category

Malware

VMworld – Got a ton of VMs? Now what?

This year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs

Signatures, product testing, and the lingering death of AV

Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.

Terracotta VPN network helps hackers remain anonymous

Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.

The world’s biggest bug bounty payouts

From finding flaws to suggesting innovative security measures for the future, we look at some of the biggest bug bounty payouts in recent years.

Porn clicker keeps infecting apps on Google Play

A recently identified trojan porn clicker is still infecting apps on Google Play.

United Airlines pays out 2 million flight miles for security bugs

United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.

Adobe rushes to patch Flash flaw under attack

Adobe Systems has issued a sizeable security update with patches for 36 vulnerabilities, at least one of which is currently under attack in the wild.

Apps on Google Play Steal Facebook Credentials

Over 500,000 Android users targeted by phishing apps harvesting their Facebook credentials. ESET detects these trojans as Android/Spy.Feabme.A.

Dino – the latest spying malware from an allegedly French espionage group analyzed

In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.

The role of proxies and protocols in malware investigations

What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?

OpenSesame: Hacked kids’ toy could open garage doors

Garage doors may be vulnerable to being opened remotely by hackers using little more than a children’s toy, a security researcher has proven this week.

ESET uncovers another porn clicker on Google Play

Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.

Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play

ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.

Jamie Oliver website makes a meal of malware clean-up

The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year, potentially infecting the computers of the site’s visitors.

5 practical tips to avoid ransomware in your email

Tips to avoid ransomware in your email – a common way for extortion-based malware to propagate itself.

Is online voting a security risk?

The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we opening ourselves up to vote rigging by power-hungry politicians or fame-seeking hackers?

CPL Malware in Brazil: somewhere between banking trojans and malicious emails

Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with the highest percentage of Internet users using online banking. The latest research from ESET is now available: CPL Malware in Brazil.

Rombertik: the malware that ‘destroys’ computers if detected

Researchers have uncovered a new malware which will try to ‘destroy’ the computer, reports Cisco. Let’s understand how it really is.

IDS, Firewall and Antivirus: what you need to have installed?

What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.

WattsUpDoc: US hospitals trial AC power probes to treat medical malware

Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

6 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.