Contronex | Security Solutions Distributor for Managed Solutions Partners
  • Home
  • Products
    • Bitdefender
    • IBM MaaS360
    • usecure
    • AppMoat by Seventh Knight
    • HornetSecurity
    • TechSafe
    • G DATA
    • Secure Disk for Bitlocker
    • SecureSafe
    • FileCap
    • Blue Shield
  • Support
    • Product Support
    • Downloads
    • Frequently Asked Questions
  • Contact Us
    • Request A Quote
    • Contact Information
  • Blog
  • Partners
Select Page

Block the Scam: Bitdefender’s New Call Protection Feature for Android Puts You in Control

Scammers love phones. A lot! In fact, in 2023 alone, phone scams led to over $25.4 billion in losses, affecting 21% of Americans, or more than 56 million people, according to a report by Truecaller.  FYI, the trend hasn’t slowed down. The Federal Trade Commission...

BreachForums broken up? French police arrest five members of notorious cybercrime site

Suspected high-ranking members of one of the world's largest online marketplaces for leaked data have been arrested by French police. According to local media reports, French cybercrime cops detained four prominent members of the BreachForums site. The suspects - who...

Pi2Day Scams: Crypto Users Targeted in Coordinated Facebook Ad Campaign Delivering Malware and Stealing Wallets

The Pi2Day event, celebrated June 28, is a highly anticipated moment for the Pi Network community, traditionally marked by feature launches, development updates, and platform milestones. This year, though, the celebration has attracted cybercriminals, who are running...

Facebook Ad Scam Tricks Investors with Fake Messages and Malware Disguised as ‘Verified Facebook App’

Cybercriminals are once again exploiting Facebook’s ad platform in a malicious campaign that lures users into downloading malware under the guise of resolving fake account problems. This time, they’re using brands like Binance and TradingView to grab the attention of...

Notepad++ Vulnerability Lets Attackers Take Full System Control; PoC Released

A vulnerability in Notepad++ could let attackers gain SYSTEM-level privileges through a simple local exploit. Critical installer bug leaves systems exposed A newly identified vulnerability in version 8.8.1 of Notepad++ , the popular text and source code editor, has...

Call Spoofing: What It Is, How It Works, and How to Protect Yourself

Call spoofing is a scam tactic threat actors use to disguise the origin of a phone call. Understanding how it works could help you detect and avoid it. What is call spoofing? Caller ID spoofing is the practice of obfuscating the origin of a phone call by falsifying...
« Older Entries
Next Entries »

Recent Knowledge Base Articles

  • How to remove Add-On Modules from a company
  • How to Add/Remove Modules (Reconfiguring an Endpoint)
  • Phone no longer paired for 2FA
  • How to remove AD integration
  • Bitdefender install fails because of pre-existing endpoint solution
  • How to temporarily turn off on-access scanning
  • How to sync endpoints with Active Directory?
  • How to give a customer access to his GravityZone?
  • System requirements for modules
  • How to PERMANENTLY delete an endpoint?

Knowledge Base Categories

  • Bitdefender
  • G DATA
  • Facebook
  • X
  • Instagram
  • RSS

©2025 Contronex, Inc. | 108 10th Street North | Naples, Florida 34102 | 239-649-7836