archives
December 2012

The Industrialization of Malware: One of 2012’s darkest themes persists

For several years now, antivirus researchers have observed increasing efficiency and sophistication in malware development and distribution. At the start of 2012, I began using the term “industrialization of malware” to describe this phenomenon. I also drew a picture of the fictitious enterprise “Malware, Inc.” as a means of conveying the transformation that malware has

Phishing and the Smile on the Face of the Tiger

Two rough and ready phishing emails that nevertheless tell us a great deal about the social engineering underlying more sophisticated, graphic-rich scams.

Win32/Gapz: New Bootkit Technique

Win32/Gapz’s new bootkit technique modifies just 4 bytes of the original VBR, has an enhanced dropper and complex kernel mode functionality, and evades ELAM.

Win32/Gapz: steps of evolution

Win32/Gapz has a new technique for code injection and a new VBR infection method. The dropper has many tricks for bypassing detection by security software.

How to keep your email clean and safe

Your email account can be used by cyber criminals to spread malware or attempt to steal personal details from you. Follow our tips for a safer email experience.  Create and use secure passwords As with all your online activity, you should always choose passwords that are hard to guess and to crack. This means long

Securing Your Holiday Tech Gifts, Part 2: Android Guide

The Android ecosystem has taken the market by storm in the last few years, with hundreds of millions of devices, smartphones and tablets, already in the hands of customers, and more on the way this holiday season. As you will know if you read our recent blog post about malware trends in 2013, malicious code

Malicious Apache Module: a clarification

Apache modules are add-on code taking advantage of the Apache module API to extend the functionality of the standard Apache distro. In this case, the binary’s functionality was malicious, but there is no exploitation of a known Apache vulnerability in this case.

New vulnerability on Android Samsung smartphones claimed

Android enthusiasts claim to have discovered a new vulnerability on Samsung smartphones that could allow an attacker to gain administrative access to the device through any installed app.

IT worker jailed for stealing online betting details in Ireland

A French-Moroccan national was jailed by a Dublin court after being found guilty of hacking into the business accounts of an online betting company, according to the Irish Independent.

“Hollywood hacker” sentenced to 10 years jail time

A hacker who broke into celebrity email accounts and leaked nude pictures of Hollywood actors, including Scarlett Johansson, has been sentenced to 10 years in prison, according to an Associated Press report.

Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems

Win32/Spy.Ranbyus shows how it is possible to bypass payment transaction signing/authentication with smartcard devices and has started to modify java code in one of the most popular remote banking systems (RBS) in the Ukraine.

Point-of-sale scam hits countries across the world

New malware that attacks point-of-sale (POS) systems had been detected in 40 countries in recent months. The malware, dubbed “Dexter” is able to skim credit card information from compromised POS systems.

British bank employee accessed bank statements of partner’s ex-wife

A Barclays employee accessed her partner’s ex-wife’s bank statements when he was involved in a legal dispute over the terms of a divorce settlement.

UK Information Commissioner targets spammers

The UK Information Commissioner’s Office (ICO) fined two owners of a marketing company £440,000 ($713,000) for bombarding the public with millions of unlawful spam texts over a period of three years. It’s the first time that the ICO has used its power to issue a monetary penalty for a serious breach of the UK Privacy

ESET mobile solution now available for Android

ESET has announced Endpoint Security for Android, which it says is specifically designed for the contemporary business environment and adds another layer of protection to the family of ESET Endpoint Solutions and features all the benefits made popular by the previous version of ESET Mobile Security Business Edition. The new Android solution also includes Anti-Theft,

ESET Endpoint Security named silver medal winner in Windows IT Pro Editors’ Best Awards

ESET Endpoint Security was named a silver medal winner in the 2012 Editors’ Best Awards in the Best Antivirus and Anti-malware product category by Colorado based Windows IT Pro.

Australian Defence Force Academy attack exposes 20,000 user records

An attack on the Australian Defence Force Academy servers held at the University of New South Wales (UNSW) resulted in the loss of 20,000 user records. According to a report in the Sydney Morning Herald  the hacker, known as Darwinare, managed to break in and steal the records, including passwords and email addresses in a

British police arrest three on suspicion of ransomware scam, victims fooled into paying £100 fines

Detectives from the UK Police Central e-Crime Unit (PCeU) investigating cyber criminals who use “ransomware” have arrested three people.  Ransomware is a form of malicious software or malware that is served up by infected websites (which themselves may be legitimate). Victims inadvertently download the software which infects their computer. The scam takes different forms in

Malicious Apache module used for content injection: Linux/Chapro.A

More than half of all web servers on the Internet use Apache, so when we discovered a malicious Apache module in the wild last month, we were understandably concerned.

The guide to safer online shopping

Many of us now buy goods and services online for the convenience and savings. The experts at ESET put together this guide to safer online shopping so you get the goods you want, and no nasty surprises. Tune your shopping machine Like the tune-up your car gets before a long drive, your laptop may need

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.