-
What Is Scareware and How Do You Beat It?
Almost every internet user has had at least one run-in with scareware, one of the most lucrative forms of malware. A telltale sign of scareware is a sudden frightening prompt claiming a virus has been detected. Knowing this and other signs can prevent you from getting scammed. Read the full article below:
-
Techradar names Bitdefender the best Mac antivirus software for 2022
The common misconception is that Apple products are completely impenetrable, which means there's no point in getting antivirus for Mac. That isn't exactly true, however. Looking for the best protection for your your Mac and MacBook? Look no further, as Bitdefender Antivirus for Mac emerged once again as a leading contender…
-
The importance of secure passwords can’t be emphasized enough
Cybercriminals typically rely on weak passwords to break into online accounts of unsuspecting victims, which often leads to severe consequences. But despite understanding the importance of strong passwords as a critical security best practice, for most users the ease of memorizing only a few passwords and reusing them…
-
Spam and Untrusted URLs Are Driving Most Threats on Android, Bitdefender Research Finds
When it comes to attack vectors on the Android platform, spam and untrusted URLs dominate. Attackers overwhelmingly prefer them because they're easy to deploy and generate, not to mention cheap. Read the full article below:
-
Another great review for Bitdefender Mobile Security
Bitdefender Mobile Security remains the best overall choice for securing your Android devices:
-
Can I accept this? I blocked it so far.
The installer.exe application attempted to connect to the Internet: File path: C:\Windows\Temp\RarSFX0\packages\installer.exe Destination: 2606:4700:4400:0000:0000:0000:AC40:9BBC/0 Protocol: TCP Port: HTTP Bitdefender Firewall has denied access to this application based on user request. If you want to allow access, click…
-
What Cyber Threats Do Mac Users Face in 2022?
It’s no lie that Apple customers have something of a protective veil versus Windows users. But a misconception lies at the center of this argument. It’s not that Macs are inherently more secure against cyber threats. Rather, it’s that bad actors concentrate more on targeting the much larger, more-fruitful Windows…
-
Celebrating 30+ years of the World Wide Web; Easy tips for safely exploring the web
August 1 is World Wide Web Day, a time dedicated to celebrating the revolutionary technology created by Tim Berners-Lee in 1989 while working at the CERN in Geneva. As avid cybersecurity promoters and proud defenders against new and existing digital threats, we’re kicking off the celebratory event with easy tips on how to…
-
How to Dodge the Wave of Crypto Scams
Crypto scams are steadily becoming the new standard for online fraud. An increasing number of cybercrooks target assets such as cryptocurrency, utility tokens, non-fungible tokens (NFTs) and even entire crypto wallets. Read the full article below:
-
Celebrating Six Years of Partnership Fighting Ransomware
Ransomware has become a serious global problem in recent years, disrupting business, destroying large volumes of important data and inflicting heavy financial costs. Home users and businesses alike have been forced to re-calibrate defenses, plan for the worst, and scramble for recovery mechanisms when disaster strikes.…
-
Anti-Russian denial-of-service app actually infects pro-Ukrainian activists
An app which purported to launch distributed denial-of-service (DDoS) attacks against the internet infrastructure of Russia, was in reality secretly installing malware on to the devices of pro-Ukrainian activists. As researchers at Google's Threat Analysis Group (TAG) describe, the Moscow-backed Turla hacking group created…
-
Techradar names Total Security best for all round security with firewall protection
Trojans could open up ports on user PCs to secretly send data, and sniffers could look for vulnerabilities in your network connection that would allow it to be exploited. Even though developments in antivirus and malware technology have improved significantly over that time, the best firewall services remain a recommended…
-
Essential tips and tricks to protect against scams and fraud on Amazon Prime Day
Amazon Prime Day 2022 is here. This two-day shopping event exclusively designed for Amazon Prime members offers shoppers a chance to save big on gadgets and tech for their home, office and more. The mid-year shopping event is available in many countries and attracts millions of consumers with Black Friday-style deals. The…
-
PCMAG names Bitdefender one of the Best Identity Theft Protection Software for 2022
Here's what PCMAG has to say about our new Identity Theft Protection service and the Ultimate Security suite: "Bitdefender Total Security is our Editors’ Choice winner for feature-rich security mega-suite; Bitdefender Ultimate Security adds comprehensive identity theft protection, as well as Bitdefender’s password manager…
-
Marriott Hacked Again; Attackers Steal 20GB of Data
Hotel chain Marriott has suffered yet another embarrassing breach at the hands of organized hackers who say the lodging giant has very poor cyber defenses. Over the past few years, Marriot has suffered several major breaches, some resulting in hundreds of millions of stolen customer records, lawsuits, and millions in…
-
How MDR Services Can Help Vulnerable Healthcare Organizations
Healthcare organizations have not had the best couple of years when it comes to cybersecurity. 2015 was considered the year of the healthcare breach. Blue Cross Blue Shield, Anthem, and over a dozen more healthcare providers were hacked, resulting in over 100M records leaked. Yet the risk of cybersecurity compromise has…
-
Bitdefender Consumer Threat Landscape Report reveals Top 5 Windows Threats
Of the many threats we’ve seen targeting Windows systems last year, five key categories have remained in place: Trojans, PUA’s, Exploits, Miners and Ransomware. The vast majority of threats detected on Windows platforms in 2021 were trojans, with a 50% share, including specific families like Trickbot, Emoted, Dridex,…
-
Street thugs are forcing victims to unlock phones so they can look for crypto wallets
A tech reporter for the Times had a rather nasty encounter recently and has some unsettling news for anyone relying exclusively on their phone. You can find the article in the link below.
