-
Can you guess what this icon represents?
The crowd is roaring. They’re going mad with anticipation. Eyes are wide open. Hands are up. Football fans at the World Cup final? Nope. A group of community members trying to guess the right answer. So, the story goes like this. We have the above icon and we have no idea what it is. Let's join forces and perhaps we can…
-
Bitdefender Consumer Threat Landscape Report reveals Top 5 Windows Threats
Of the many threats we’ve seen targeting Windows systems last year, five key categories have remained in place: Trojans, PUA’s, Exploits, Miners and Ransomware. The vast majority of threats detected on Windows platforms in 2021 were trojans, with a 50% share, including specific families like Trickbot, Emoted, Dridex,…
-
How to fix install error from Windows Server 2008 Standard?
We are using the trial license to try BitDefender. We use the console to define some policies and generate a package to download. The following is our OS information (using VM): Windows Server 2008 R 2 Standard (Service Pack 1) Processor: Intel(R) Core(TM) i5-10500 CPU @ 3.10GHz 3.10GHz RAM: 4.00GB System type: 64-bit…
-
Safari extension and the option to remember the Vault password have been deployed
The new Password Manager release brings the Safari extension and the long awaited and frequently requested "Remember me" feature:
-
How to Use a VPN like an Expert
Having the right digital privacy and security tools at your disposal is a great way to stay protected. But what makes these tools even more effective is knowing how to use them to your advantage. Bitdefender cybersecurity experts share their best tips on how to use a VPN in a way that really makes a difference, so that…
-
Exploring the Latest in Cybersecurity Technologies at the 2022 RSA Conference
Bitdefender recently joined more than 26,000 attendees, 600 speakers and 400 exhibitors at the 2022 RSA Conference in San Francisco, the world’s leading information security conference. As cyber-attacks continue to grow in frequency and sophistication, the annual RSA Conference plays an important role in bringing together…
-
How to edit a CSV file to import data from unsupported apps into Bitdefender Password Manager
The below article will guide you stepwise to prepare a CSV file in a format compatible with Bitdefender Password Manager, so you can easily import your data from unsupported password management applications. If you currently keep your passwords in a text file or spreadsheet, this method will also work. Bitdefender can…
-
Can you find the easter egg in Mobile Security for Android?
Rumour has it that an easter egg made its way into the Mobile Security for Android. Easter egg: a hidden surprise or extra feature that is included in something such as a computer game, a piece of software, or a film, for the person using or watching it to find. The only clue we have is him: Let's see who can find it!
-
5 Tips to Protect Your Privacy While Traveling
Traveling is still atop most everyone’s list of favorite activities, whether for vacationing or work. The sheer thought of packing up and visiting another city or country is exhilarating for many, and it’s not hard to see why. However, despite the awesomeness, it involves a series of risks that are not immediately obvious…
-
The Bitdefender Security Research Director will answer your questions!
Our Community was born with the purpose of bringing together Bitdefender users, enthusiasts and experts alike and to create an unique experience. The core values that stand by its foundation are inclusion, support, ideation, diversity and the voice of our members. When we said you could get in touch with our research team…
-
What Makes a VPN Trustworthy?
In today’s climate, online privacy has taken on new levels of importance and is no longer seen as optional. Not long ago, the consensus was that you don’t really need privacy unless you have something to hide. Preserving your online anonymity can keep you safe against various threats, including hackers, intrusive ads,…
-
New Password Manager queries
BitDefender has just "surprised" me with a migrate wallet to new password manager option. But there is little information on this. Question 1) I have more than one wallet. Will they still be separated if I migrate them ? Question 2) Can I migrate them at different times ? Question 3) I have one wallet which is synchronised…
-
Your Identity is Being Traded on The Internet Every 2.5 Minutes
You're flooded by ads every time you visit a website: small banners, big rollovers, annoying pop-up ads, colorful ads, video ads, you name it. But to be effective, those ads must address your needs and wants. Let’s say you’re a 42-year-old man from Chicago with a passion for cars and extreme sports. You’re likely…
-
Are you an ethical hacker? You can become our next bug hunter
Bug bounty programs are designed to identify and fix vulnerabilities. Ours has been around for 7 years and it encourages security researchers to identify and submit vulnerability reports regarding virtually everything that bears the Bitdefender brand, including but not limited to the website, products and services. Being…
-
United against scammers! Spread the word, raise awareness and help fellow peers
Brand impersonation is a common form of phishing used by hackers in their attempts to gain financial benefits and personal data using the most deceptive techniques. As Bitdefender’s influence in the cyber-security industry grows, there are more scammers pretending to be Bitdefender tech support. The rule of thumb here is…
-
Expert's computers showroom. What rigs have you built?
