Am I Safe from Car Hackers Using Malware?

Published on 09/20/16 11:10PM

Threats, Technology, automobile

After purchasing my car, I wondered if I was going to regret my decision. At the car dealer, as I sat in the driver’s seat, the aviator style dashboard, array of digital displays, and innovative auto-sensing enhancements beckoned me to investigate further. As I was driving the car, I marveled at the plush leather seats and quick moving digital numbers of the speedometer jumping as I depressed the accelerator – my senses came alive. For 16-years, I have been driving a basic car with a plain dashboard, simple needle style speedometer, and creature comforts such as a AM/FM radio with a tape cassette. In my old car, I used to change my oil, replace my spark plugs, or fiddle around with the engine. Now, new automobiles have gone way beyond my capabilities as a do-it-yourself car mechanic. I have to take my car to the shop every time a fix it code appears on the dashboard display. I feel poorer after every visit to the mechanic because the new car requires a technician with a computer to diagnose my vehicle’s warning notifications. 

Read More

Is There a False Sense of Security with Pin and Chip POS Technology

Published on 08/29/16 07:33PM

Threats, Technology, POS


Read More

Common Myths about Antimalware Applications

Published on 05/06/16 08:44PM

Threats, Technology


Read More

Potentially Unwanted Applications (PUAs) Are Becoming a Big Issue for Mac

Published on 10/14/15 01:30PM

Threats, Endpoint Security

Recently I talked about the ever growing Mac market share –registering 16% global growth YoY – in an overall decreasing PC market –contracting global at 12% YoY. In the same post we saw how, malware growth was up 286% in the same time period. In this post, second in this Mac-focused series, I would like to highlight a lesser known evil which we do not even classify as malware, yet is having just as a dramatic impact on user experience and business productivity: Potentially Unwanted Applications (PUAs) a.k.a. Potentially Unwanted Programs (PUPs) / adware.


PUAs generally come from third-party download sites. The software you download from such sites can include both the software that you want and adware you may not necessarily want, but you inadvertently accept during the installation process, as it is commonly accepted as non-malware. 


“PUAs generally include software that displays intrusive advertising, or tracks the user's Internet usage to sell information to advertisers, injects its own advertising into web pages that a user looks at…Unwanted programs often include no sign that they are installed, and no uninstall or opt-out instructions”

- Wikipedia 


Read More

Top Issues with Insecure Routers and Printers. How to Mitigate Risks?

Published on 10/07/15 02:00PM


The fact that home and office network devices are insecure is nothing new. For years now, security researchers have pointed out security holes in printers and home and office routers.  And we’ve already seen malware exploiting vulnerabilities in routers to spread to other connected devices, and even hackers exploiting these vulnerabilities to take over the devices and use them to launch DDoS attacks towards online services. A case in point: in one of the largest DDoS attacks to date, hackers were able to bring down Sony and Microsoft’s gaming platforms around Christmas last year, relying in great part on hacked internet routers. Taking control over millions of home routers protected by little more than factory-default usernames and passwords, they were able to create botnets of home and office routers, and use them to launch DDoS attacks on the online gaming services.

Read More

Malware-as-a-service Part III: What’s Next? Evolution and Mitigation

Published on 09/30/15 12:20PM


On July 5, the Italian surveillance company, Hacking Team, got hacked. Reportedly, hackers stole and made public 400 GB of data, including a number of spying/surveillance tools and vulnerability exploits. By July 8, one of these vulnerabilities, a Flash Player zero-day, was already being used by other malware actors to deliver Cryptolocker ransomware. Four days later, it was reported that at least another Adobe Flash vulnerability was being exploited. Needless to say, Adobe was in for some serious patching.

Read More

Return of the Mac and the Beginning of Security?

Published on 09/25/15 02:30PM

Threats, Endpoint Security

At June’s Info Security Europe event in London I got asked by several attendees about our tech offering in regards to Mac, or at least how does Bitdefender see the Mac playing field. Add to that the fact that I am looking to get a Mac myself, my interest was piqued.

So, being a marketer – and a security marketer at that! –, I decide to contact our Mac security tech team and get the inside line – an understanding on the growing demand for Mac and its evolving security landscape.

Read More

Top Threats to Securing the Cloud

Published on 09/10/15 02:30PM

Threats, Cloud Security

With more businesses realizing the benefits of cloud adoption, the demand for cloud services grows and becomes more diverse. As you diversify and extend your product/service offering to meet this demand, the challenge to secure the cloud becomes greater. Cybercriminals have proven time and time again how good they are at hacking company cloud networks and leaking confidential information. Does the most recent Ashely Madison hack ring a bell?

Read More

Malware-as-a-Service Part I: Cybercrime Getting Highly Organized

Published on 08/14/15 01:00PM


… and what businesses can learn from this undeniable fact

Did you know that cybercrooks can expect to earn 1,425% return on investment from a 30-day malware infection campaign?

Read More

IoT Security: What to Expect as a Vendor When Joining the Connected World

Published on 07/31/15 02:30PM

Threats, Internet of Things

... or lessons to learn from Fiat Chrysler Automobiles (FCA)'s recent mistakes

Many vendors are now adding Internet connectivity to their products, adding more features and enabling the device to send information back to them. Unfortunately, for the vendors who never developed connected products before, these additions also carry a greater risk of having a high-impact security vulnerability in their products. Case in point: the vulnerability recently discovered in the wireless service (Uconnect) of a Jeep Cherokee, which affects several connected cars by Fiat Chrysler Automobiles (FCA) and resulted in recalling 1.4M vehicles. The researchers who discovered it showed how this security flaw could enable hackers to take control over the car’s brakes, engine and electronic equipment.

Read More