latest posts

United Airlines customer flight records breached

United Airlines customer flight records have been lost in a data breach it has been reported.

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Patao Express – Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data.

Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals

As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

Cybersecurity is increasingly a ‘board-level’ issue, finds report

The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.

‘Keystroke Biometrics’ exploit defeats Tor privacy

Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor.

Moonpig warns of password breach – but it may be more than their users who are at risk

Moonpig, the online personalised card company, has blocked the accounts of an unspecified number of customers after users’ details were published online.

How to shop online safely during the summer sales

The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not without its dangers.

New report explains gulf between security experts and non-experts

Security experts and non security experts take very different attitudes to staying safe online, according to new research.

The ABC of Information Security

There are three fundamental elements that must not be overlooked when starting out in corporate security, summarized as the ‘ABC of information security’.

Valve Steam bug sees accounts hacked

A serious bug in Valve’s Steam engine has allowed a series of user credentials to be stolen over the past week, according to reports.

Accidental pocket dials can be used in evidence, says US court

Accidental ‘pocket dials’ are now admissible in evidence against you, the US Appeals court has ruled.

Cybercrime update: take downs, arrests, convictions, and sentences

Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities; so how about this: “Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries”.

Researchers unveil super-fast anonymity network

A group of six academics have published a paper describing a new high speed anonymity network that could increase the privacy of internet users everywhere.

Open SSH bug opens brute force attack window

A newly disclosed bug in widely-used OpenSSH software allows attackers to make thousands of password guesses in a short space of time.

Porn clicker keeps infecting apps on Google Play

A recently identified trojan porn clicker is still infecting apps on Google Play.

Support Scammers and Self-Justification

Support scammers: old twisters, new twists, and scammer psychology.

Tech giants take action on ad click fraud

Some of the biggest digital companies have banded together to take action on the rising tide of ad click fraud.

Hackers demo Jeep security hack

Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle.

11 security mistakes you probably keep on making

When it comes to data security, hackers continue to exploit the biggest weakness – people. So, what are the top security mistakes we keep making?

Smartwatch security ‘lacking’ says HP study

Smartwatch security is noticeably absent in most devices, leaving users at risk of cyberattacks.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Robert Lipovsky

Stephen Cobb

Graham Cluley

Lukas Stefanko

David Harley

Lysa Myers

Joan Calvet

Olivier Bilodeau

Cameron Camp

Copyright © 2015 ESET, All Rights Reserved.