category
Cybercrime

More D-Link routers are vulnerable to attacks, researcher claims

More vulnerabilities have been discovered in a D-Link router, leaving the device vulnerable to attacks via its web interface – only weeks after the discovery of a “backdoor” in other D-Link devices.

Massive ‘war game’ batters London’s banking system with simulated cyber onslaught

One of the largest cyber ‘war games’ ever created tested thousands of banking staff across London’s investment banks against the ‘worst case scenario’ – a major cyber attack on stock exchanges.

Bitcoin heist nets thieves $1.2 million – and site warns “don’t store your coins on the net”

A cyberheist targeting a bitcoin “bank” website has netted thieves more than 4,100 bitcoins, worth $1.2 million. The hack is among the largest thefts in the currency’s four-year history.

‘Drug market’ Silk Road 2.0 launches on Tor – with new security in place

Only weeks after the closure of Silk Road, a “drug market” which authorities claim shipped $1.2 billion of drugs including heroin around the world, a site styling itself Silk Road 2.0 has appeared. Like the original, it is only accessible via the “anonymous” browser Tor.

FBI adds five new targets to its Cyber’s Most Wanted list – with bounties up to $100,000

The FBI added five new cybercriminals to its Most Wanted list – including a new entry at number one, Alexsey Belan. The FBI aimed a specific warning at criminals who thought they could “hide overseas”.

Adobe breach reveals really terrible passwords are still popular – 2 million used “123456″

Adobe’s security breach laid bare 38 million passwords to the world – and a security researcher claims that 1.9 million of these are the simple “123456”. Half a million craftier customers chose “123456789”

Tom Hanks and Donald Trump among 850,000 victims as limo firm hack leaks addresses and AmEx numbers

Tom Hanks and Donald Trump are among a client list of 850,000 users of limousines and town cars to become the latest “trophy” claimed by hackers, after a breach at a nationwide limousine firm – which netted addresses and credit card details.

Sunrise “smart calendar” app warns of iCloud on the horizon after hack

Smart calendar app Sunrise has revealed it fell victim to the same cyberattack which saw social sharing app Buffer sending out thousands of weight-loss spam posts – and has warned users who link their Sunrise account to iCloud that they may be at risk. In an update released on the company blog, CEO Pierre Valade

Untrained staff and low budgets leave 96% of businesses feeling “unprepared” for cyberattack

A survey of 1,900 executives at clients of the accountancy firm Ernst and Young found that almost all (96%) felt “unprepared” for a cyberattack – due to budget cuts and lack of skilled staff.

Smartphone “contactless” payment systems may be at risk from snooper devices, researchers warn

Phones such as Samsung’s Galaxy S4 ship with Near Field Communication chips built in – and many companies hope to use these for payment systems. But snooper devices may be able to “listen in” as payment apps are used, researchers warn.

Big companies still fall for social engineering “hacks” by phone – and it’s not getting better

Major companies such as Disney, Boeing and General Electric are still handing out information to “hackers” using the most basic tool of all – the human voice, according to a report on a competition at DefCon.

Windows XP users already facing malware invasion – before Microsoft “pulls plug”

Windows XP users already face far higher risks from malware – with XP users facing infection rates six times higher than Windows 8 users. Microsoft will withdraw support for the ageing platform in April next year – despite the fact that one in five PCs on Earth still use it.

Adobe breach far bigger than thought – 38 million records, Photoshop code leaked in attack

Previously, it had been estimated that around three million users had data accessed, but a new report by Brian Krebs of KrebsonSecurity revealed the true scale of the breach may have been far larger than thought – and that source code for software such as Photoshop may also have leaked.

President Obama’s Twitter and Facebook accounts hijacked by hacktivist group

President Obama’s Twitter and Facebook accounts were briefly compromised this week – with two Tweets and one post altered to send links to video montages of terrorist attacks.

Rogue’s gallery? New app aims to “out” cybercriminals who prey on online daters

A new app, Truly.am, aims to put a stop to a fast-growing area of online fraud – online dating scams – by forcing cybercriminals to prove they are who they say they are.

Rebuffed! Social site Buffer fights off onslaught of fruity weight-loss spam

An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer – appearing on official accounts for companies such as Brussels Airlines and Startup Genome.

Cyberattack in Israel “shuts down” road for hours

Attackers used a Trojan program to target a security camera system in the Carmel Tunnels toll road in Haifa, shutting down the road for hours, and causing “hundreds of thousands of dollars” in damage.

PHP site WAS serving malicious code, owners admit after Google raises red flag

When Google’s Safe Browsing service said that programming site PHP.net was hosting and serving malware, it sparked furious discussion – but the site investigated, and has since admitted a Javascript attack, and moved to “clean” servers.

Is this how Indonesia topped the malicious traffic charts?

Indonesia as a major source of malicious traffic? That’s what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.

Millions at risk as guest information from hotel Wi-Fi provider “goes on sale” in China

A huge amount of private information harvested via hotel Wi-Fi networks is on sale in China – including phone numbers, dates of birth and addresses from hotel guests who logged in to networks in their rooms.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
12 Nov 2013
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.