search result

Which Army Attacked the Power Grids?

The hot news http://blog.eset.com/2010/07/17/windows-shellshocked-or-why-win32stuxnet-sux is of a zero-day vulnerability that has been used to attack SCADA systems. This comes hot on the heels of an article on the Wired web site titled “Hacking the Electric Grid – You and What Army” http://www.wired.com/dangerroom/2010/07/hacking-the-electric-grid-you-and-what-army/. So clearly Wired had already predicted the origins, at least vaguely, of Win32/Stuxnet.

Extended Validation SSL

  We received and interesting comment in reply to the blog post http://www.eset.com/threat-center/blog/2009/10/13/phishing-the-fbi-and-terror. Joseph A’Deo, who apparently works for Verisign, mentioned the use of extended validation SSL (EV SSL). I am sure that some of you are familiar with EV SSL. Some of you have seen the results of it and perhaps not noticed. Some

OSX/Keydnap spreads via signed Transmission application

During the last hours, OSX/Keydnap was distributed on a trusted website, which turned out to be “something else”. It spread via a recompiled version of the otherwise legitimate open source BitTorrent client application Transmission and distributed on their official website.

2016 Rio Olympic Games: The safe way to obtain tickets online

Don’t get fooled by criminals before the 2016 Olympic Games in Rio, says ESET’s Ondrej Kubovič. These sporting events are a prime target for fraudsters.

Infrastructure attacks: The next generation

ESET’s David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?

Buying Ray-Bans? Don’t fall for this Facebook scam

Recently, we’ve observed a new wave of scams on Facebook. Crooks are luring social network users to visit bogus Ray-Ban e-shops and buy heavily discounted sunglasses there. Victims’ payment card details are at risk.

One-third of HTTPS websites left vulnerable to DROWN attack

A new vulnerability could leave as many as one-third of HTTPS websites open to decryption.

iOS AirDrop vulnerability allows for malware installation on Apple devices

A security expert has found a vulnerability on iOS devices that allows malware to be installed via AirDrop.

10 steps to staying secure on public Wi-Fi

The convenience of public Wi-Fi for many people is invaluable, yet there are risks. With all this in mind, here are 10 tips to staying safe.

How to shop online safely during the summer sales

The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not without its dangers.

Dissecting Linux/Moose: a Linux Router-based Worm Hungry for Social Networks

A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.

1,500 iOS apps open to simple man-in-the-middle attacks

Around 1,500 apps for iPhone and iPad contain an HTTPS vulnerability making it ‘trivial’ for hackers to perform man-in-the-middle attacks to steal passwords, bank details and other private information.

Lenovo and Superfish? Don’t panic, you may not be affected

Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

iCloud users in China under attack. But who could be after their passwords?

Make sure you are running a half-decent browser, don’t ignore browser security warnings, and enable two-factor authentication.

That appears to be the lesson to learn from the latest attack on Chinese internet users.

Gamescom 2014: World of Malware?

The gaming industry keeps growing, and the crowds at Cologne’s Gamescom 2014, show why big game titles are rapidly becoming a target for cybercrime. Our tips will help you enjoy the latest games – without hackers declaring ‘Game Over’.

Heartbleed bug: worse than feared and could affect “billions”

The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some claiming a billion smartphones may be at risk, as well as a statement allegedly from the US government over its use of the bug.

Windigo not Windigone: Linux/Ebury updated

There have been some interesting new developments since we published our report on Operation Windigo. In this blog post you will read about a Linux/Ebury update, and the reaction of the criminal gang to our post.

Borrowing tricks from cybercriminals can ‘scare’ web users into safe browsing, Cambridge researchers claim

Computer users often feel bombarded by warnings about malware – particularly in internet browsers, which often repeatedly warn about risky sites – but tricks used by cybercriminals can help stop this, a new paper claims.

Why “crypto” isn’t just for spies: A beginner’s guide to keeping secrets

For years, “encryption” has sounded like James Bond technology to many PC users – but new systems have made “crypto” technology easier to use, and a great way to protect the files you REALLY value.

Copyright © 2017 ESET, All Rights Reserved.