category
Malware

The role of proxies and protocols in malware investigations

What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?

OpenSesame: Hacked kids’ toy could open garage doors

Garage doors may be vulnerable to being opened remotely by hackers using little more than a children’s toy, a security researcher has proven this week.

ESET uncovers another porn clicker on Google Play

Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.

Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play

ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.

Jamie Oliver website makes a meal of malware clean-up

The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year, potentially infecting the computers of the site’s visitors.

5 practical tips to avoid ransomware in your email

Tips to avoid ransomware in your email – a common way for extortion-based malware to propagate itself.

Is online voting a security risk?

The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we opening ourselves up to vote rigging by power-hungry politicians or fame-seeking hackers?

The big small business security challenge: mobile and BYOD

In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

CPL Malware in Brazil: somewhere between banking trojans and malicious emails

Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with the highest percentage of Internet users using online banking. The latest research from ESET is now available: CPL Malware in Brazil.

Rombertik: the malware that ‘destroys’ computers if detected

Researchers have uncovered a new malware which will try to ‘destroy’ the computer, reports Cisco. Let’s understand how it really is.

IDS, Firewall and Antivirus: what you need to have installed?

What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.

WattsUpDoc: US hospitals trial AC power probes to treat medical malware

Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.

Ransomware: Should you pay the cybercriminals?

If your files are encrypted by ransomware, should you pay the ransom? We examine the options…

New malware ‘Punkey’ detected in new point-of-sale attack

A new advanced malware program targeting point-of-sale terminals is putting customer credit card details at risk, following a number of similar attacks already this year.

Lawyer claims police placed malware on requested external hard drive

A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.

Advanced Persistent Threats: Using multi-layered detection to defend against APTs

Advanced persistent threats (APTs) are a growing concern to the world’s companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.

Operation Buhtrap, the trap for Russian accountants

The Operation Buhtrap campaign targets a wide range of Russian banks, used several different code signing certificates and implements evasive methods to avoid detection.

Hackers hide malware in fake game pages hosted on Steam

Gamers downloading from Steam should beware of fake game pages, after a spate of clone titles were found on the service hiding harmful malware.

Waski downloader spreads banker Trojan targeting users worldwide

If you have recently received an unexpected email with a ZIP file attached, it could be a threat attempting to steal your banking login credentials. Its name is Waski and is detected by ESET as Win32/TrojanDownloader.Waski.

Hackers set up Pirate Bay clone to distribute banking trojan

Wordpress sites are being targeted by a Pirate Bay clone set up by hackers to distribute malware and a banking trojan, reports The Next Web.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.