Find me on:

Emma Ban

Emma Ban is a Content Writer at Bitdefender. Having worked in the industry for more than three years, in both B2C and B2B areas, she has a deep understanding of the online threats that put at risk the security of both consumers and corporations. Thus, her main focus is to provide insights into security technology trends that enable safe environments for companies and their employees. She thoroughly enjoys traveling and has a special interest in fashion technology.

Recent Posts

The New Security Mindset Emerging from the RSA Conference 2015

Published on 04/30/15 01:16PM

OEM Business, Technology, Internet of Things

The RSA Conference was bigger than ever, with more participants and more ideas worth spreading. Since this event is the place where the world talks security, we had to be a part of that conversation. So we went there to tell the world the Bitdefender story, but also to listen to the bustling crowd. For personal views on the hustle&bustle of the RSA Conference 2015 and buzzing topics, check out this opinion piece written by our own Darragh Kelly.

Read More

3 Key Security Takeaways from Mobile World Congress 2015 (MWC15)

Published on 03/19/15 04:00PM

Mobile Security, Network Security, Technology

This year’s Mobile World Congress (MWC15) was the biggest yet. With over ninety three thousand attendees from two hundred countries and speakers from all industries touched by the mobile market, the event was abuzz with mobile innovations. But, mind you, the show’s major theme has evolved since its first edition ten years ago. It’s not just about ‘mobile’ anymore. It’s about mobility and all the connected devices that make up the Internet of Things. And we could clearly see a number of trends shaping.

Read More

Going to the Mobile World Congress (MWC2015)?

Published on 02/23/15 11:14AM

OEM Business

 

Meet Bitdefender's OEM & Technology Licensing team there!

We’ve been hearing about the mobile revolution for some time now. It’s happening as we speak, and it doesn’t seem to be ending any time soon.

Mobile devices are taking all sorts of shapes and functions, enabling us to be more connected with each other, with our homes, our offices and even our cars! They’re changing the way we live and communicate, and also the way we work – the BYOD trend is here to stay and evolve, as more mobile innovations come to light.

Read More

BMW Security Flaw: IoT Security Still an Afterthought?!

Published on 02/20/15 04:00PM

Threats, Technology, Internet of Things

As German luxury car maker BMW releases a security patch for their in-car software, one cannot help but wonder: is IoT security still an afterthought?

A couple of weeks ago, the BMW Group announced a security patch for a vulnerability in their ConnectedDrive system that could put 2.2 million Rolls-Royce, Mini and BMW vehicles at risk. Using a SIM card, the software allows car owners to access and control car navigation functions, internet connected features, windows and doors. Imagine what could have happened if hackers had discovered the flaw before the researchers at the German Automobile Association, ADAC.

Read More

Sony Security Breach Part 2: Repercussions on Cybersecurity Laws

Published on 01/30/15 03:40PM

OEM Business

After the series of data breaches that dominated the 2014 security landscape, the Sony security breach was the last straw. Not only did it turn the movie world on its head, but it become a "serious national security matter" that pushed cybersecurity to the top of President Obama’s 2015 agenda.

"With the Sony attack that took place, with the Twitter account that was hacked by Islamist jihadist sympathizers yesterday, it just goes to show how much more work we need to do - both public and private sector - to strengthen our cybersecurity," the president said earlier this month, following a White House proposal for toughened laws on cybersecurity.

Read More

Data Breaches of 2014: From Retail to Healthcare No Industry Is Spared

Published on 01/23/15 03:00PM

Threats, Network Security, Endpoint Security

2014 will most likely go down in history as the year of major data breaches. Notable companies across various industries had their systems hacked, causing a wake of incalculable damage to their brand and customer loyalty.  Some had their customers’ and employees’ personal data compromised, while others had assets exposed to theft and misuse.

According to press reports, the most targeted sector was retail –  Home Depot, Target, Neiman Marcus and Michael’s are just a few examples of hacked high-profile retailers. Despite major investments in security, the banking/financial sector was also highly affected by data breaches – the JPMorgan Chase and Korea Credit Bureau  hacks are just two cases that made headlines. In contrast, the healthcare sector lags behind in terms of security investments, wide-spread good practices and dedicated IT staff. And the Community Health Services hack showed once again how vulnerable the healthcare industry is to medical data theft. 

Read More

Top OEM Predictions for 2015: Security Becomes Smarter

Published on 01/16/15 03:52PM

OEM Business, Network Security, Endpoint Security, Technology, Internet of Things

Technologies are evolving at a faster pace than ever before. They’re becoming smarter, quicker, wiser. The evolution of the Internet of Things (IoT) and Bring Your Own Device (BYOD) over the past couple of years is a clear sign that we’re becoming more connected with each other, with our homes and offices. And that connectivity becomes seamless, uninterrupted, as more sophisticated wearable devices enable us to stay connected while out and about. But greater connectivity comes with greater security risks. Cybercriminals have shown time and time again how skilled they are at exploiting a variety of interconnected systems and networks. So what about security – how will it evolve with all these welcome-but-risky developments?

Read More

Botnet Anonymization: How to Deal with Anonymous Zombies

Published on 12/30/14 04:00PM

Threats, Network Security, Endpoint Security

Gartner recently announced its predictions on the number of interconnected devices that will make up the Internet of Things (IoT) in the following years: 25 billion connected devices by 2020. This is a clear sign that technological advancements are moving quickly to make our lives easier. Before we get excited, we should take a look at what this means for the dark side of the IoT: internet-connected devices will also make it easier for bot-masters to seize and control thousands, it if not hundreds of thousands, of “zombies”.

Read More

Holiday Shopping Blues: Customer Trust in POS Security Slumps. What to Do?

Published on 11/27/14 10:30AM

Threats, Network Security, Endpoint Security

Typically, ‘tis the season for joyous shopping. But after the latest POS Security breaches suffered by major retailers such as Target and Home Depot, customers seem to suffer from holiday shopping blues: their trust in credit card payments has dropped, and they’re reluctant to return to stores that have been hacked. According to a recent survey by Princeton Survey Research Associates International for CreditCards.com, 45% of respondents owning a credit or debit card would definitely or probably avoid shopping at one of their regular stores if that retailer had experienced a data breach. Also, only one in eight respondents are still likely to shop with credit cards this holiday season.

Read More

4 Ways Mobile Insurers Can Generate New Revenue Streams

Published on 11/06/14 02:30PM

OEM Business, Mobile Security

The mobile phone insurance revenue market is projected to grow at a compound annual growth rate of 17 % by 2020. As a business executive working for a mobile insurance carrier, you’re surely after a significant portion of it. But how do you go about gaining more revenue?

As we showed in our previous article on how to differentiate a mobile insurance plan from your competitors', it is important that you adopt a proactive approach and diversify your offer, to address emerging mobile risks. As mobile malware is on the rise, adding mobile antimalware protection to the insurance mix will not only help with the diversification, but will provide real value to the increasing number of mobile users facing risks posed by mobile malware.

Read More