Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Facebook patches serious login flaw found by Bitdefender vulnerability researcher

Have you tried creating a Facebook account under someone’s name and then use it to access his/her online accounts? Accounts you know that person manages on e-commerce or travel sit ...

The dark side of IoT lighting devices

The dark side of IoT lighting devices

Smart lighting IoT devices are prone to attacks that expose households and inhabitants to discomfort, but more importantly, mass surveillance, privacy exposure and data theft. Bitd ...

The IoT can unlock homes, new Bitdefender report shows

The IoT can unlock homes, new Bitdefender report shows

Four billion internet-connected devices promise to take our homes to an unprecedented level of comfort. But this new digital convenience takes its toll on private lives. As we have ...

Security Awards: Bitdefender users enjoy best protection, speed and performance

Security Awards: Bitdefender users enjoy best protection, speed and performance

Independent labs AV-Test and AV-Comparatives reward top security without slowdowns. There is no better validation for your internet security choice than the results of the most pre ...

Bitdefender Mobile Security Ready for Android 6

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” ...

Coding is gender neutral, says Bitdefender’s youngest woman programmer

Coding is gender neutral, says Bitdefender’s youngest woman programmer

The future is written in lines of code. Zero and ones. Simple, clear and definitely, not gender biased. So, where are all the women in white hats? Fueled by debates over whose code ...

Porn Clicker Malware Nesting in Google Play

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of reven ...

Criminals earn less than minimum wage when blasting websites off the internet

Want to knock a website off the internet for 48 hours? That will cost you a mere $173. source: Arbor Networks That's one of the surprising findings uncovered by a behind-the-scenes look into the DDoS-for-hire industry, conducted by Arbor Networks researcher Dennis Schwarz. Schwarz focused his attention on a Russian-language hacker called "Forceful", who rents out his "booter" services to anyone who is inter...

Twitter, Facebook may ban fake profiles to protect women

Twitter and Facebook could ban fake profiles to help prevent online abuse against women and girls, according to news reports. The UK Crown Prosecution Service said people who use fake social media accounts to harass and abuse others should be prosecuted. And, for the first time, the new laws would apply, to some extent, to children as well as adults. The initiative arose as social media has been increasingl...

Phishing surges, file-sharing takes lead as most targeted industry of Q1

Phishing through file-sharing services has soared in the past three months, making cloud-based file distribution services the most targeted sector of the first quarter of the year, Bitdefender found. Globally, file-sharing is being used to spread phishing scams more than the retail and payment industries, the traditional favorites of hackers. Almost one in five malicious URLs uses a file-sharing service to...

“Hack the Pentagon” Competition Aims to Boost US DoD Security

Pentagon officials recently announced a “Hack the Pentagon” competition aimed at vetted experts to help the U.S. Defense Department identify vulnerabilities in its websites and boost their security in the process. While such “bug bounty” programs are common for large companies, it’s rare that the Department of Defense asks private sector security experts – white hackers – to come forward in a competition-li...

Beware malicious invoices spammed out via email

It's been over 20 years since the first Word macro virus reared its ugly head and pulled the carpet from underneath the feet of computer users worldwide. Up until then, it was pretty easy to know what to look out for - executable files (normally .EXE or .COM) and floppy disk boot sectors. But macro viruses changed all that, infecting the templates inside Microsoft Office files - Word documents, Excel spread...

Apple’s call in the conflict with FBI: the company strengthens iCloud encryption to protect customers

Apple is developing a new strategy to enforce encryption of customers’ iCloud backups to avoid complying to future requests for data from authorities, according to trustworthy sources cited by the Financial Times. Image source: Pixabay The decision comes after the company announced las week it will oppose a court order to help the FBI unlock the iPhone of the San Bernardino shooter to avoid endangering the...

Angler Exploit Kit updated to target PCs and Macs with Silverlight attack

PC and Mac users are being advised to ensure that their computers are updated with the latest security patches, following the discovery that the notorious Angler exploit kit is taking advantage of a known vulnerability in Microsoft's Silverlight technology. Silverlight, Microsoft's attempt to rival Adobe Flash, is an application and browser plugin that allows PC and Mac users to watch online media content....

FTC Nails Asus for Failing Router Security

The Federal Trade Commission (FTC) and ASUSTeK Computer, Inc. have agreed to settle on beefing up home router security after critical flaws potentially affected hundreds of thousands of consumers. Hackers could have allegedly exploited security vulnerabilities in both Asus routers and built-in cloud services for complete access to both network devices and data. Illicit router remote logins would have allowe...

Users’ Selfies Will Secure Online Payments, MasterCard confirms

Global payments and technology company MasterCard has decided to use selfie photos and fingerprints to secure online payments and prevent fraud. The move comes after a pilot program launched in the US and Netherlands last June to help shoppers improve the security of their transactions by taking photos of themselves. The program focuses on biometric authentication, including methods such as facial identific...

Tax-related phishing scams and malware attacks have quadrupled, says IRS

The IRS says that the number of reports it has received of phishing and malware schemes targeting US consumers have rocketed this tax season - claiming that it has seen an "approximate 400 percent surge". Across the country official-looking communications are being received, claiming to come from the IRS and companies that develop accounts software and provide services for assisting in the preparation of ta...

© 2012 Powered By Bitdefender

Scroll to top