latest posts

Hackers hijack song contest with Eurovision voting app attack

The voting system used by the Eurovision Song Contest was briefly forced offline after a suspected cyberattack caused an “extreme” surge in activity,.

ESET’s Mark James on addressing business security employee issues

ESET’s Mark James on the issues employees have with business security measures, and how to counter the difficulties without compromising safety.

PoSeidon Malware attacks Point of Sale credit card transactions

Point of Sale credit card terminals are under threat from a new malware named PoSeidon, thought to be more dangerous than the Zeus exploit kit that was used to steal millions of card details from Target customers.

Tinder hack sets heterosexual men up with each other

A hacker has discovered that the openness of Tinder’s API allowed him to set up unknowing men via a fake female profile they both believed that they were talking to.

Irish government’s Freedom of Information website hacked

The Irish government’s Freedom of Information (FOI) website has been targeted by hackers claiming to be connected to the ISIS terror group.

Threat sharing bill introduced to House of Representatives

The House of Representatives Intelligence Committee has introduced a new threat sharing bill designed to let businesses share details of security treats without fear of litigation, reports Gizmodo.

Canada’s “secret hacking tactics” exposed in new report

Canada has been using an array of cyberweapons to gather intelligence, spy on other governments and damage adversary infrastructure, says a new report.

Mobile security: IBM/Ponemon study finds enterprise app security weaknesses

Nearly 40 percent of large companies – including a significant number in the Fortune 500 – are not taking necessary precautions to secure the apps that they’re providing their customers.

Twitch backs down on 20-character passwords in wake of hacking

Twitch has backed down on its attempts to force stronger password complexity on its site post-hacking, after multiple complaints from its userbase.

Five hacker movies that got things badly wrong

5 hacker movies that got computer security well off the mark.

Hilton HHonors accounts put at risk of hijacking through simple web flaw

Security researchers discovered a vulnerability on the Hilton HHonors website, making it straightforward to hijack any other user’s account.

Millions of computers left vulnerable to BIOS chip hack

A vulnerability has been detected in the BIOS chips found in millions of computers which could leave users open to hacking.

Cisco vulnerability could allow attackers to eavesdrop on private conversations

A vulnerability in Cisco’s SPA300 and SPA500 IP phones could allow hackers to eavesdrop on private conversations from anywhere in the world, reports The Register.

UK businesses are unprepared for potential data breaches

Many UK businesses are unequipped to respond to potential data breaches, according to two new independent reports published this week.

7 tasks that waste your IT team’s time

IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things that waste your IT team’s time.

Hacker threatens cyberattacks against Detroit over court decision

A hacker going by the name of ‘Bitcoin Baron’ has issued a threat to the city of Detroit after a Wayne County Circuit Court Judge dismissed a police manslaughter charge.

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Facebook announces peer-to-peer payments between friends

Facebook has announced a new feature of its Messenger product, which allows friends to send payments directly to each other, reports Tech Crunch.

Google Play security tightened with human screening process

Google is taking additional security measures to shut out malware from its app store by introducing a human screening process.

Premera Breach: Healthcare businesses in the crosshairs

Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach. What can healthcare businesses do to get themselves out of the crosshairs?

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

David Harley

Aryeh Goretsky

Marc-Etienne M.Léveillé

Joan Calvet

Guest Writer

Stephen Cobb

Cameron Camp

Sebastián Bortnik

Sébastien Duquette

Pablo Ramos

Copyright © 2015 ESET, All Rights Reserved.