-
Spammers advertise dating platforms to meet Ukrainian women amid crisis
Our colleagues from Bitdefender Labs have picked up an active spam campaign that has been targeting internet users with a mixed bag of online dating opportunities such as mail order bride services and dating platforms where single western men can meet Ukrainian women. Despite the ongoing conflict on Ukrainian soil, many…
-
Flagstar Bank notifies 1.5 million customers of data breach
Michigan-based Flagstar Bank is notifying over 1.5 million customers of a massive data breach that took place during a cyberattack at the end of 2021. According to a letter to impacted customers, Flagstar’s corporate network was compromised in December 2021 when an unauthorized party accessed files containing sensitive…
-
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at the 2022 RSA Conference in San Francisco, the world’s leading information security conference. As cyber-attacks continue to grow in frequency and sophistication, the annual RSA Conference plays an important role in bringing together…
-
Coming Surge in Unsupported Android Devices Poses Growing Online Security Threat
Coming September 2022, almost one-third of the world's smartphones running Android will be running an outdated, unsupported operating system. Android devices occupy roughly 70% of the market, but many of those devices pose a security risk as Google no longer supports them. Let’s take a closer look at the Android OS…
-
5 Tips to Protect Your Privacy While Traveling
Traveling is still atop most everyone’s list of favorite activities, whether for vacationing or work. The sheer thought of packing up and visiting another city or country is exhilarating for many, and it’s not hard to see why. However, despite the awesomeness, it involves a series of risks that are not immediately obvious…
-
GravityZone and Nutanix AHV: How Bitdefender promotes security efficiency for cloud workloads
As enterprises shift towards a cloud-first digital environment, the need to address an increased attack surface and new threats continues to rise. An organization’s use of cloud infrastructure promises efficiency and speed for a company's team of developers. However, this tradeoff in operational efficiency doesn’t come…
-
Der Spiegel Says Telegram Gave User Data to German Police in Fight against Terrorism, Child Abuse
Messaging service Telegram has reportedly surrendered user data to German authorities despite maintaining on its website that it never ceded to such requests. Telegram is a cross-platform instant messaging (IM) service best known for its minimal data collection practices and end-to-end encryption (E2EE) qualities that let…
-
US Authorities Shut Down SSNDOB Marketplace Selling Data of over 24 Million People
The US Department of Justice has shut down SSNDOB, a popular darknet marketplace for trading compromised Social Security Numbers, dates of birth, credit card numbers, and other sensitive personally identifiable information (PII). Thought to possess the stolen PII of over 24 million Americans, SSNDOB operated using at least…
-
New Malware Strain ‘SVCReady’ Loads from Word Documents
Security researchers discovered a new malware loader dubbed ‘SVCReady’ in recent phishing attacks. The malware has an atypical way of infecting the compromised device, by loading from Word documents’ properties. SVCReady stores shellcode in the properties of malicious Word documents and executes it through VBA macro code.…
-
2 Million Patient Records Compromised in Largest Healthcare Breach of 2022 So Far
Shields Health Care Group, which provides services to dozens of clinics and hospitals across New England, has disclosed a data breach that affected a whopping 2 million patients. In a notice to affected parties, Shields revealed that the company was alerted to suspicious activity on March 28 that may have involved data…
-
Costa Rica: What Happens When an Attack Shuts Down a Country?
For the last few months, the country has been virtually paralyzed by a bloody ongoing cyberwar with the Russia-affiliated Conti ransomware gang, which in mid-April managed to infiltrate 27 government agencies at various levels in the state hierarchy. Among the worst-hit institutions were the Ministry of Finance, the…
-
United against scammers! Spread the word, raise awareness and help fellow peers
Brand impersonation is a common form of phishing used by hackers in their attempts to gain financial benefits and personal data using the most deceptive techniques. As Bitdefender’s influence in the cyber-security industry grows, there are more scammers pretending to be Bitdefender tech support. The rule of thumb here is…