Latest News

Bitdefender E-Threats Landscape Reports

The purpose of this report is to provide a comprehensive investigation of the threats’ landscape. Bitdefender’s security experts thoroughly analyze and examine the menaces of the each semester, focusing on software vulnerabilities and exploits, different types of malware, as well as countermeasures, cyber crime prevention and law enforcement. The E-Threats Landscape Report concentrates mainly on the latest trends, but it also contains facts and data and concerning the previously investigated periods, as well as several predictions related to the upcoming semesters. This document is primarily intended for IT&C System’s Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers, but it also addresses issues pertaining to a broader audience, like small organizations or individual users concerned about the safety and integrity of their networks and systems.

H2 2012 E-Threat Landscape Report - Overview

For the first half of the year, zero-day vulnerabilities played an essential role in disseminating malware with exploit packs as a favorite vector of infection. The dangerous zero-day exploit in the Java Runtime Environment (CVE-2012-4681) was documented and proof of concept was added to Metasploit, which became public knowledge before a fix was made available.

As a direct result, three billion devices running Java were vulnerable to remote code exploitation for roughly 48 hours. A second exploit hit in September and targeted Internet Explorer 9. Successful exploitation would allow remote compromise of the system with the installation of the Poison Ivy backdoor. Both zero-day exploits were used in advanced persistent attacks.

2012 saw fluctuations in the amount of junk e-mail as a proportion of e-mail traffic. The year began with a slight decrease in spam e-mails, but spam constantly gained ground towards the middle of the year. According to data gathered from the Bitdefender Antispam lab, the second half saw growth again, with small variations towards the end of 2012. The increase in the number of junk e-mails was nonetheless minor, by only 5%, leading to a rough value of 73% of the total number of e-mails sent worldwide.

  Download now the full H2 2012 E Threat Landscape Report (pdf)
  Download now the overview H2 2012 E Threat Landscape Executive Summary (pdf)

White Papers

Petya Ransomware - Windows Ransomware Goes Low Level
The Internet of Things: Risks in the Connected Home
Android Ransomware and SMS-Sending Trojans Remain a Growing Threat - Android Malware Threat Report H2 2015
Ransomware, A Victim's Perspective
Digging into Facebook Ads: Finding Clues that Indicate a Scam Pattern - October 2013, Virus Bulletin
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats - November 2013, Virus Bulletin
Underneath E-mails dangerous attachments and phishing attacks
The ultimate guide to secure your social media account
Phishing and fraud: the make-believe industry - April 2013, Virus Bulletin
Aggressive Advertisers Pose Privacy Risks
Bitdefender Case Study: Kids and Online Threats
FRIENDS, FIENDS and FACEBOOK: The new battlefield against scammers
Bitdefender Antivirus Technology
B-HAVE ,The Road to Success
The medium or the message? Dealing with image spam, December 2006, Virus Bulletin
Fighting Image Spam
Bitdefender NeuNet Antispam Technology
Proactive security I body armor against business attacks
Whitepaper-Emerging Threats to Business Security
Securing the Uncertain Bitdefender's B-HAVE Proactive Technology for Defense against Versatile_Threats
Securing E-Mail-The First Strategic Defense Line
Virus Naming. The "Who's Who?" Dilemma
Facebook – Another breach in the wall
Bitdefender Active Virus Control: Proactive Protection Against New and Emerging Threats