Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

USA offers $100,000 bounty for alleged Syrian Electronic Army members

The US Department of Justice believes it has identified three members of the notorious Syrian Electronic Army, who have in recent years made a name for themselves with their high profile hacks against media organisations, targeted spear-phishing attacks, and redirecting well-known websites to display propaganda in support of the Syrian Government and President Bashar al-Assad. In a press release, the US gov...

Half of IT professionals say their systems have been compromised in the last 24 months, survey shows

Some 44 percent of IT professionals said their endpoint systems have been compromised within the last 24 months, while 15 percent reported that they didn’t know how many threats were detected through proactive hunting, a recent survey shows. More than a quarter of respondents were notified of a breach by a third party. One in four employees surveyed admit they couldn’t acquire the information about unauthor...

Ten ways Twitter improved online security

A decade ago the world was Twitter-less – no Tweeted birthday greetings, Oscar selfies, real-time presidential announcements or calls for prayers. But neither did we have vile trolls and defacement Tweets on hacked accounts of public figures. Twitter changed the way 332 million active users communicate online. But it also fueled serious privacy debates, as every Tweet further dilutes the concept of online p...

Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Hackers are believed to be working with foreign governments to take down U.S. infrastructure or break into U.S. computer systems, according to a Cyber Command statement to the members of Congress. Adm. Michael S. Rogers, head of U.S. Cyber command, believes criminals groups are being used to conduct cybercriminal activities against the United States on behalf of foreign governments, allowing state-sponsors...

Malicious scripts spammed out to infect computers with ransomware

Although over 100,000 new malware variants may be discovered every day by security researchers, that doesn't mean that the criminals behind the attacks need to be equally inventive in their methods to infect users. In fact, truth be told, the methods used to compromise users' computers are often close to the same types of attacks that we saw twenty years ago. Why the lack of innovation? Because the existing...

Threat Intelligence Sharing Act Kick-Started by US Homeland Security

Following the US Cybersecurity Information Sharing Act of 2015 passed by Congress and signed by President Obama, the Department of Homeland Security started sharing threat intelligence with businesses. While companies can voluntarily adhere to the program and start sharing threat intelligence with the DHS, the program counts on the continuous cooperation of as many companies as possible. So far, six organiz...

FBI Warns of Vehicle Hacking

The US Federal Bureau of Investigation issued a warning about the vulnerability of “smart” cars to hacking attacks, stressing that manufacturers should carefully integrate new on-board systems that could allow attackers to remotely control critical vehicle functions. “Vehicle hacking occurs when someone with a computer seeks to gain unauthorized access to vehicle systems for the purposes of retrieving drive...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most prestigious independent testing labs in the world. And the latest awards from AV-Test and AV-Comparatives show once more that Bitdefender users enjoy the most advanced cyber-security in the world with unaffected computer performance...

iOS malware successfully infects non-jailbroken devices, researchers found

Palo Alto Networks researchers have revealed a new family of iOS malware that successfully infected non-jailbroken smartphones, named “AceDeceiver”. Image source: Flickr AceDeceiver manages to install itself without abusing enterprise certificates as some iOS malware has done over the past two years. AceDeceiver installs itself without any enterprise certificate, exploiting design flaws in Apple’s DRM mecha...

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” changes. Bitdefender Mobile Security has been updated to reflect the new visual standards – material design – and fall in line with the two new permission groups. However, we’ve also added some new features, such as Bitdefender Ce...

© 2012 Powered By Bitdefender

Scroll to top