latest posts

IRS hacker attack puts US tax payers at risk

The IRS has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information about more than 100,000 tax payers.

Bluetooth fitness trackers ‘a threat to privacy’

Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data from wearables, IT Pro reports.

Dissecting Linux/Moose: a Linux Router-based Worm Hungry for Social Networks

A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.

Moose – the router worm with an appetite for social networks

A new worm is infecting routers in order to commit social networking fraud, hijacking victims’ internet connections in order to “like” posts and pages, “view” videos and “follow” other accounts.

5 hackers who came over from the dark side

Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.

The wider world of security research output: webinars

Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.

Google reveals failure of ‘secret question’ password recall

A research paper from Google has looked into the difficulties of standard ‘forgotten password’ personal information verification.

Adult dating site hacked, leaking private information

Casual dating website ‘Adult FriendFinder’ has been hacked, leaking data from as many as 3.9 million accounts, according to an investigation by Channel 4 News.

Apple bolsters app store security with 2FA and Touch ID

A new update to the Apple Store app for iPhone and iPad has bolstered its security features, adding two-factor authentication (2FA) and increased Touch ID support.

5 security questions to ask before clicking on a link

Should you trust that link? We Live Security runs down five quick security questions to ask before you click on a URL.

Unboxing Linux/Mumblehard

Researcher Alexis Dorais-Joncas explains the new strain of Linux malware, uncovered by ESET researchers.

Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play

ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.

CareFirst data breach leaves 1.1m health insurance customers vulnerable

More than 1.1 million health insurance customers have been left vulnerable by a vast data breach, after criminals gained access to a CareFirst database in a “sophisticated cyberattack.”

DDoS attacks have doubled in a year, says Akamai

Distributed Denial of Service (DDoS) attacks are on the rise, according to cloud service provider Akamai, with more than double the number reported from this time a year ago.

What app permissions should I be wary of?

Mobile applications increasingly want access to various functions on your smartphones and tablets, such as your location and contacts book. But some of these app permissions should not be granted.

Logjam attack leaves tens of thousands of HTTPS websites vulnerable

Tens of thousands of HTTPS websites, mail servers and other internet services could be left vulnerable by a flaw that would allow criminals to snoop and modify encrypted data.

Researchers design ‘decoy password’ system to fool hackers

Researchers have developed a system to protect password databases, allowing hackers to believe they have cracked the file, only to be given fake credentials.

Google and Apple among tech giants urging Obama to block phone surveillance

Google and Apple have signed a letter to President Barack Obama urging him to reject any proposal that would grant police access to encrypted phone data.

Popular GTA V mods come with unwanted malware

Two popular Grand Theft Auto V modifications have been found to contain unwanted additional malware, according to The Escapist.

Aryeh Goretsky talks “very promising” Windows 10 security

Windows expert Aryeh Goretsky discusses threats to Windows past, present and future. Will Windows 10 mean hackers have to work harder?

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Olivier Bilodeau

Stephen Cobb

Lukas Stefanko

Cameron Camp

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Jean-Ian Boutin

Raphael Labaca Castro

Lysa Myers

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.