latest posts

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Tinder – Top 5 security tips

Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.

Facebook rewards ‘white hat’ hackers with $1.3m bounty

Facebook has announced that it paid out $1.3 million last year to ‘white hat’ hackers, as part of a bounty initiative that rewards developers for spotting flaws in the social network.

Exploits: What are they and how do they work?

What is an exploit and why are they important?

Phishing, exploits and botnets – how can they affect your business?

How can phishing exploits and botnets affect a business?

WhatsApp – Top 5 security tips

WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

Lenovo website hacked, Lizard Squad claims responsibility

Chinese computer manufacturer Lenovo has been victim to a website hack, with Lizard Squad claiming responsibility.

FBI puts $3m bounty on Russian hacker

The FBI has offered a record $3 million reward for information leading to the arrest of a cybercriminal, reports the BBC.

Top 5 security resolutions for 2015

Follow these top 5 security resolutions from We Live Security to make for a safer 2015.

Nine bad botnets and the damage they did

Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all time.

Anthem hack puts at least 8.8 million NON-customers at risk

Even if you’re not a customer of health insurer Anthem, your data could have been put at risk. Be on your guard.

Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP

A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.

British hacker due for sentencing over public service DDoS attacks

A 51 year old man is facing a lengthy prison sentence in the United Kingdom after admitting to a series of distributed denial of service attacks against social housing, social services and crime prevention websites.

Burning Man queue jumping hackers caught out

The online queuing system for the 40,000 tickets to the Burning Man festival was hacked by 200 people accessing a ‘technical backdoor’ to virtually queue jump, according to Computer World.

Kris Jenner reveals naked video could be leaked in iCloud hack

Kris Jenner is reportedly being blackmailed over a naked video that was stolen from her iCloud and could be released in the public sphere.

What is a botnet?

What is a botnet, and what can you do to prevent your computer becoming part of one?

Say What? Required contents of notice in data breach notifications

With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver useful, readable content, other than a general warning to remain vigilant?

Lenovo and Superfish? Don’t panic, you may not be affected

Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

Lenovo apologizes over pre-installed tracking software

Lenovo has issued a public apology, admitting it “messed up badly” by selling laptops with a controversial tracking software pre-installed.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Guest Writer

Stephen Cobb

Cameron Camp

Lysa Myers

David Harley

Sebastián Bortnik

Sébastien Duquette

Pablo Ramos

Aryeh Goretsky

Robert Lipovsky

Marc-Etienne M.Léveillé

Copyright © 2015 ESET, All Rights Reserved.