Facebook Tag Scams are Back with Malicious Payload

Facebook Tag Scams are Back with Malicious Payload

Bad week-end for Facebook users: a malicious tagging campaign ended up infecting at least 5 thousand computer users with a backdoor. This three-day campaign has been actively mirro ...

Win a MacBook Air with Bitdefender #hugamac

Win a MacBook Air with Bitdefender #hugamac

Here’s your chance to win a brand new 13” MacBook Air by just posting a selfie with your current Mac, followed by the hashtag #hugamac. You can use Facebook, Twitter, and even Inst ...

Hottest Snapchats – Another Early 2015 Facebook Scam!

Hottest Snapchats – Another Early 2015 Facebook Scam!

A spam campaign revealing the 10 “hottest snapchats” is a new entry to the long list of Facebook scams flooding the social media platform in 2015, according to Bitdefender Online T ...

Bitdefender’s Pick. Celebrating Asimov, the writer who focused on AI and coined the term ‘robotics’

Bitdefender’s Pick. Celebrating Asimov, the writer who focused on AI and coined the term ‘robotics’

What is Bitdefender's Pick? The enlightened minds of mathematicians, cryptographers, engineers, physicists, inventors and others have shaped the computer and the Internet into what ...

Top 10 Data Breaches of 2014; Lessons Learned for a Safer 2015

Top 10 Data Breaches of 2014; Lessons Learned for a Safer 2015

2014 was a memorable year for large-scale cybersecurity breaches. Target started the year on the wrong foot, exposing 110 million people’s personal information. Then, Sony Pictures ...

Top 5 Social Media Security Predictions of 2015

Top 5 Social Media Security Predictions of 2015

Mobile ransomware, targeted job fraud, and Trojans lurking behind shocking videos are all expected to make their appearance on social media in 2015, security software solutions pro ...

Stalkers, Nude Photos and Beheadings: Top Facebook Scams and Malware Attacks in 2014

Stalkers, Nude Photos and Beheadings: Top Facebook Scams and Malware Attacks in 2014

Millions of people fell for Facebook scams in 2014. They lost money, reputation and even their jobs after simply clicking on the wrong social media link. Though security experts, c ...

What Is End-to-End Encryption? Why Should You Care

It seems everyone is into end-to-end encryption these days. WhatsApp, Google or Dropbox. But what exactly is it? More than a cool catch phrase of the post-Snowden era, end-to-end encryption is considered the remedy to most e-privacy issues out there. Let’s take an in-depth look to understand the concept better. First of all, encryption is a way of converting all electronic data (files, passwords, images) in...

Over 30 Vulnerabilities Exposed in Google App Engine

Over 30 vulnerabilities that allow hackers to bypass critical security sandbox defenses were discovered in Google App Engine (GAE), according to The Hacker News. Security Explorations researchers identified the series of flaws in the Java environment of Google’s Platform as a Service. Attackers can exploit the vulnerabilities to achieve a complete Java VM security sandbox escape, as well as to execute arbit...

Hackers Can Attack Social Logins to Impersonate Users, IBM Study Shows

Cyber-criminals can exploit social logins, such as the “Sign In With Facebook/LinkedIn/etc” buttons, to hijack accounts and impersonate users through a technique dubbed SpoofedMe, according to IBM research. To run the attack, hackers register a spoofed account at a vulnerable identity provider using the victim’s email address. Cyber-criminals can then post misleading information and even malware on victims’...

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

We hate to sound gloomy before the holidays, but Christmas not only brings joy and presents. It comes with increasing cyber-crime activity as well, as Hacker Grinch prepares new scams and online attacks. Identity fraudsters claimed a new victim every two seconds in 2013, and the number of identity fraud victims rose to 13.1 million, according to Javelin Strategy & Research. These figures only express fr...

Twitter Makes Reporting Abusive Tweets Easier

Twitter will improve its reporting process to help users block inappropriate content, the company announced in a blog post. Changes include under-the-hood improvements to the tools used to review reported Tweets and accounts. “Everything that happens in the world, happens on Twitter – to the tune of more than 500 million Tweets every day. That can sometimes include content that violates our rules around har...

Europol Closes 292 Domain Names Selling Counterfeit Goods

Authorities seized 292 domain names for illegally selling counterfeit merchandise online, according to an Europol news release. Europol collaborated with 25 law enforcement agencies and partners from 19 countries to closethe sites in a two-year operation dubbed 'In Our Sites (IOS) Transatlantic V. Most sold counterfeit products including traditional luxury goods as well as sportswear, electronics, pharmaceu...

UGG Fans Targeted with Black Friday Phishing Campaign

Spammers are using the name of popular Australian boot maker UGG to trick thousands of people into giving away personal information on bogus retail sites, Bitdefender warns. The antivirus provider has spotted a seasonal spam campaign luring people to fake retail websites with offers of huge discounts and attractive imagery. Hoping to refresh their e-mail address databases, spammers have crafted email subjec...

Bitdefender’s Pick. Computer Security Day Recalls Infamous Virus to Caution Users

What is Bitdefender's Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We also keep our eyes peeled for new gadgets, innovative technologies and geeky events. You'll simply love our pick!  [divide] Have you changed your passwords lately? How about creating that backup you’ve been putting off? Computer Security Day on November 30 i...

Weather Channel Web Site Vulnerable to Reflected Cross-Site Scripting (XSS)

Popular Weather Channel web site (Weather.com) has been found to be vulnerable to a reflected Cross-Site Scripting flaw, according to researcher Wang Jing's research. The Weather Channel is the most common US-based cable and satellite TV channel with close to 100 million subscribers. Its Alexa global rank is 143 and US rank is 35. "If The Weather Channel's users were exploited, their Identity may be stolen,...

PoS Malware Hits Vending Machines and Electronic Kiosks

A new sophisticated backdoor dubbed d4re|dev1| is infecting ticket vending machines used by mass transportation systems and electronic kiosks found in public areas, according to cyber-security researchers. In August, hackers allegedly compromised a machine in Italy through its Virtual Network Computer software. They used brute-force attacks to discover weak admin credentials. “These kiosks and ticket machin...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top