archives
November 2012

Win32/Gataka – or should we say Zutick?

Win32/Gataka is an information-stealing Trojan that has been previously discussed on this blog here and here. Recently, we came across a post from its author on an underground forum trying to sell his creation. The post contained a help file detailing the inner working of this threat. This blog post will highlight some of the

Premium Rate Scams and Hoaxes

Not all premium scam alerts are useful, but that doesn’t mean that premium rate telephone scams aren’t a significant problem.

Free cyber security resources to keep on your radar

Protecting your organization against cyber criminals and digital scammers is not easy, and it's certainly not cheap. A vital part of building and maintaining effective defenses is access to security knowledge and expertise, which may not even be a budget item if your organization happens to be an SMB, local government agency, or non-profit. One

New Support Scam Gambits: Frozen Virus a Frozen Turkey

New variations on the ‘pay us to fix your non-existent viruses’ scam: Windows Indexing, the Frost Virus, and scam globalization.

Support Scams and the Surveillance Society

Even if you really do have an infected system, it doesn’t mean that anyone who rings out of the blue knows as much about you and your PC as they want you to think.

Safer cyber-shopping makes for happier holidays: 12 simple safety tips

The 2012 holiday shopping season is fast approaching and digital devices are sure to play a bigger role in the holiday shopping process than ever before, from pre-purchase research on the home or office computer, to in-store price checking on the smartphone. And of course, online holiday shopping is available 7×24, from before Black Friday,

Win32/Morto – Made in China, now with PE file infection

In July 2012, our virus laboratory came across what we first thought was a new family of malware. The threat spread by infecting Portable Executable or PE files used by Windows, but this malware also infected systems through remote desktop and network shares. After further analysis, we realized we were dealing with a new version

Digital photos demand a second look as picture-stealing threat develops

How many image files do you have on your computer? Would you be happy to send them all to a stranger? How about the photos on your smartphone? These are some of the questions I pondered this past weekend in light of several seemingly unrelated events from the previous week. (As a random data point,

Wauchos Warhorse rides again

Win32/TrojanDownloader.Wauchos, a Trojan downloader that peaked briefly back in May, is enjoying a resurgence in the UK and Europe thanks to an energetic spam campaign.

Flashback Wrap Up

Six months ago, Flashback was attracting a lot of attention from researchers and media due to its wide spread and interesting features. Since then, we have witnessed its operator abandoning control of the botnet by shutting down its latest command and control server. This happened in May this year. The number of infected systems has

Windows 8: there’s more to security than the Operating System

Disasters, new hardware, new software: to the phish scammer, it’s all potential bait for reeling in victims.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.