Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

Bitdefender BOX unveiled its breakthrough security features at Pepcom NY

The Internet of Things (IoT) or Internet of Threats, as we often call it, has been labeled "the next Industrial Revolution" by journalists because of the way it will change the way ...

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Top 5 Wi-Fi Hotspot Locations to Avoid on Your Holiday

Whenever you go on holiday, you end up taking all your personal data. The information on your personal phone, laptop or other smart device is at more risk of being compromised or s ...

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

Grand Prix Prize for the Best Overall Security Blog goes to HotForSecurity!

It happened! Last night, this blog received the Grand Prix Prize for the Best Overall Security Blog at the European Security Blogger Awards in London! An award we are happy to shar ...

Smart switch may turn off your Wi-Fi for good

Smart switch may turn off your Wi-Fi for good

You might be risking your privacy, and even physical security, if you use a next-generation switch to control appliances in your home. Image source: Flickr In analyzing several IoT ...

Easy Tips to Dodge E-banking Fraud

Easy Tips to Dodge E-banking Fraud

What is Bitdefender’s Pick? We might be a security company, but our interests spin way beyond creating virus signatures and identifying new malware. We keep our eyes peeled for new ...

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Malicious Proxy Redirects SSL Google Traffic for 1 Million IPs

Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco ...

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android Malware Promises Porn, but Roots Device and Installs Other Malware

Android malware is not unusual; we’ve even seen it pop up in Google’s Marketplace app on several occasions. Increasing in both sophistication and stealthiest, Android malware has m ...

Instagram Vulnerability Lands $10,000 Bounty for 10-Year-Old

Facebook-owned Instagram was deemed vulnerable by 10-year-old Jani from Helsinki, who revealed that he could delete comments and descriptions on any Instagram account. The vulnerability enabled Jani to insert malicious code into the comment section of Instagram, effectively allowing him to delete anything – even profiles – with no authorization from the targeted account. “I tested if Instagram can withstand...

How will cybersecurity look like in 2020? Five threat scenarios

Researchers from UC Berkeley’s School of Information tried to answer this immensely challenging question in their most recent report, Cybersecurity Futures 2020. The paper explores how technology and security will be transformed in the uncertain and not-so-distant future. Briefly, here are five scenarios the researchers have envisioned for the next four years - to be taken with a pinch of salt, they say. Th...

Spammed-out malware campaign contains offensive hidden message for anti-virus CEO

There is no love lost between the people who write malware and the anti-virus companies who work hard to protect innocent users against them. And occasionally that animosity spills out into the actual malicious code written by online criminals. Sometimes it might present itself in the form of code to attempt to avoid detection by a particular product, or techniques to avoid analysis in malware labs. But som...

Companies fear zero day and denial of service attacks most

Zero-day attacks are the most serious type of incidents and compromises for companies, according to 71 percent of respondents in a recent survey. DDoS was second, mentioned by 68 percent of respondents. Most respondents also say the consequences of an exploit of an existing software vulnerability greater than 3 months old (53 percent) and ransomware (51 percent) can be severe. Companies still struggle to ha...

IoT security spending to reach $348 million this year

The IoT security budget will rise 23.7 percent to $348 million in 2016 and reach $547 million by 2018, according to a new Gartner report. As more people become interested in connected cars, as well as spending on industry-grade equipment that requires proper security, the IoT security market will grow exponentially. "The market for IoT security products is currently small but it is growing as both consumers...

7 million Minecraft Pocket Edition players put at risk after Lifeboat hack

Over seven million members of the independent Minecraft "Lifeboat" community have had their security and privacy put at risk after hackers breached servers and stole usernames, email addresses and MD5-hashed passwords.7 million Minecraft Pocket Edition players put at risk after Lifeboat hack Over seven million members of the independent Minecraft "Lifeboat" community have had their security and privacy put...

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sites, so you could book a flight or order a smart TV on her behalf? Ionut Cernica did exactly that. He helped Facebook patch a serious login vulnerability that allowed rogue users to access online accounts via Facebook’s social logi...

Careless employees remain the biggest security threat in 2016, study shows

Negligent or careless employees who don’t follow security policies are the biggest threat to endpoint security in organizations, according to a recent survey. Eighty-one percent of respondents say the biggest challenge is minimizing the threat of negligent or careless employees, from 78 percent in 2015. Since 2013, the percentage of respondents who say threats caused by malware infections that are stealthie...

Details on 87 Million Mexican Voters Available Online

The addresses of 87 million Mexican voters were recently accessible online to anyone with an internet connection -- all without authentication or protection by security mechanisms. Texan whistleblower Chris Vickery informed Mexican authorities of his findings, stating that the information could be used by criminals. While the information was available via AWS (Amazon Web Services), the company’s website doe...

Stolen usernames and passwords still cause almost a quarter of all data breaches

Companies and consumers alike love "the cloud". But the same security mistakes appear to be helping hackers steal data from cloud-based systems time and time again. And it's against that gloomy backdrop that a new report by the Cloud Security Alliance, "Identity Solutions: Security Beyond the Perimeter", makes a worthwhile read. According to surveys detailed in the Centrify-sponsored report, 22% of responde...

© 2012 Powered By Bitdefender

Scroll to top