Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

by Dan Lowe, from OEM Hub , on 29.10.2015

With malware losses costing upwards to $500 Billion dollars, rest assured that malware writers will want to set new records for 2015[i]. As the world becomes more interconnected, the speed to deliver future technologies has become an important factor to get ahead of the competition. Competitive pressures continue to force companies to deliver the next big thing, but they are creating security loop holes, vulnerabilities, and security lapses that facilitate malicious attacks. read more

Bitdefender Photon™

Bitdefender Photon™

by Bitdefender Security Specialists , on 08.04.2014

In the summer of 2013, we launched the New Bitdefender (2014) edition powered by Bitdefender Photon™ technology, thus offering the best performance and protection an antivirus can provide. read more

A flashlight is most valuable at night - The Romanian experience

A flashlight is most valuable at night - The Romanian experience

by Bitdefender Security Specialists , on 05.03.2014

Asia could take a leaf from Romanian history, after the fall of communism there - the battle of crime and corruption versus democratic free enterprise. Now, there is a global battle between light and dark in IT - between cyber-criminals and secure business. This has recently taken a sinister turn, when governments have engaged in cyber warfare, using shady parties to generate viruses against political rivals. This is escalating the problem, where criminals are deemed ‘patriotic’ and creating sophisticated malware is practiced by both sides. It has raised the idea of offensive defense, i.e. attack the attackers. However, the Internet does not lend itself to such tactics, and passive defense remains the best way forward. read more

Seven Sneak Attacks Used Today…

Seven Sneak Attacks Used Today…

by Dan Lowe , on 21.10.2013

Criminals keep on innovating to lure you into their trap. Watch out for their latest tricks! read more

Overcoming the Antivirus Emulation Defense

Overcoming the Antivirus Emulation Defense

by Dan Lowe , on 17.10.2013

Cybercriminals are bright and have learned how to overcome some virus defenses. read more

Clueful no longer available on the App Store

Clueful no longer available on the App Store

by Catalin Cosoi , on 30.06.2012

As you may have noticed, as of today at 4:46 PM PST, Clueful is no longer available on the Apple App Store. read more

Romney Defeats Gingrich in US Spam Primaries 45% to 33%

Romney Defeats Gingrich in US Spam Primaries 45% to 33%

by Bitdefender Security Specialists , on 09.02.2012

Romney wins Most Mentioned Politician status in spam read more

<< Prev