Author
Rob Waugh
Rob Waugh
Independent Correspondent

Highlights of your career? Interviewing one of the team that broke the Enigma code.

What malware do you hate the most? The Love Bug - I was the guy who opened it.

Favorite activities? Testing smartphones (I often have three or more on the go).

When did you get your first computer and what kind was it? 1984, ZX Spectrum.

Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.

More Info

Facebook’s ‘Deepface’ photo-matching is nearly as good as human brains

Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings – a huge leap forward in the technology, with some potentially alarming implications for privacy.

Google Glass spyware lets snoopers “see through wearer’s eyes”

Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.

Revenue Service breach may have leaked data on 20,000 employees

Personal data for around 20,000 workers for the U.S. Internal Revenue Service (IRS), including names, social security numbers and addresses may have been exposed, after an employee plugged a thumb drive into a computer on an unsecured home network.

More than 80% of business leaders feel “unprepared” for cyber incidents

More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a new survey by the Economist Intelligence Unit – despite 77% of companies having faced such incidents in the past two years.

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

“You have cancer” phishing attack shows how low cybercriminals will go

A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization – but it’s a malware-laced scam.

New wearable from makers of Pine smartwatch aims to be “key to everything”

A new wearable authenticator built to be the key to “everything” will be designed by some of the hottest new talents in wearable technology, including the creators of the Neptune Pine smartwatch – one of the only wearable devices to work independently of smartphones.

Microsoft Word users urged to apply urgent fix after targeted attacks

Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially crafted” Rich Text Format file allowed attackers to remotely execute code on the victim’s machine.

Brainwave privacy standard “is needed” to prevent spying on EEG scan data, researchers warn

Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.

Fake video of Malaysia Airlines flight MH370 rescue is ‘callous’ cyber scam

A post promising a video of a plane landing on water has been circulating on Facebook, with a title suggesting that it contains news footage of the rescue of passengers on board the missing flight MH370 – but there is no video, and it’s a criminal scam.

Hidden backdoor in top Samsung Galaxy models ‘allows remote spying on users’

A hidden backdoor in the modified version of Android run by nine Samsung Galaxy models could allow attackers to spy remotely on user data – and even snoop on users using hardware such as the GPS system, camera and microphone.

Top e-commerce sites still fail to warn users who choose “password”

Two-thirds of top e-commerce sites still accept the weakest passwords, such as “123456” and “password” without warning users that these are the very first passwords hackers will use in attempts to breach their accounts, according to a new survey.

Fridge attacks “raise big questions” says Microsoft security chief

The emerging ‘internet of things’ raises big security questions, and vulnerabilities in connected devices such as ‘smart’ fridges may force companies to work together in a way never previously seen, according to Microsoft’s Jan Neutze.

Whatsapp security fears over rogue apps ‘reading’ user chats

Hit messaging app Whatsapp may not be as secure as its 450 million users believe – after an independent security consultant revealed a loophole which rogue app developers could use to steal Android users’ entire Whatsapp history.

Smartphones with fingerprint-scanning screens ‘on sale by summer’

Smartphones such as iPhone 5S rely on buttons to scan fingerprints – but the CEO of biometrics firm CrucialTec says that smartphones with a new hi-tech bezel-free screen which scans fingerprints will go on sale this summer.

Twitter kills off ‘stalker’ bug that let users spy on protected Tweets

Twitter has removed a bug that allowed site users to spy on protected accounts, reading supposedly protected Tweets via SMS or push notifications, regardless of whether users had approved them as followers.

Google Glass app offers new level of security for ATM users

A futuristic app uses Google Glass to add an extra layer of privacy for users withdrawing cash from ATM machines – by displaying a one-time personal identification number (PIN) which only the Glass user can see.

Financial files from Mt Gox supposedly ‘leak online’ after CEO targeted

A file of material purporting to include detailed information on trades at the Bitcoin exchange Mt Gox, has surfaced online, after attackers targeted the personal blog and Reddit account of CEO Mark Karpeles.

Five ‘new friends’ to avoid like the plague on social networks

Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack – and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.

How cybercriminals ‘market’ email attacks – and why LinkedIn lures are today’s prize phish

Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how effective a particular email is, according to an email security specialist.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.