PC MAG Editor’s Choice for all three Bitdefender Windows solutions

PC MAG Editor’s Choice for all three Bitdefender Windows solutions

You will be pleased to know that Antivirus Plus, Internet Security and Total Security have received PC MAG’s highest praise. Editor’s Choice is yet another confirmation that our pr ...

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Kodi Media Center Vulnerability Exposes Users to Man-in-the-Middle Attacks

Home media player software Kodi (formerly known as XBMC) has been found vulnerable to man-in-the-middle attacks that may jeopardize the security of home users, according to Bitdefe ...

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

New Facebook Tag Scam Installs Fake Security Add-on, Bitdefender Warns

Facebook tag scams have re-emerged, Bitdefender warns. Today's scam starts with an attractive video capture posted on users' Walls. Twenty of the victims' Facebook friends are tagg ...

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Meet The Best European Corporate Security Blog! Yes, we’re talking about HotForSecurity!

Remember we told you we were nominated at this year’s European Security Blogger Awards, in London? We’re even happier to let you know that… WE WON!!! We’re thrilled to have receive ...

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

New Wave of Android Ransomware Lurks Behind FBI Porn Warning, Bitdefender Warns

Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware demanding 500$ to restore access to their sm ...

Machine Learning Technologies Make the Internet More Secure

Machine Learning Technologies Make the Internet More Secure

Asimov’s positronic brain may still be just literature for now, but artificial intelligence is already making the difference in computer security technologies. Bitdefender 2015, cr ...

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

Cryptowall Makes a Comeback Via Malicious Help Files (CHM)

A new spam wave has hit hundreds of mailboxes with malicious .chm attachments to spread the infamous Cryptowall ransomware, malware researchers from Bitdefender Labs found. Interes ...

7 Most Used Exploits In The Wild, According to Bitdefender

Heartbleed, Shellshock and Poodle gave the world a sudden shock in 2014 - their severity and widespread effect left hundreds of millions of users uncertain of their safety.  But do cyberattacks really strike out of the blue? The past few years have been marked by the emergence of exploit kits. These tools are usually hosted on compromised servers and served like regular web pages. Once the user lands on one...

Hacker’s List leaks its secrets, revealing true identities of those wanting to hack

Is there something you want hacked? I get emails all the time from complete strangers, asking if I can help them hack into someone's Facebook or email account. Sometimes they claim to be family members who are worried that their loved one has gone missing and not replying to messages, but more often they're suspicious that their partners are cheating on them behind their back and want to read their private...

Hola VPN Allegedly Used in DDoS Against 4Chan

Popular VPN service Hola has been used to disrupt the operations of 4Chan, according to reports. To help users access any site from around the world by hiding their IP address, Hola’s VPN service uses the Luminati network. Luminati is an anonymity network similar to Tor. Based on a peer-to-peer network, it routes users’ requests through other Luminati users acting as exit nodes. It seems Luminati was used a...

Best Security News? Yes, You’re in the Right Place

If you’ve landed on this page, then you must like us, right?  Then, please vote for us at EU Security Blogger Awards 2015! We’re happy to have been nominated, once again, at the European Security Blogger Awards 2015, held in London, June 3rd 2015. HotForSecurity is competing against top security blogs in three major categories: Best European Corporate Security Blog Grand Prix Prize for the Best Overall Secu...

Vile troll uses Twitter ads to urge transgender people to commit suicide

We all know there's some fairly horrible stuff that goes on on social networks. Sadly many have used the detachment of sites like Facebook and Twitter to say hateful things that they would never be brave enough to say to another living person's face. But a Twitter troll went one step further yesterday, not only describing transgender people as "deformed freaks" who should kill themselves, but using the paid...

Money or Data? The Ultimate Guide to Understanding Ransomware – Part I

Not long ago, a man committed suicide after an automatically generated notice from a computer virus threatened him with jail unless he paid a ransom thousands of dollars. The year was 2014. As incredible as the story seems, it marked the first known time a computer virus actually killed somebody. The next generations stole cash from users around the globe, and Cryptolocker raised the stakes - holding data o...

How the Washington Post was hijacked by the Syrian Electronic Army (again)

The Syrian Electronic Army appears to have successfully scalped another high profile media outlet, briefly hijacking the mobile version of the Washington Post website to display pop-up messages claiming that the media is not telling the truth. For a period of approximately 30 minutes, visitors to m.washingtonpost.com found they were greeted not by the latest news, but by alert boxes saying: "You've been hac...

The Trouble with Installing Unofficial Browser Extensions

Google has extended its ban on unofficial Google Chrome extensions. This means developers and Mac users will have to install extensions from the official Chrome Web Store, according to recent news reports. The initiative, launched a year ago, aimed to eradicate malicious browser extensions that ruined users’ browsing experience by slowing the system down, injecting adware or silently tracking browsing activ...

Google, Microsoft and Mastercard Sign Anti-Piracy Agreement with Danish ISPS

A coalition including Google, Mastercard, Microsoft and anti-piracy organization Right Alliance was formed to tackle the issue of online infringement, according to news reports. Their memorandum of understanding, or ‘Code to Promote Lawful Behavior on the Internet,’ has five key objectives: To help make the Internet a safe and legal platform for consumers and businesses. To stress that copyright is an impor...

Photofucket, the tool that lets hackers steal Photobucket pictures. Creators arrested

Are you still storing your private photographs and videos on the internet? How much trust are you putting in online companies to keep unauthorised eyes from seeing your personal snapshots and intimate home movies? It's a question that keeps arising, and is again this week following news that two men have been arrested for allegedly creating. marketing and selling a tool designed to allow unauthorised access...

© 2012 Powered By Bitdefender

Scroll to top