latest posts

How George Clooney made sure phone hackers didn’t ruin his wedding

Newly weds George Clooney and Amal Alamuddin supplied guests with “burner phones” to prevent photographs from falling into the hands of hackers and the tabloid press.

Week in security: Bash Bug, BlackEnergy and hoax attacks

This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.

What to do about Shellshock Bash bug on Mac OS X, web servers, routers, and more

The “Bash Bug” or “Shellshock” vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patched to prevent abuse by malicious persons. Here’s advice about what to do and links to more in-depth resources.

4Chan: destructive hoaxes and the Internet of Not Things

The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.

Healthcare data worth ten times price of credit card data

Medical information is now worth up to 10 times the price of credit card details on online black markets, due to weak healthcare security and a thriving black market in data to be used for medical fraud.

eBay scams – site says ‘no plans’ to ban ‘active’ listings

Auction site eBay has remained defiant about ‘active’ listings ,containing computer code, despite multiple reports indicating that these are being used for phishing attacks.

Destiny game servers under attack

The hit shoot ‘em up Destiny has been targeted by a cybercriminal gang thought to be behind recent attacks on game companies including Sony and Blizzard, creators of World of Warcraft.

Emma Watson images – ‘countdown’ to leak after UN speech

In what appears to be a misogynist attack directed at Harry Potter actress Emma Watson, a site has appeared supposedly offering a countdown until images of her are released online.

Facial recognition – boom in sites such as dating services

Facial recognition is booming, with the market expected to grow from $1.92 billion to $6.5 billion in 2018 – and invading markets such as dating, with Match.com integrating a service which finds users dates based on their exes.

What’s behind the rise in cybercrime? Find out from this recorded presentation

Home Depot says it was hacked to the tune of 56 million payment cards. What is behind the current wave of cybercrime? This recorded presentation offers answers and some defensive strategies for organizations at risk.

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that’s evolved into a sophisticated threat with a modular architecture.

Home Depot data breach – ‘warnings ignored since 2008’

Home Depot staff repeatedly ignored the concerns of employees about the security of its systems, prior to the Home Depot data breach, now thought to be the largest in history.

Facebook to start charging $2.99/month? It’s nonsense!

Thousands of Facebook addicts are feverishly sharing a “news report” claiming that from November 1st you’ll be paying $2.99 every month to access the site.

Virus Bulletin presentations update

Updated information on ESET presentations at Virus Bulletin 2014.

How to protect yourself after the Home Depot breach

Home Depot has issued a statement today that provides more details about their recent breach, as well as indicating that the malware used by the attackers has now been removed from their systems. This breach appears to be even larger than Target’s, as it exposed payment information for 56 million customers in their US and Canada locations.

National Health IT Week – tips for starting Risk Assessment

This week is National Health IT Week, and you may be wondering – what is the best way to observe this occasion? While planning for catastrophe may not seem the most celebratory activity, this week is a great occasion to start or review your organization’s risk assessment.

Right to be forgotten – why do Americans want it?

A poll has found that more than half (61%) of Americans want a ‘right to be forgotten’ from search engines such as Google, as the European Union passed into law earlier on this year.

Week in security: Free iPhone scams target eager fans

This week offered a lesson in how cybercriminals follow the news, and time their attacks to dupe the unwary – with several different attacks aimed at iPhone fans, in the week where Apple unveiled its iPhone 6.

Scottish independence poll – warning over phishing scams

This Thursday, September 18, is the biggest day in Scottish political history, as the country votes on whether it should become independent from the United Kingdom – but an ESET security expert has warned cybercriminals could strike.

eBay scam: site ‘slow to react’ after iPhone phishing attack

The dangers of clicking on links in eBay scam postings were highlighted after a fake posting advertising iPhones linked to a phishing site designed to steal usernames and passwords for the site.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Stephen Cobb

David Harley

Robert Lipovsky

Lysa Myers

Marc-Etienne M.Léveillé

Aryeh Goretsky

Bruce Burrell

Copyright © 2014 ESET, All Rights Reserved.