I've seen some impressive gear in your signatures and this thread came to mind. Building a PC from scratch can seem intimidating, but is one of the best ways to ensure that your system is capable of satisfying all of your personal preferences. Choosing between a pre-built PC vs custom PC can be challenging, as there are so…
-
YouTuber Demonstrates Fake Charging Cable That Can Hack Your Computer
Whether you use Android or an iPhone, you’ve probably collected a fair tangle of charging cables by now: USB-C, micro-USB, mini-USB, lightning, you name it. Moreover, a lot of other devices use the same cables to charge: Bluetooth headphones, speakers, keyboards, mice, photo cameras and more. Chances are you have a…
-
Bitdefender launches Identity Theft Protection. A game changer
Identity theft has been around for hundreds of years - probably much longer than historical records show - and the expansion of technology has aggravated this issue. The Internet, data breaches and your ever-growing digital footprint enable cyber-criminals and scammers to carry out digital identity fraud at scale. What Is…
-
What is the Difference between Credit Card Fraud and Identity Theft?
It’s easy to confuse credit card fraud with identity theft, but they’re not the same thing. Let’s take a quick look at how they’re different. Credit Card Fraud vs. Identity Theft Credit card fraud is a potential consequence of identity theft. Here, a thief steals your credit card information and then makes purchases in a…
-
How to Activate & Set Up Bitdefender Identity Theft Protection
In the below article, you will learn how to complete the initial activation process and set up Bitdefender Identity Theft Protection to ensure that your personal information is being securely monitored 24/7. Take a moment to review each of the topics. Before we can begin protecting your identity, you’ll need to fully and…
-
Bitdefender Identity Theft Protection: Frequently Asked Questions
We’ve put together a list of the questions and answers that are most frequently asked about Bitdefender Identity Theft Protection. Here you can learn more about your Bitdefender account, alerts, security, what to do if you are a victim of identity theft, and other topics important to our customers. Check the below article…
-
How to avoid SMS phishing with Bitdefender’s Scam Alert module
Scams, frauds and malware campaigns spread organically through the Android user community. Sometimes, unwitting victims propagate these harmful links, truly believing they're doing a service to their contacts. We've covered an old scam that cyber criminals constantly revamp here. In this article, we’re going to cover all…
-
What are DDoS Attacks and Why are They so Popular During Cyberwars?
Imagine 100 individuals rushing to squeeze through a gate that can only fit two people, or 1000 cars trying to take the exact same highway exit, at the same moment. Inevitably, the bottleneck will lead to a traffic jam, and then to a complete halt due to congestion. The same principle can be used to explain how a…
-
How to Spot a Phishing Attack on Your Phone
Mobile phishing is becoming increasingly popular among cybercriminals as people gullibly interact with the booby traps while refusing to install a security solution on their phone. According to Bitdefender’s 2021 online behaviors report, 61% of internet users experienced at least one cyber threat over the course of the…
-
Got a text saying ’your boss‘ left you a voice message? Delete it immediately, it’s a scam.
Lately, people from around the world have reported strange, misspelled text messages saying they have a new voice message from someone close like their spouse, family members, or even their boss. “Who on Earth still uses voice messages in this day and age?” would be a normal reaction. However, many recipients still click…
-
Deep Dive into the Elephant Framework – A New Cyber Threat in Ukraine
At the beginning of the invasion of Ukraine, we released a security advisory with recommendations based on different risk tiers. Since then, our Threat Intelligence (TI) and Managed Detection and Response (MDR) teams have been actively monitoring the situation and identifying active threats. Not surprisingly, the highest…
-
Bitdefender and the Polytechnica University of Bucharest inaugurated a state-of-the-art computer lab
Bitdefender and the Polytechnica University of Bucharest inaugurated a state-of-the-art computer laboratory. Global cybersecurity solutions company Bitdefender has invested more than €50,000 in upgrading a computer lab for students at the Faculty of Automation and Computers at the Politehnica University of Bucharest (UPB).…
-
Expert Community gamification features explained
You may have noticed by now that you can achieve different ranks within the community, depending on the amount of points that you've accumulated. This rank will be displayed on your profile next to your username whenever you post. Gamification works as a points based program and there is a set of interconnected elements…
-
Outsmarting Connected Devices – A brief history of Bitdefender IoT research
Bitdefender is deeply committed to its mission of protecting the digital world and delivering expert-grade solutions to consumers and companies. That is why, in 2015, we were one of the first information security companies to acknowledge the growing need for safer smart-home equipment. Making IoT devices safer - a…
-
BD suspicious connection blocked on website I dont access
I get some notifications about connections being blocked, something like: firefox.exe attempted to establish a connection relying on an expired certificate to piwik.ovpn.se. We blocked the connection to keep your data safe since websites must renew their certificates with a certification authority to stay current, and…