latest posts

Security concerns prompts ‘gold rush’ for Chinese enterprise computing market

Concern over the security of Windows in China has led to a ‘gold rush’, as Chinese firms race to fill the gap left by Microsoft’s operating system, reports Reuters.

Rombertik: the malware that destroys computers if detected

Researchers have uncovered a new malware which will try to ‘destroy’ the computer if it suspects it is being analyzed, reports First Post.

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.

Australian game hacker flees to Europe before trial

An Australian man facing 25 hacking charges has fled to Europe, ahead of being trialled for attacks which targeted major computer firms.

Smartphone Authentication: the Passing of the Passcode?

Smartphone authentication: is biometric technology ready to replace PINs and passwords?

Microsoft to overhaul security updates for Windows 10

Microsoft is set to introduce a new update system for Windows 10 that will effectively do away with Patch Tuesday.

Online democracy by 2020? University reveals e-voting security breakthrough

A breakthrough in e-voting from the University of Birmingham suggests that the old ballot box tradition may come to an end in time for future votes across the UK.

Hackers blamed for Bridezilla post on photographer’s Facebook page

Is a hacker really to blame for unflattering comments posted on a wedding photographer’s Facebook page?

David Harley: “New scams are difficult to spot even for a trained eye”

Harley says that scams and social engineering have been a constant in cybercrime – but in the past few years, some scams have got markedly more sophisticated, and more difficult even for a trained eye to spot.

National Small Business Week: a cybersecurity survival guide

It’s National Small Business Week in the U.S. and, because properly protecting the digital assets of your small business could be vital to its success, here’s a cybersecurity survival guide.

The world’s most wanted hackers

The FBI is taking cybercrime seriously. Here are some of the most wanted hackers in the world, and what they’re wanted for…

Google releases Password Alert: an anti-phishing Chrome extension

Google has taken a stand against phishing attacks by revealing Password Alert: a Chrome extension designed to neutralize them after a user is taken in.

Ryanair hack: $5 million stolen from low-cost airline

Budget airline Ryanair has been the victim of a major banking hack, with more than $5 million stolen from its business account last week.

5 signs you’re in hackers’ sights

“It won’t happen to me” is often uttered by citizens and businesses who are adamant that they won’t become a victim of cybercrime. But this confidence is often misplaced, with even the most basic security errors exploited by hackers.

Accident Scam Waiting to Happen

Beware of that accident scam call or text: losing money isn’t the only risk.

Smart technology could give hackers key to the city

The adoption of smart technology to power city services could leave urban areas “wide open” to being hacked on a mass scale, says a cybersecurity expert.

IDS, Firewall and Antivirus: what you need to have installed?

What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.

Hand implant chip lets hacker attack Android phones via NFC

A security expert has had a computer chip designed for tracking cows implanted into his hand by an ‘unlicensed amateur’ to hack phones from underneath the skin, reports Gizmodo.

Interop in Las Vegas: interconnecting everything post-PC

Reporting from Interop 2015, Las Vegas, where it’s all about the connectivity and the massive leaps forward in network capacity and speed, but security concerns are also in the mix.

Unboxing Linux/Mumblehard: Muttering spam from your servers

Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

David Harley

Graham Cluley

Stephen Cobb

Cameron Camp

Marc-Etienne M.Léveillé

Jean-Ian Boutin

Raphael Labaca Castro

Lysa Myers

Aryeh Goretsky

Joan Calvet

Guest Writer

Copyright © 2015 ESET, All Rights Reserved.