For several years now, antivirus researchers have observed increasing efficiency and sophistication in malware development and distribution. At the start of 2012, I began using the term “industrialization of malware” to describe this phenomenon. I also drew a picture of the fictitious enterprise “Malware, Inc.” as a means of conveying the transformation that malware has
Your email account can be used by cyber criminals to spread malware or attempt to steal personal details from you. Follow our tips for a safer email experience. Create and use secure passwords As with all your online activity, you should always choose passwords that are hard to guess and to crack. This means long
The Android ecosystem has taken the market by storm in the last few years, with hundreds of millions of devices, smartphones and tablets, already in the hands of customers, and more on the way this holiday season. As you will know if you read our recent blog post about malware trends in 2013, malicious code
Apache modules are add-on code taking advantage of the Apache module API to extend the functionality of the standard Apache distro. In this case, the binary’s functionality was malicious, but there is no exploitation of a known Apache vulnerability in this case.
Android enthusiasts claim to have discovered a new vulnerability on Samsung smartphones that could allow an attacker to gain administrative access to the device through any installed app.
A French-Moroccan national was jailed by a Dublin court after being found guilty of hacking into the business accounts of an online betting company, according to the Irish Independent.
A hacker who broke into celebrity email accounts and leaked nude pictures of Hollywood actors, including Scarlett Johansson, has been sentenced to 10 years in prison, according to an Associated Press report.
Win32/Spy.Ranbyus shows how it is possible to bypass payment transaction signing/authentication with smartcard devices and has started to modify java code in one of the most popular remote banking systems (RBS) in the Ukraine.
New malware that attacks point-of-sale (POS) systems had been detected in 40 countries in recent months. The malware, dubbed “Dexter” is able to skim credit card information from compromised POS systems.
A Barclays employee accessed her partner’s ex-wife’s bank statements when he was involved in a legal dispute over the terms of a divorce settlement.
The UK Information Commissioner’s Office (ICO) fined two owners of a marketing company £440,000 ($713,000) for bombarding the public with millions of unlawful spam texts over a period of three years. It’s the first time that the ICO has used its power to issue a monetary penalty for a serious breach of the UK Privacy
ESET has announced Endpoint Security for Android, which it says is specifically designed for the contemporary business environment and adds another layer of protection to the family of ESET Endpoint Solutions and features all the benefits made popular by the previous version of ESET Mobile Security Business Edition. The new Android solution also includes Anti-Theft,
ESET Endpoint Security was named a silver medal winner in the 2012 Editors’ Best Awards in the Best Antivirus and Anti-malware product category by Colorado based Windows IT Pro.
An attack on the Australian Defence Force Academy servers held at the University of New South Wales (UNSW) resulted in the loss of 20,000 user records. According to a report in the Sydney Morning Herald the hacker, known as Darwinare, managed to break in and steal the records, including passwords and email addresses in a
Detectives from the UK Police Central e-Crime Unit (PCeU) investigating cyber criminals who use “ransomware” have arrested three people. Ransomware is a form of malicious software or malware that is served up by infected websites (which themselves may be legitimate). Victims inadvertently download the software which infects their computer. The scam takes different forms in
More than half of all web servers on the Internet use Apache, so when we discovered a malicious Apache module in the wild last month, we were understandably concerned.
Welcome to the new ESET blog: We Live Security. In fact, We Live Security is a lot more than a blog: it contains the same great content you have enjoyed on blog.eset.com, but also includes new features and a wider range of content. For example, here’s a podcast talking about the new site, one of