category

Cybercrime

Vulnerabilities, exploits and patches

David Harley, a senior research fellow at ESET, offers expert answers to six important questions that concern vulnerabilities, exploits and patches.

Analysis of the Locky infection process

In recent months, there has been a significant increase in the number of networks and users affected by ransomware known as Locky, discusses ESET’s Diego Perez.

Photos of Harry Styles and Kendall Jenner leak online after iCloud account hack

More than 30 photos of the celebrities have been posted on Twitter by a hacker who appears to have stolen the pictures from the iCloud account of Styles’s mother, Anne.

Beware spear phishers trying to hijack your website

If you fail to take proper care, it would be all too easy to type your password into a phishing site and hand control of your website over to a online criminal gang.

Super Tuesday is still offline. What’s the catch?

Even though the US is among the most technologically advanced nations in the world, most of its voters cannot cast their ballots online. Is internet voting a risk? Ondrej Kubovič reports.

5 threats every company needs to pay attention to

ESET’s Pablo Ramos takes a closer a look at the most common threats facing companies today and the impact that they can have.

Why cybercrime isn’t fun and (video) games

Research shows that the average age of cybercrime suspects last year was just 17 years-old. We Live Security asks why, and suggests how you can protect your child.

How the threat experts see it …

A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.

European firms’ financial departments the target of cyberattacks

Two major cyberattacks have siphoned over $50 million and nearly $80 million from a Belgian bank and an Austrian aircraft parts manufacturer, respectively. They were both victim to a scam known as Business Email Compromise.

Skype finally hides your IP address, to protect against vengeful gamers

For too long streaming video gamers have suffered denial-of-service attacks and raids from police SWAT teams, often assisted by Skype leaking private IP addresses.

Irish lottery and ticket terminals knocked offline by DDoS attack

It should have been a great week for the Irish Lottery, with the largest jackpot (12 million euros) for 18 months up for grabs.

However, things didn’t run entirely smoothly in the run-up to the Wednesday night draw.

New wave of cyberattacks against Ukrainian power industry

ESET has discovered a new wave of cyberattacks attacks against Ukraine’s electric power industry. Interesting, the malware that was used is not BlackEnergy.

ESET Trends for 2016: Threats keep evolving as security becomes part of our lives

ESET’s Trends for 2016: (In)Security Everywhere report includes a review of the most important events of last year and outlines trends in cybercriminal activity and cyberthreats for 2016.

What does Fitbit hacking mean for wearables and IoT?

Wearable activity tracking devices like those made by Fitbit were one of the hottest gifts this past holiday season and it appears criminal hackers were paying attention, ESET’s Stephen Cobb reports.

BlackEnergy and the Ukrainian power outage: What we really know

Robert Lipovsky, a senior malware researcher at ESET, offers his expert insight into the recent discovery of BlackEnergy malware in Ukrainian energy distribution companies.

BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

The recent attacks on the electrical power industry in Ukraine are connected to attacks on the media and to targeted cyber-espionage attacks against Ukrainian governmental agencies.

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014, was also active in the year 2015.

5 things you need to know about social engineering

Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little is known about this tactic. This feature discusses some key aspects.

Europol makes 12 arrests in Remote Access Trojan crackdown

Europol have been working alongside a number of European law enforcement authorities in an attempt to crackdown against the use of Remote Access Trojans.

Moonfruit takes customers’ sites offline, as it prepares for DDoS attack

A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers’ sites offline, after receiving threats about an imminent internet attack.

Follow us

Copyright © 2016 ESET, All Rights Reserved.