category

Cybercrime

Auto industry publishes first ever cybersecurity best practices

The auto industry has published its first set of cybersecurity best practices, as it attempts to combat rising and future threats facing the connected car.

Clash of Kings forum hacked, 1.6 million account details put at risk

Vulnerable version of vBulletin thought to be responsible for data breach which could impact almost 1.6 million game players.

Pokémon GO goes down: Hackers claim responsibility

Both the OurMine and PoodleCorp hacking gangs appear to be taking credit for Pokémon GO being offline over the weekend. But might there be a more down-to-earth explanation?

Pokémon GO hype: First lockscreen tries to catch the trend

ESET has discovered the first ever fake lockscreen app on Google Play, named Pokemon GO Ultimate. As its characteristics suggest, it deliberately locks the screen right after the app is started forcing the user to restart the device.

Over 1000 Wendy’s restaurants hacked – customers’ credit card details stolen

Fast food giant Wendy’s says that it now believes that more than 1000 of its restaurants across the United States have fallen victim to a hacking gang, who used malware to steal customers’ credit and debit card information.

Cash machines turn 49 today: Are ATMs really that secure?

Forty-nine years after the first ATM was installed in London, we ask how secure our cash machines are today?

Crimeware: Malware and massive campaigns around the world

Cases of malware and crimeware incidents are reported daily around the world. Indeed, the number of reports, detections and threats grows constantly.

Mandatory password reset for some Facebook and Netflix users in wake of mega-breaches

Don’t panic. Facebook and Netflix have not suffered a data breach. But it’s quite possible that they are asking you to change your password.

Is the federal government doing enough to catch and prosecute computer criminals?

With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.

65 million Tumblr users should probably be careful…

65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it’s not just their passwords that they should be concerned about.

Teenager charged over Mumsnet hack and DDoS attack

An 18-year-old man has been charged by British police in connection with an internet attack that saw Mumsnet hacked, users’ accounts breached, passwords stolen, and the site blasted offline.

ESET releases new decryptor for TeslaCrypt ransomware

If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or left unchanged, then ESET has good news for you.

Operation Groundbait: Espionage in Ukrainian war zones

After BlackEnergy and Operation Potao Express, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait.

Privacy and security fears – predictably – impact US online commerce

US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.

Ransomware and the Internet of Things

A report from the Institute for Critical Infrastructure Technology warns that ransomware could be hitting more than just your regular computer in future…

SMS phishing attackers continue to pursue Apple users

You would be wrong to think that this is just an attempt by the criminals to steal your Apple ID password – bad as that would be. It’s much worse than that.

Mumblehard takedown ends army of Linux servers from spamming

One year after the release of the technical analysis of the Mumblehard Linux botnet, it is no longer active. ESET, in collaboration with the Cyber Police of Ukraine and CyS Centrum LLC, have taken down the botnet, stopping its spamming activities.

Vulnerabilities, exploits and patches

David Harley, a senior research fellow at ESET, offers expert answers to six important questions that concern vulnerabilities, exploits and patches.

Analysis of the Locky infection process

In recent months, there has been a significant increase in the number of networks and users affected by ransomware known as Locky, discusses ESET’s Diego Perez.

Follow us

Copyright © 2016 ESET, All Rights Reserved.