five years, consumers will add more devices to their...

Oh, joy! Bitdefender Coding Expert Shares Tips for Hour of Code

Nowadays, coding is a highly valued skill. More and more kids are learning to decipher zeros and ones from an early age, benefiting from smart toys created to educate them. But one of the most remarkable global initiatives to date is the Hour of Code. To support this event, we thought we’d ask one of our coding gurus for some valuable tips on how to get started. Introducing Cristian Amarie, Bitdefender lead...

US consumers’ needs to boost IoT products: Most want app-controlled locks, doors, lightning

Some 60 percent of Americans think it would be "cool" to have an app that controls locks and doors, followed by lighting (51 percent), heating and cooling (49 percent), and a surveillance or security camera (42 percent), according to a survey by Honeywell. Image source: Flickr Americans, on average, believe that nearly half (44 percent) of all of the items in their homes will be connected by 2025. This is m...

Hacker Demands $3 million Ransom for Keeping the Lid on Stolen UAE Bank Customer Information

"Hacker Buba" allegedly hacked into UAE Invest Bank and threatened to expose banking information of thousands of customers unless he was paid a ransom of $3 million for his silence. According to stolen information posted via various Twitter handles, some dumped accounts contained up to $12 million, all of them potentially amounting to more than $110 million. Although the hacker also directly contacted some...

656,723 reasons to regret going to Wetherspoon’s

JD Wetherspoon is a highly popular British chain of pubs, famous for its cheap booze, Thursday curry club and lack of pretension. It's far from everyone's cup of tea, of course, and now over 650,000 people who gave the firm their names, email addresses, dates of birth and phone numbers have a good reason to regret their drinking spot. Because the company has just announced that hackers have accessed a copy...

How to stop Internet-connected toys from spying on kids

These days, children are encouraged to surf the web and use mobile apps from a young age. We’re seeing toddlers trading toy cars and Barbies for tablets and mobile devices. In fact, 7 per cent of kids under the age of 4 play with their tablets and watch their favorite TV programs on them before bed, a study reveals. Barbie isn’t what she used to be either. Mattel created a smart A.I.-wired Barbie that talks...

Criminal syndicates constitute main source of cyberattack on companies in 2015, survey shows

The most likely sources of cyber attacks on companies in 2015 were criminal syndicates (59%), employees (56%) and hacktivists (54%), according to a survey by accountancy firm EY. Last year’s results showed 53% felt criminal syndicates were a major threat. “Cyber criminals can spend months inside organizations, finding information that they will store for a future attack or piecing information together that...

© 2012 Powered By Bitdefender

Scroll to top