How do you play your part for a better Internet?

How do you play your part for a better Internet?

The Internet is an astonishingly resourceful place - unlimited information on almost any subject in the world is at our fingertips. We use it to document our writings, chat with fr ...

Data Privacy Day: Reminding Us of Data Protection

Data Privacy Day: Reminding Us of Data Protection

Every year on January 28th we are reminded of the importance of our personal data and how it could be misused against us. More than 47 European countries along with United States a ...

Beware, Facebook Scam Shares Porn on Your Groups!

Beware, Facebook Scam Shares Porn on Your Groups!

A new Facebook tag scam is spreading pornographic content in Facebook groups, Bitdefender warns. We came across an evolved version of the known Facebook tag scam that manages to in ...

In 2016, growing IoT comes with new opportunities — and new threats

In 2016, growing IoT comes with new opportunities — and new threats

The Internet of Things is becoming a bigger part of consumers’ daily lives, thanks in large part to smart phones with larger screens that people use to control smart devices, accor ...

Ten facts you might not know about Linux

Ten facts you might not know about Linux

Today is Linus Torvalds’ 46th birthday! He is the inventor and lead developer of Linux kernel, the core of the operating system we all know and use today under various shapes and s ...

Tech trends: what to expect in 2016

Tech trends: what to expect in 2016

‘Cyber-security’, ’encryption’, ‘the Cloud’ and ‘machine learning’ have been among the buzzwords of 2015. We expect them to be at least as trendy next year, with technology compani ...

Biggest cyber-security events of 2015; lessons learned for a safer 2016

Biggest cyber-security events of 2015; lessons learned for a safer 2016

2 million compromised records 38% increase in security incidents First hacked smart car First ransomware for Linux Launch of Windows 10 and privacy concerns 14 million US governmen ...

Hacker Demands $3 million Ransom for Keeping the Lid on Stolen UAE Bank Customer Information

"Hacker Buba" allegedly hacked into UAE Invest Bank and threatened to expose banking information of thousands of customers unless he was paid a ransom of $3 million for his silence. According to stolen information posted via various Twitter handles, some dumped accounts contained up to $12 million, all of them potentially amounting to more than $110 million. Although the hacker also directly contacted some...

656,723 reasons to regret going to Wetherspoon’s

JD Wetherspoon is a highly popular British chain of pubs, famous for its cheap booze, Thursday curry club and lack of pretension. It's far from everyone's cup of tea, of course, and now over 650,000 people who gave the firm their names, email addresses, dates of birth and phone numbers have a good reason to regret their drinking spot. Because the company has just announced that hackers have accessed a copy...

How to stop Internet-connected toys from spying on kids

These days, children are encouraged to surf the web and use mobile apps from a young age. We’re seeing toddlers trading toy cars and Barbies for tablets and mobile devices. In fact, 7 per cent of kids under the age of 4 play with their tablets and watch their favorite TV programs on them before bed, a study reveals. Barbie isn’t what she used to be either. Mattel created a smart A.I.-wired Barbie that talks...

Criminal syndicates constitute main source of cyberattack on companies in 2015, survey shows

The most likely sources of cyber attacks on companies in 2015 were criminal syndicates (59%), employees (56%) and hacktivists (54%), according to a survey by accountancy firm EY. Last year’s results showed 53% felt criminal syndicates were a major threat. “Cyber criminals can spend months inside organizations, finding information that they will store for a future attack or piecing information together that...

Booking a hotel this holiday season? Beware of credit-card malware targeting hotels!

Winter holidays are the perfect excuse to take your family to a nice ski resort. But take caution: cybercriminals are busy infiltrating hotel payment systems and covertly scraping credit card information from unsuspecting guests. Hotel group Hilton is the latest victim in a line of hotels and resorts that have found their systems compromised by point-of-sale malware. Hilton Worldwide has identified and take...

VTech toymaker hacked – millions of families have their personal info exposed

VTech, a leading maker of electronic learning toys, has suffered a serious security breach, with hackers accessing a database containing information about customers and their children. As a result, data including users' email addresses, home addresses, security questions and answers, children's names and dates of birth, and easily-reversible passwords have been accessed. An article on Motherboard explains,...

Computer Security Day: experts urge protection against ransomware

If you needed a special day to remind you to regularly change your passwords and to protect your devices with a reliable security solution, you got it: November 30th is Computer Security Day. With the rise of ever more sophisticated threats such as ransomware, cybersecurity experts have to come up with innovative solutions to keep personal data safe. Nowadays we store most or all of our sensitive personal d...

Identify who is behind DDoS blackmail plot, and earn yourself a Bitcoin bounty

Twenty-or-so years ago, Mel Gibson starred in the movie "Ransom". It was a fun bit of hokum, where he told the people who kidnapped his son that he wouldn't pay them the $2 million ransom they demanded, but instead offered a bounty for anyone who could catch the kidnappers - dead or alive. https://www.youtube.com/watch?v=haThIxPnYro Such fun! Of course, that would never happen in real life, right? Right? Ho...

4.1 million web hosts are exposing HTTPS and SSH traffic

Some 9% of all HTTPS web hosts and more than 6% of all SSH hosts on the web are vulnerable to private key attacks, according to a Sec Consult blog post. The researchers analyzed cryptographic keys found in the firmware of more than 4,000 connected devices from more than 70 vendors. By correlating data with information from internet-wide scan tools – Scans.io and Censys.io – they’ve uncovered 580 actively-us...

Credit card-stealing malware hits 54 Starwood hotels

Hackers have managed to steal the credit and debit card details of customers who made purchases at 54 North American Starwood-run hotels, after infecting point of sale systems with malware. In a statement, the company warned that payment card information - including cardholder names, payment card numbers, security codes and expiration dates - were taken from customers who shopped at restaurants, gift shops...

© 2012 Powered By Bitdefender

Scroll to top