Why Don't You Provide Useful Malware Descriptions?

Published on 08/18/16 06:27PM


Read More

The Growing Threat of Malware within Medical Devices

Published on 06/24/16 06:22PM


Malware Threats Are Rising Within Health Care Organizations.

Read More

Common Myths about Antimalware Applications

Published on 05/06/16 08:44PM

Threats, Technology


Read More

Opinion: RSA 2016 - Looking For the Next Big Thing!

Published on 03/07/16 11:56PM


Here is a recap of the RSA event from a vendor perspective while offering practical advice for future conferences.

Read More

Bitdefender and 5nine Join Forces To Hit a `Sweet Spot’ of Security and Performance for Hyper-V Users

Published on 02/24/16 05:00PM

OEM Business, Technology

Bitdefender and 5nine have joined forces to hit a `sweet spot’ in the Hyper-V virtualization market in a product that brings the world’s highest quality of protection to companies’ virtual environments while maintaining optimum performance.

Read More

The Leading Encryption Services Provider Is Now Covered by the Leading Antivirus Solution

Published on 12/03/15 03:00PM

OEM Business, Technology

Bitdefender and Egress Software Technologies have joined forces in a successful partnership that will bring the highest level of antivirus security to the market’s leading encryption services.

Read More

4 Ways Secure Remote Monitoring Improves Businesses

Published on 11/25/15 03:00PM

Endpoint Security, Guest posts

Guest post courtesy of Michael Polaczy, Product Marketing Manager at TeamViewer, Bitdefender OEM & Technology Licensing Partner.

Read More

Mobile Security: Mobile Devices Are The Next Big Opportunity for Hackers

Published on 10/29/15 03:30PM

Mobile Security, Endpoint Security

With malware losses costing upwards to $500 Billion dollars, rest assured that malware writers will want to set new records for 2015[i]. As the world becomes more interconnected, the speed to deliver future technologies has become an important factor to get ahead of the competition. Competitive pressures continue to force companies to deliver the next big thing, but they are creating security loop holes, vulnerabilities, and security lapses that facilitate malicious attacks. 

Read More

5 Compelling Reasons to Add Cloud Security to Your Cloud Solution

Published on 10/23/15 02:30PM

OEM Business, Cloud Security

The cloud marketplace is in continuous evolution. As a cloud service provider, you’re facing new challenges every day: new cloud technologies are stealing your thunder, and new data breaches like the (in)famous Ashley Madison case are refreshing security concerns with regards to cloud services. And surely, when talking with potential customers, you’ve faced them more than once. You are expected to answer not only questions about the technology, scalability and cost of your solutions, but also about your security model.

Read More

Potentially Unwanted Applications (PUAs) Are Becoming a Big Issue for Mac

Published on 10/14/15 01:30PM

Threats, Endpoint Security

Recently I talked about the ever growing Mac market share –registering 16% global growth YoY – in an overall decreasing PC market –contracting global at 12% YoY. In the same post we saw how, malware growth was up 286% in the same time period. In this post, second in this Mac-focused series, I would like to highlight a lesser known evil which we do not even classify as malware, yet is having just as a dramatic impact on user experience and business productivity: Potentially Unwanted Applications (PUAs) a.k.a. Potentially Unwanted Programs (PUPs) / adware.


PUAs generally come from third-party download sites. The software you download from such sites can include both the software that you want and adware you may not necessarily want, but you inadvertently accept during the installation process, as it is commonly accepted as non-malware. 


“PUAs generally include software that displays intrusive advertising, or tracks the user's Internet usage to sell information to advertisers, injects its own advertising into web pages that a user looks at…Unwanted programs often include no sign that they are installed, and no uninstall or opt-out instructions”

- Wikipedia 


Read More