New Backdoor Allows Full Access to Mac Systems, Bitdefender Warns

New Backdoor Allows Full Access to Mac Systems, Bitdefender Warns

by Alexandra GHEORGHE, from Bitdefender Labs , on 05.07.2016

A new piece of malware, dubbed Backdoor.MAC.Eleanor by Bitdefender researchers, exposes Apple systems to cyber-espionage and full, clandestine control from malicious third-parties. [Read the full report here]. The backdoor is embedded into a fake file converter application that is accessible online on reputable sites offering Mac applications and software. The EasyDoc Converter.app poses as a […] read more

Pacifier APT – two years and counting

Pacifier APT – two years and counting

by Razvan STOICA, from Bitdefender Labs , on 01.07.2016

Bitdefender researchers Marius Tivadar, Cristian Istrate, Iulian Muntean and Andrei Ardelean dissected some malware samples which had been used in the Pacifier APT spear phishing campaign over the past two years. These samples show clear evolution over time, both in terms of functionality and of stealth, proof of active development efforts. The APT is still […] read more

The Growing Threat of Malware within Medical Devices

The Growing Threat of Malware within Medical Devices

by Dan Lowe, from OEM Hub , on 24.06.2016

Malware Threats Are Rising Within Health Care Organizations. read more

Bitdefender Stops ZCrypt Worm-Like Ransomware

Bitdefender Stops ZCrypt Worm-Like Ransomware

by Alexandra GHEORGHE, from Bitdefender Labs , on 08.06.2016

Bitdefender detects and blocks a new type of ransomware that replicates itself on removable and network drives. The sample analyzed by our researchers has worm-like capabilities – it can spread via autorun.inf files on USB drives. When an infected USB is plugged into a system, ZCrypt automatically launches a file called invoice.exe, which, once opened, infects the system […] read more

Common Myths about Antimalware Applications

Common Myths about Antimalware Applications

by Dan Lowe, from OEM Hub , on 06.05.2016

Bitdefender detects and blocks a new type of ransomware that replicates itself on removable and network drives. The sample analyzed by our researchers has worm-like capabilities – it can spread via autorun.inf files on USB drives. When an infected USB is plugged into a system, ZCrypt automatically launches a file called invoice.exe, which, once opened, infects the system […] read more

Opinion: RSA 2016 - Looking For the Next Big Thing!

Opinion: RSA 2016 - Looking For the Next Big Thing!

by Dan Lowe, from OEM Hub , on 07.03.2016

Here is a recap of the RSA event from a vendor perspective while offering practical advice for future conferences. read more

Bitdefender and 5nine Join Forces To Hit a `Sweet Spot’ of Security and Performance for Hyper-V Users

Bitdefender and 5nine Join Forces To Hit a `Sweet Spot’ of Security and Performance for Hyper-V Users

by Bitdefender OEM, from OEM Hub , on 24.02.2016

Bitdefender and 5nine have joined forces to hit a `sweet spot’ in the Hyper-V virtualization market in a product that brings the world’s highest quality of protection to companies’ virtual environments while maintaining optimum performance. read more

The Leading Encryption Services Provider Is Now Covered by the Leading Antivirus Solution

The Leading Encryption Services Provider Is Now Covered by the Leading Antivirus Solution

by Bitdefender OEM, from OEM Hub , on 03.12.2015

Bitdefender and Egress Software Technologies have joined forces in a successful partnership that will bring the highest level of antivirus security to the market’s leading encryption services. read more

4 Ways Secure Remote Monitoring Improves Businesses

4 Ways Secure Remote Monitoring Improves Businesses

by Guest, from OEM Hub , on 25.11.2015

Guest post courtesy of Michael Polaczy, Product Marketing Manager atTeamViewer, Bitdefender OEM and Technology Licensing Partner. read more

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

by Dan Lowe, from OEM Hub , on 29.10.2015

With malware losses costing upwards to $500 Billion dollars, rest assured that malware writers will want to set new records for 2015[i]. As the world becomes more interconnected, the speed to deliver future technologies has become an important factor to get ahead of the competition. Competitive pressures continue to force companies to deliver the next big thing, but they are creating security loop holes, vulnerabilities, and security lapses that facilitate malicious attacks. read more

<< Prev Next >>