Have you checked out the weekly podcast by ESET security researchers? It’s called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.
APTs – or Advanced Persistent Threats – are the most menacing cyber attack there is, some say. Built to be stealthy, they penetrate networks, steal secrets – and vanish. ‘Catching’ one was a little like finding Bigfoot – but the much-hyped threat wasn’t quite so scary up close…
As wireless technologies and electronic controls are increasingly built into cars, vehicles could become vulnerable to hackers – either stealing information, or injecting malware, a U.S. Senator warned – inspiring debate on how real this threat is.
Microsoft’s telepathic power, of course, comes from AI, not magic, and illustrates very clearly which passwords are easy for a computer to “guess” – the tool Telepathwords, guesses the next letter as you type in a password.
For years, “encryption” has sounded like James Bond technology to many PC users – but new systems have ensured it’s easy to use, and a great way to protect the files you REALLY value.
Only weeks after Microsoft unveiled a global Cybercrime Center armed with new, hi-tech tools to combat crime, it announced it had carried out a global action leading to “significant disruption” of the Siferef botnet, a network controlling up to two million “zombie” PCs.
A vulnerability in Android could allow attackers to “unlock” phones without cracking PIN codes – using malware to deactivate Google’s locks on handsets and tablets. The vulnerability can “turn off” all locks a user puts in place.
Personal information for up to 465,000 customers of JP Morgan, Chase & Co. may be at risk after hackers breached its network in July, the bank has admitted. Some reports claim that hackers had access to unencrypted, private information.
Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.
An audio communication system designed for ultrasonic underwater communications can be used to steal data – even from disconnected PCs in secure environments, by relaying it to the outside world from PC to PC through computer speakers, researchers claim.
Apple users may soon be able not only to unlock their devices simply by showing their face – they may be able to “control” functions on Macs, iPhones and iPads simply by looking at the screen, and prevent people nearby snooping on lock screen alerts.
In the previous Thoughtful Phisher blog, we looked at some visual clues that should tip you off that a email from a ‘bank’ is not to be trusted. Just as interesting here, though, is the variety of social engineering gambits used by this wave of phish campaigns. It’s worth taking a closer look at some
An Iranian news agency has said that “malware worse than Stuxnet” may soon be unleashed, to “spy on and destroy the software structure of Iran’s nuclear program”.
One of the ‘dark marketplaces’ offering illegal and semi-legal services via the anonymized web browser Tor has shut down, according to reports – with a user fleeing with millions of dollars worth of Bitcoin.
At least two recent models of Google’s flagship Nexus Android handsets can be crashed remotely – simply by sending them a flurry of SMS text messages, a Dutch researcher has warned.
Systems at Harborview Medical Center and University of Washington Medical Center were infected with malware in October after an employee opened an infected email. This put thousands of patients’ data at risk.
Despite the heists against Bitcoin sites, plus high-profile law-enforcement actions against ‘dark market’ sites such as Silk Road, which conducted transactions in Bitcoin, the currency is soaring. We asked ESET experts, and finance advisors, for tips on how to stay safe.
Major websites such as Kickstarter, WarnerBros.com and the online photography community 500px.com are among 2,000 at risk from a vulnerability that could allow attackers to impersonate real users and access their sites, according to a researcher.