My Bitdefender
  • 0 Shopping Cart

Bitdefender Blog

Caution Advised as Heartbleed Poses Serious Security Threat

by Bitdefender Security Specialists, on 10.04.2014

A potentially damaging flaw has been discovered with the OpenSSL libraries that will likely trigger reactions ranging from mild concern to serious discussions in the security industry. At this point, it is impossible to measure the extent of the damage – or indeed if any damage at all was caused – but Bitdefender advises its customers to exercise caution. read more

Bitdefender Photon™

by Bitdefender Security Specialists, on 08.04.2014

In the summer of 2013, we launched the New Bitdefender (2014) edition powered by Bitdefender Photon™ technology, thus offering the best performance and protection an antivirus can provide. read more

A flashlight is most valuable at night - The Romanian experience

by Bitdefender Security Specialists, on 05.03.2014

Asia could take a leaf from Romanian history, after the fall of communism there - the battle of crime and corruption versus democratic free enterprise. Now, there is a global battle between light and dark in IT - between cyber-criminals and secure business. This has recently taken a sinister turn, when governments have engaged in cyber warfare, using shady parties to generate viruses against political rivals. This is escalating the problem, where criminals are deemed ‘patriotic’ and creating sophisticated malware is practiced by both sides. It has raised the idea of offensive defense, i.e. attack the attackers. However, the Internet does not lend itself to such tactics, and passive defense remains the best way forward. read more

Teaching People to Use Man in the Middle Attacks

by Dan Lowe, on 29.10.2013

On the Internet, there are many free tools to create a Man-in-the-Middle (MTIM) or Man-in-the Browser (MTIB) attacks. read more

Antivirus Signature Detection Is Not Effective, Why Would You Still Use It?

by Dan Lowe, on 28.10.2013

With 2.3 unique malware variations created every second, I will explain to you why it is impossible for signature detection to keep up with the onslaught of new malware and why there is still and need to use signatures to protect your devices. read more

Stopping APTs through Cloud based Sandboxing Service…Nonsense!

by Dan Lowe, on 24.10.2013

Do the math and let's figure out whether you belong in the less than 1% of businesses affected by APT. read more

Another Malware Attack Vector BYOD

by Dan Lowe, on 22.10.2013

Mobile Device Management and Mobile Application Management are 2 areas that can potentially reduce malware. read more

Seven Sneak Attacks Used Today…

by Dan Lowe, on 21.10.2013

Criminals keep on innovating to lure you into their trap. Watch out for their latest tricks! read more

Overcoming the Antivirus Emulation Defense

by Dan Lowe, on 17.10.2013

Cybercriminals are bright and have learned how to overcome some virus defenses. read more

Is Antivirus Sandboxing Effective?

by Dan Lowe, on 16.10.2013

In general, Sandboxing is a simulated environment which programs and processes can run in an isolated setting while allowing limited access to your files and system. read more

Daily "Did you know?"

On July 31, 2008, the Koobface computer worm started to target users of Facebook and MySpace; and new variants still constantly appear.

Authors

  • Bitdefender Security Specialists
    Bitdefender Labs
  • Catalin Cosoi
    Chief Security Researcher
  • Dan Lowe
    Dan Lowe, an OEM Senior Marketing Manager, has been working with Bitdefender for the last 3 ½ years. His familiarity with multiple security products from Firewalls to Antivirus has provided him a unique perspective on the security industry.
  • Ligia Adam
    Security Evangelist and Social Media Professional
  • Loredana Botezatu
    Loredana Botezatu – E-threat Analyst – Loredana has been writing about the IT world and e-security for well over five years. She has made a personal goal out of educating computer users about the ins and outs of the cybercrime ecosystem.

Categories

HOTforSecurity