Hackers Discover Voice Recognition Vulnerability on iOS and Android

Hackers Discover Voice Recognition Vulnerability on iOS and Android

by HOTforSecurity , on 15.10.2015

A group of French researchers have discovered they can use radio waves to silently trigger voice commands on any Android phone or iPhone that has simultaneously enabled Google Now or Siri and plugged headphones with microphone. Image source: Flickr “We exploit the principle of front-door coupling on smartphone headphone cables with specific electromagnetic waveforms,” the [and#8230;] read more

Breakthrough technologies and products such as BOX have tripled job applications at Bitdefender

Breakthrough technologies and products such as BOX have tripled job applications at Bitdefender

by Elvis Popovici, from Business Insights , on 14.10.2015

Highly innovative products such as the recent IoT security solution Bitdefender BOX act as a magnet to valuable job applicants, increasing both the number and quality of candidates. read more

PC users warned of Dridex malware attack, targeting online bankers

PC users warned of Dridex malware attack, targeting online bankers

by HOTforSecurity , on 14.10.2015

Do you bank online? Chances are if youand#8217;re reading an online blog that you also value the convenience that an internet bank account can give you. But, the ease of online banking comes at a price and#8211; and that price is the risk that internet criminals might be attempting to infect your computer with a [and#8230;] read more

Potentially Unwanted Applications (PUAs) Are Becoming a Big Issue for Mac

Potentially Unwanted Applications (PUAs) Are Becoming a Big Issue for Mac

by Darragh Kelly, from OEM Hub , on 14.10.2015

Recently I talked about the ever growing Mac market share –registering 16% global growth YoY – in an overall decreasing PC market –contracting global at 12% YoY. In the same post we saw how, malware growth was up 286% in the same time period. In this post, second in this Mac-focused series, I would like to highlight a lesser known evil which we do not even classify as malware, yet is having just as a dramatic impact on user experience and business productivity: Potentially Unwanted Applications (PUAs) a.k.a. Potentially Unwanted Programs (PUPs) / adware. PUAs generally come from third-party download sites. The software you download from such sites can include both the software that you want and adware you may not necessarily want, but you inadvertently accept during the installation process, as it is commonly accepted as non-malware. “PUAs generally include software that displays intrusive advertising, or tracks the user's Internet usage to sell information to advertisers, injects its own advertising into web pages that a user looks at…Unwanted programs often include no sign that they are installed, and no uninstall or opt-out instructions” - Wikipedia read more

Are parental controls keeping up the pace? One in 10 kids 15 or under wants to access pornography sites

Are parental controls keeping up the pace? One in 10 kids 15 or under wants to access pornography sites

by HOTforSecurity , on 14.10.2015

One in 10 children no older than 15 is interested in accessing pornographic content, recent Bitdefender data reveals. This may not come as a surprise, since pornography has basically been around since forever. But, thanks to the Internet, it has increased sharply in accessibility and hyper-interactivity. Children are closely supervised by parents or the staff [and#8230;] read more

Info-stealing Malware Hits German and English-speaking Users

Info-stealing Malware Hits German and English-speaking Users

by HOTforSecurity , on 14.10.2015

The Ursnif malware family is back, this time targeting the private data and financial activity of German, Russian and English-speaking users, Bitdefender warns. Fig 1. Spam email in English Fig 2. Spam email in German Fig 3. Spam email in Russian Infection Data According to data from Bitdefender’s antispam labs, some 10000 emails were sent [and#8230;] read more

Businesses Warned of Router, Riddled with Security Holes and a Zero-day Exploit

Businesses Warned of Router, Riddled with Security Holes and a Zero-day Exploit

by Graham Cluley, from Business Insights , on 13.10.2015

When you buy a new piece of computer hardware, and connect it to your network, I really hope that you check whether there are any security updates available. read more

Happy Ada Lovelace Day! Celebrating the world’s first programmer

Happy Ada Lovelace Day! Celebrating the world’s first programmer

by HOTforSecurity , on 13.10.2015

There’s a good reason these days to think of the many women who contribute to scientific and technological advances. The tech world celebrates female geeks everywhere mid-October, with a day named after Ada Lovelace, Lord Byron’s daughter, who is considered by many the first programmer who ever lived. Ada Lovelace Day, which falls this year [and#8230;] read more

Seven Security Misconceptions that Catch Companies Off Guard

Seven Security Misconceptions that Catch Companies Off Guard

by Liviu Arsene, from Business Insights , on 12.10.2015

Each time we hear about a new security incident at a major company, we assume the breach succeeded either because of its high level of sophistication or because attackers have been “footprinting” their victim for a very long time and found the weakest link in the security chain. read more

Adware Reaches Half of Mac OS X Threats, Bitdefender Says

Adware Reaches Half of Mac OS X Threats, Bitdefender Says

by HOTforSecurity , on 12.10.2015

Half of Mac OS users are complaining that ads and unwanted apps (PUA) are disrupting their browsing experience and endangering online safety, Bitdefender researchers found. Source: Apple forums Analyzing the OS X malware landscape of first semester of the year, Bitdefender found that adware accounts for almost half of all Mac OS X threats in [and#8230;] read more

Next >>