<rp id="8drvb"></rp>
    <rp id="8drvb"><ruby id="8drvb"></ruby></rp>
    <th id="8drvb"><track id="8drvb"><sup id="8drvb"></sup></track></th>
  1. <tbody id="8drvb"></tbody>
    <th id="8drvb"><track id="8drvb"><rt id="8drvb"></rt></track></th>

    welcome to

    Industry Reports

    Bitdefender - Hacked Off!

    Bitdefender - Hacked Off!

    Introducing Bitdefender Hacked Off! A comprehensive study into the cybersecurity attitudes of infosecurity professionals around the world.

    READ MORE

    Petya Ransomware Goes Low Level: Analysis and Full Details on Bitdefender's Vaccine Preventing File Encryption

    Petya Ransomware Goes Low Level: Analysis and Full Details on Bitdefender's Vaccine Preventing File Encryption

    The new Petya ransomware seems to have been built with speed in mind, as to expedite the encryption process. While traditional ransomware encrypts files one by one, Petya encrypts the location containing all information about disk files, such as size, permissions, and data content, essentially preventing users from accessing all their data.

    Bitdefender was able to analyze the Petya ransomware and offer potential victims a tool that intercepts the encryption process and offers the decryption key, free of charge. Most importantly, the tool needs to be installed prior to being infected - not afterwards – in order to perform its function correctly.

    READ MORE

    Android Ransomware and SMS-Sending Trojans Remain a Growing Threat - Android Malware Threat Report H2 2015

    Android Ransomware and SMS-Sending Trojans Remain a Growing Threat - Android Malware Threat Report H2 2015

    Ransomware has been plaguing Windows PC for the past couple of years, but recently it seems to have developed platform-agnostic capabilities and has moved towards Linux and Android.

    While not yet as advanced as its Windows counterpart, Android ransomware can still cause massive headaches, disruptions and financial losses. Bitdefender Android telemetry shows the Android.Trojan.Slocker ransomware family ranked first in UK, German and Australian charts, based on the number of devices that reported it.

    Android ransomware could be considered more important than it's PC counterpart because mobile devices have access to and store a lot of personal and even corporate data that's usually not backed up. Losing that data or simply being denied access to it could be irreversible and users would be far more inclined to pay to recover their contacts, conversations, pictures and documents.

    READ MORE

    APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information

    APT28 Under the Scope: A Journey into Exfiltrating Intelligence and Government Information

    The discovery of Stuxnet in the nuclear processing plant in Natanz, Iran laid the ground for a new family of cyber-attacks: advanced persistent threats. Although the term has since become highly popular, state-sponsored cyber-intelligence operations have been carried out since long before the advent of Stuxnet or Flamer; less known advanced persistent threats such as APT28 (or Sofacy) have been covertly running in Europe since 2007.





    To connect the dots between an identified attack and the state actor(s) behind it, companies like Bitdefender look for solid evidence inside the APT code or in the used communication infrastructure. The following report is a technical investigation of some particularities in the APT28 payload implementation that allowed us to link the threat to its operators.

    READ MORE

    HIPAA compliance: what you need to know about security for virtualization and cloud environments

    HIPAA compliance: what you need to know about security for virtualization and cloud environments

    This eGuide provides an overview of HIPAA and the challenges it presents to healthcare and other related industries, the impact the legislation is having on several technology areas, and how trends such as cloud and mobility may impact compliance efforts.

    READ MORE

    Newest Data Center Dilemma: Security vs. Performance

    Newest Data Center Dilemma: Security vs. Performance

    This Executive Brief, written by CIO Insight and sponsored by Bitdefender, explains how traditional security solutions can undermine the benefits of virtualization, and how you can address this challenge.

    READ MORE

    打鱼游戏下载