latest posts

Phishing attacks ‘enough’ to breach many industrial systems

Basic phishing attacks and easily available tools are all that is needed to compromise many industrial control systems, the head of cybersecurity for the U.S. Department of Energy’s Strategic Petroleum Reserve has warned.

People are willing to trade private data for pistachio cookies

Many New Yorkers don’t place a particularly high value on their private data – from fingerprints to social security numbers – having proven willing to give away such details in return for a literal, edible cookies.

FBI opens malware tool for public “crowdsourcing”

The FBI has opened up its previously in-house malware analyzing tool to the public in order to crowdsource more samples for speedier response, according to The Register.

Found an exploit in Chrome? You could have just earned $15,000

In a bid to improve the security of its Chrome browser, Google has announced that it is upping the ‘bounty’ paid to people who successfully find bugs and exploits hidden in the browser up to a maximum of $15,000. This is an impressive increase on the previous cap of $5,000, reports betanews.

Snapchat privacy – spam deluge may make users feel fat

Concerns over Snapchat privacy rocketed this week after users were bombarded with spam messages written in a style which suggests that a user’s own friends think they are overweight.

Bootkits, Windigo, and Virus Bulletin

ESET research on Operation Windigo received an award at Virus Bulletin 2014. Our research on bootkits was also well received, and is now available publicly.

How to fix Shellshock Bash on Mac OS X: Mavericks edition

Apple Mac OS X users concerned about the Bash vulnerability dubbed Shellshock got some relief late yesterday as Apple published fixes for various versions of OS X. But if you use Mavericks you will need to install 10.9.5 before the Bash fix will work.

StealthGenie CEO arrested for marketing ‘illegal stalking app’

The creator of an app that secretly allows you to monitor another person’s smartphone usage without their knowledge has been arrested in Los Angeles, according to Slashgear.

FBI Director “very concerned” with smartphone encryption

With Apple, Google and other tech companies responding to users’ demands for privacy with further smartphone encryption options, not everyone is happy. FBI Director James Comey is “very concerned” about increased mobile OS encryption, according to TechSpot.

Support Scams: Expect the Scammish Inquisition*

An update on support scams: but are the scammers looking for fresh fields and posturings new?

How George Clooney made sure phone hackers didn’t ruin his wedding

Newly weds George Clooney and Amal Alamuddin supplied guests with “burner phones” to prevent photographs from falling into the hands of hackers and the tabloid press.

Week in security: Bash Bug, BlackEnergy and hoax attacks

This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.

How to resolve Shellshock on Mac OS X, web servers and more

The “Bash Bug” or “Shellshock” vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patched to prevent abuse by malicious persons. Here’s advice about what to do and links to more in-depth resources.

4Chan: destructive hoaxes and the Internet of Not Things

The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.

Healthcare data worth ten times price of credit card data

Medical information is now worth up to 10 times the price of credit card details on online black markets, due to weak healthcare security and a thriving black market in data to be used for medical fraud.

eBay scams – site says ‘no plans’ to ban ‘active’ listings

Auction site eBay has remained defiant about ‘active’ listings ,containing computer code, despite multiple reports indicating that these are being used for phishing attacks.

Destiny game servers under attack

The hit shoot ‘em up Destiny has been targeted by a cybercriminal gang thought to be behind recent attacks on game companies including Sony and Blizzard, creators of World of Warcraft.

Emma Watson images – ‘countdown’ to leak after UN speech

In what appears to be a misogynist attack directed at Harry Potter actress Emma Watson, a site has appeared supposedly offering a countdown until images of her are released online.

Facial recognition – boom in sites such as dating services

Facial recognition is booming, with the market expected to grow from $1.92 billion to $6.5 billion in 2018 – and invading markets such as dating, with Match.com integrating a service which finds users dates based on their exes.

What’s behind the rise in cybercrime? Find out from this recorded presentation

Home Depot says it was hacked to the tune of 56 million payment cards. What is behind the current wave of cybercrime? This recorded presentation offers answers and some defensive strategies for organizations at risk.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

David Harley

Stephen Cobb

Graham Cluley

Robert Lipovsky

Lysa Myers

Marc-Etienne M.Léveillé

Aryeh Goretsky

Bruce Burrell

Copyright © 2014 ESET, All Rights Reserved.