latest posts

Home Depot calls on court to dismiss consumer data breach case

The Home Depot has called upon a federal court to dismiss a lawsuit brought about by consumers claiming they were hurt by last year’s data breach.

Online threats only illegal if intentional, rules Supreme Court

The Supreme Court has reversed the decision to convict a Pennsylvania man who directed violent online threats at his ex-wife, citing intent as necessary legal grounds for conviction.

56 million login credentials at risk from app vulnerability

As many as 56 million login credentials may be at risk because of cloud services used incorrectly by app developers, according to new research from the University of Darmstadt.

Is your GoPro camera secretly spying on you?

Poor choices of passwords can lead to your privacy being breached.

How goes the switch to Chip & Signature cards in the US?

With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?

Google to add permission controls in upcoming Android M

At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.

Gaana music streaming hack could affect over 10 million users

One of India’s most popular music streaming services, Gaana, was pulled offline after a hack resulted in a leak of data affecting more than 10 million users.

Phish Phood for Thought

In 2007, David Harley and Andrew Lee suggested at Virus Bulletin that poorly-designed phish quizzes did more harm than good. Has the picture changed much?

Irish businesses may be penalized over inadequate IT security

Irish businesses have been criticized for their IT security standards after it was revealed that a significant majority are not currently meeting the legal requirements.

Bug causes iPhones to crash when sent malicious text message

An exploit has been discovered that causes iPhones and iPads to reboot when sent a string of malicious text.

ESET uncovers another porn clicker on Google Play

Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.

Cyber risk analysis, assessment, and management: an introduction

Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.

Hackers could track subway users via phone accelerometer data

Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway – even when limited reception is available.

Mobile banking security still a barrier for consumers

Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don’t bank on mobile devices cite security concerns as the reason.

IRS hacker attack puts US tax payers at risk

The IRS has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information about more than 100,000 tax payers.

Bluetooth fitness trackers ‘a threat to privacy’

Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data from wearables, IT Pro reports.

Dissecting Linux/Moose: a Linux Router-based Worm Hungry for Social Networks

A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.

Moose – the router worm with an appetite for social networks

A new worm is infecting routers in order to commit social networking fraud, hijacking victims’ internet connections in order to “like” posts and pages, “view” videos and “follow” other accounts.

5 hackers who came over from the dark side

Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.

The wider world of security research output: webinars

Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

David Harley

Lukas Stefanko

Stephen Cobb

Olivier Bilodeau

Cameron Camp

Marc-Etienne M.Léveillé

Aryeh Goretsky

Jean-Ian Boutin

Raphael Labaca Castro

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.