The RSA Conference was bigger than ever, with more participants and more ideas worth spreading. Since this event is the place where the world talks security, we had to be a part of that conversation. So we went there to tell the world the Bitdefender story, but also to listen to the bustling crowd. For personal views on the hustle&bustle of the RSA Conference 2015 and buzzing topics, check out this opinion piece written by our own Darragh Kelly.Read More
Published on 04/30/15 01:16PM
Published on 03/19/15 04:00PM
This year’s Mobile World Congress (MWC15) was the biggest yet. With over ninety three thousand attendees from two hundred countries and speakers from all industries touched by the mobile market, the event was abuzz with mobile innovations. But, mind you, the show’s major theme has evolved since its first edition ten years ago. It’s not just about ‘mobile’ anymore. It’s about mobility and all the connected devices that make up the Internet of Things. And we could clearly see a number of trends shaping.Read More
Meet Bitdefender's OEM & Technology Licensing team there!
We’ve been hearing about the mobile revolution for some time now. It’s happening as we speak, and it doesn’t seem to be ending any time soon.
Mobile devices are taking all sorts of shapes and functions, enabling us to be more connected with each other, with our homes, our offices and even our cars! They’re changing the way we live and communicate, and also the way we work – the BYOD trend is here to stay and evolve, as more mobile innovations come to light.
Published on 02/20/15 04:00PM
As German luxury car maker BMW releases a security patch for their in-car software, one cannot help but wonder: is IoT security still an afterthought?
A couple of weeks ago, the BMW Group announced a security patch for a vulnerability in their ConnectedDrive system that could put 2.2 million Rolls-Royce, Mini and BMW vehicles at risk. Using a SIM card, the software allows car owners to access and control car navigation functions, internet connected features, windows and doors. Imagine what could have happened if hackers had discovered the flaw before the researchers at the German Automobile Association, ADAC.Read More
Published on 01/30/15 03:40PM
After the series of data breaches that dominated the 2014 security landscape, the Sony security breach was the last straw. Not only did it turn the movie world on its head, but it become a "serious national security matter" that pushed cybersecurity to the top of President Obama’s 2015 agenda.
"With the Sony attack that took place, with the Twitter account that was hacked by Islamist jihadist sympathizers yesterday, it just goes to show how much more work we need to do - both public and private sector - to strengthen our cybersecurity," the president said earlier this month, following a White House proposal for toughened laws on cybersecurity.Read More
Published on 01/23/15 03:00PM
2014 will most likely go down in history as the year of major data breaches. Notable companies across various industries had their systems hacked, causing a wake of incalculable damage to their brand and customer loyalty. Some had their customers’ and employees’ personal data compromised, while others had assets exposed to theft and misuse.
According to press reports, the most targeted sector was retail – Home Depot, Target, Neiman Marcus and Michael’s are just a few examples of hacked high-profile retailers. Despite major investments in security, the banking/financial sector was also highly affected by data breaches – the JPMorgan Chase and Korea Credit Bureau hacks are just two cases that made headlines. In contrast, the healthcare sector lags behind in terms of security investments, wide-spread good practices and dedicated IT staff. And the Community Health Services hack showed once again how vulnerable the healthcare industry is to medical data theft.Read More
Published on 01/16/15 03:52PM
Technologies are evolving at a faster pace than ever before. They’re becoming smarter, quicker, wiser. The evolution of the Internet of Things (IoT) and Bring Your Own Device (BYOD) over the past couple of years is a clear sign that we’re becoming more connected with each other, with our homes and offices. And that connectivity becomes seamless, uninterrupted, as more sophisticated wearable devices enable us to stay connected while out and about. But greater connectivity comes with greater security risks. Cybercriminals have shown time and time again how skilled they are at exploiting a variety of interconnected systems and networks. So what about security – how will it evolve with all these welcome-but-risky developments?Read More
Published on 12/30/14 04:00PM
Gartner recently announced its predictions on the number of interconnected devices that will make up the Internet of Things (IoT) in the following years: 25 billion connected devices by 2020. This is a clear sign that technological advancements are moving quickly to make our lives easier. Before we get excited, we should take a look at what this means for the dark side of the IoT: internet-connected devices will also make it easier for bot-masters to seize and control thousands, it if not hundreds of thousands, of “zombies”.Read More
Published on 11/27/14 10:30AM
Typically, ‘tis the season for joyous shopping. But after the latest POS Security breaches suffered by major retailers such as Target and Home Depot, customers seem to suffer from holiday shopping blues: their trust in credit card payments has dropped, and they’re reluctant to return to stores that have been hacked. According to a recent survey by Princeton Survey Research Associates International for CreditCards.com, 45% of respondents owning a credit or debit card would definitely or probably avoid shopping at one of their regular stores if that retailer had experienced a data breach. Also, only one in eight respondents are still likely to shop with credit cards this holiday season.Read More
Published on 11/06/14 02:30PM
The mobile phone insurance revenue market is projected to grow at a compound annual growth rate of 17 % by 2020. As a business executive working for a mobile insurance carrier, you’re surely after a significant portion of it. But how do you go about gaining more revenue?
As we showed in our previous article on how to differentiate a mobile insurance plan from your competitors', it is important that you adopt a proactive approach and diversify your offer, to address emerging mobile risks. As mobile malware is on the rise, adding mobile antimalware protection to the insurance mix will not only help with the diversification, but will provide real value to the increasing number of mobile users facing risks posed by mobile malware.Read More