latest posts

The wider world of security research output: webinars

Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.

Google reveals failure of ‘secret question’ password recall

A research paper from Google has looked into the difficulties of standard ‘forgotten password’ personal information verification.

Adult dating site hacked, leaking private information

Casual dating website ‘Adult FriendFinder’ has been hacked, leaking data from as many as 3.9 million accounts, according to an investigation by Channel 4 News.

Apple bolsters app store security with 2FA and Touch ID

A new update to the Apple Store app for iPhone and iPad has bolstered its security features, adding two-factor authentication (2FA) and increased Touch ID support.

5 security questions to ask before clicking on a link

Should you trust that link? We Live Security runs down five quick security questions to ask before you click on a URL.

Unboxing Linux/Mumblehard

Researcher Alexis Dorais-Joncas explains the new strain of Linux malware, uncovered by ESET researchers.

Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play

ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.

CareFirst data breach leaves 1.1m health insurance customers vulnerable

More than 1.1 million health insurance customers have been left vulnerable by a vast data breach, after criminals gained access to a CareFirst database in a “sophisticated cyberattack.”

DDoS attacks have doubled in a year, says Akamai

Distributed Denial of Service (DDoS) attacks are on the rise, according to cloud service provider Akamai, with more than double the number reported from this time a year ago.

What app permissions should I be wary of?

Mobile applications increasingly want access to various functions on your smartphones and tablets, such as your location and contacts book. But some of these app permissions should not be granted.

Logjam attack leaves tens of thousands of HTTPS websites vulnerable

Tens of thousands of HTTPS websites, mail servers and other internet services could be left vulnerable by a flaw that would allow criminals to snoop and modify encrypted data.

Researchers design ‘decoy password’ system to fool hackers

Researchers have developed a system to protect password databases, allowing hackers to believe they have cracked the file, only to be given fake credentials.

Google and Apple among tech giants urging Obama to block phone surveillance

Google and Apple have signed a letter to President Barack Obama urging him to reject any proposal that would grant police access to encrypted phone data.

Popular GTA V mods come with unwanted malware

Two popular Grand Theft Auto V modifications have been found to contain unwanted additional malware, according to The Escapist.

Aryeh Goretsky talks “very promising” Windows 10 security

Windows expert Aryeh Goretsky discusses threats to Windows past, present and future. Will Windows 10 mean hackers have to work harder?

Love hurts: Online dating scams are Australia’s top financial fraud

Australians were tricked out of around AUS$82 million (US$66 million) during 2014, with online dating scams accounting for the biggest losses.

UK government amends hacking laws to give intelligence service immunity

The British government has passed legislation amending the Computer Misuse Act to prevent GCHQ, the police and intelligence services from prosecution over any hacking into mobile phones and computers.

Apple seeks to block sale of RadioShack customer data

Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars Technica.

How did the Internet change the everyday work of a security researcher?

Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet’s impact on security research.

Google turns down 60 percent of ‘right to be forgotten’ requests

A year after Google introduced its controversial ‘right to be forgotten’ feature, the search giant has published some statistics about its implementation.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Lukas Stefanko

Graham Cluley

David Harley

Cameron Camp

Marc-Etienne M.Léveillé

Jean-Ian Boutin

Raphael Labaca Castro

Lysa Myers

Aryeh Goretsky

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.