latest posts

Google now offers USB key authentication

Google has added an extra layer of security to its browser, by introducing USB authentication to Chrome, the company has announced in an official blog post.

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

Proof-of-concept worm can attack network attached storage

A proof-of-concept worm that can hunt network attached storage (or NAS) devices has been created by a security researcher. According to Tech World, the worm can target devices created by three different manufacturers.

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

Staples the latest to be hit by credit card breach?

Stationary and office supply store Staples is the latest company to be dealing with a credit and debit card breach, according to Brian Krebs at Krebs on Security.

Facebook scans ‘paste sites’ for leaked usernames and passwords

Facebook has a system in place to scan public ‘paste’ sites for email address and password combinations to stay one step ahead of possible leaks, according to The Register.

Obama signs federal credit cards security order

President Barack Obama has signed an executive order to increase security on federal credit cards, and has urged retailers and banks to do similar to combat identify fraud, reports Reuters.

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

Vulnerable web cams and printers have become DDoS launch platforms

Over 4 million UPnP devices could be used to assist in distributed denial-of-service (DDoS) attacks, Akamai has warned.

A brief history of malware 28 years later

Malware has come a long way since its earliest days, and aided by the rapid development of the internet it’s certainly faster spreading than the weeks it took in the days of floppy disk transfer.

Android Lollipop offers password protection against factory resets

The latest version of Android, nicknamed Lollipop, will offer a new feature that could make stolen phones a whole lot less valuable to thieves: the ability to only allow factory resets when entering a password.

Privacy online – what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.

Facebook ‘Safety Check’ allows travelers to alert family

Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.

iPad Air 2 – fingerprint security is here to stay

The latest version of the Apple iPad is due to be announced at an event later today, and according to Gizmodo, the Californian tech company are planning on bringing the fingerprint security system implemented in recent iPhones to its tablet market for the first time.

Cybercrime statistics offer a glimpse into the underworld

A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population – and an insight into a grim underworld dominated by fraud, violence and sexual abuse.

Chase breach: Stolen personal info brings headaches too

On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?

Hungarian soccer fans protest against stadium’s new biometric security

Fans of Hungarian soccer team Ferencvaros have come “en masse to their home stadium in Budapest” to protest the club’s new biometric ID equipment, which controls turnstile entry to the stadium, according to Biometric Update.

POODLE Attack – Google uncovers major flaw in SSL 3.0

In an announcement eerily reminiscent of the early phases of the Heartbleed flaw that took internet security by storm earlier in the year, Google has uncovered an exploit that could allow attackers to decode the plaintext traffic of a secure connection.

October is the Cyber Security Month: stats, events and advice

Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.

Operation Windigo: “Good job, ESET!” says malware author

Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Lysa Myers

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

Graham Cluley

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.