archives
May 2014

Android to power Space Station’s “Star Wars” floating robot

No one is too surprised to meet robots on the International Space Station – its Robonaut has posed for dozens of photos with astronauts – but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.

Watch Dogs: How realistic is PS4 city-hack thriller?

In Ubisoft’s Watch Dogs, a man out for vengeance chooses an odd weapon – a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?

iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.

Thousands of ex-workers in IT “still have password” for old jobs

Ex-employees often still have full access to the network of their previous employer, leaving the company open to “revenge attacks” – or just practical jokes.

Spotify breached – but just one mystery user is hacked

Music streaming service Spotify has urged its Android users to upgrade to a new version of the app after “unauthorized access to our systems and internal company data” – but only one, unnamed person fell victim.

Watch Dogs pirates hit by scurvy Bitcoin-mining malware

Pirates who have downloaded one of the most popular torrent files of this week’s big game release Watch Dogs – ironically, themed around computer hacking – found malware pilfering their virtual gold (well, Bitcoins).

Android “eye spyware” takes photos without users knowing

Android users beware: a loophole in the mobile OS allows apps to take pictures without users knowing and upload them to the internet, a researcher has found.

Oculus Rift used to create “3D battlefield” for cyber defense

Pentagon officials showed off a virtual reality battlefield, using the Oculus Rift motion-sensing 3D VR headset, which turns cyber attacks into 3D visions where defenders can “look around” using the gadgets’s built in accelerometers.

Router attacks: Five simple tips to lock criminals out

Cybercriminals always look for the weakest link when planning their attacks – and failings in home routers can allow another “way in”. A few simple adjustments will keep yours safe.

Password inventor says his creation is now “a nightmare”

Fernando Corbato, the MIT computer scientist widely credited with inventing the computer password, says that he and his colleagues could not foresee the World Wide Web from the early Sixties – and passwords have now become “kind of a nightmare.”

Activision Blizzard attacks hidden market in game “cheats”

Activision Blizzard – makers of game hits such as Call of Duty and World of Warcraft – have taken “aggressive” legal moves against gamers who use illegal software to cheat in games – in particular, the hit strategy title Starcraft 2.

eBay breach news: Posted data dump not valid, password reset issues

As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be “out there” and their passwords need to be changed, we wanted to update yesterday’s coverage of the story.

Support Scam Using (MS-)DOS* Attack

The never-ending Windows support scam often misrepresents obsolete MS-DOS utilities. But three simple rules will bypass most of that social engineering.

Nuclear aircraft carrier hacker pleads guilty

The leader of a gang who attacked 24 websites in search of personally identifiable information – from the unlikely confines of an aircraft carrier – has pleaded guilty.

eBay customers urged to change their passwords after breach

eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.

Rubber “anti-ID” mask foils spy-cams by turning us all into clones

A Chicago artist has created a cheap, effective way for the public to fight back against the growing profusion of security cameras – rubber masks which make the devices unable to identify people by making everyone look the same.

Behind Blackshades: a closer look at the latest FBI cyber crime arrests

Blackshades is a RAT and the FBI has just arrested a lot of people involved in its use and distribution. But what’s a RAT and how will these arrests impact cyber crime?

Samsung raises Apple an eyeball with ultra-secure iris-scan smartphones

High-end Samsung phones could soon ship with a biometric scanner which puts fingerprint-swipe buttons (as seen in both Samsung and Apple’s flagship smartphones) in the shade, security-wise – an iris scanner.

Miniduke still duking it out

At the end of April Microsoft announced that a vulnerability in Word was actively being exploited. New variants of MiniDuke display interesting and novel features. Here, we take a closer look.

Biometrics pioneer now “wary” of monster he has created

Dr Joseph Atick, a pioneer in biometrics, who co-founded early facial recognition companies such as Visionics, now fears that large companies could use new versions of his technologies for electronic surveillance,- and warned of “unexpected consequences” unless the industry changed its habits.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.