ESET researchers recently came across a targeted attack against the Vietnamese government’s Ministry of Natural Resources and Environment (MONRE).
With the first half of the year almost over, it’s time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar, this one hour event will look at some of the more interesting pieces of malware and Internet security threats that have occurred during the first six months of the year.
A hacker has reportedly harvested over $600,000 in digital currency, using a network of hijacked machines, in what is believed to be the largest fraud of its kind.
A dangerous new strain of malware has been discovered, able to steal banking credentials without alerting users to the interception.
Do you know what ransomware is? Do you know a filecoder from a lockscreen?
Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.
The hi-tech research wing of the US military DARPA (Defence Advanced Research Projects Agency) is to offer a $2 million prize offered for a fully automated defense system – a computer that defends itself without human intervention.
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.
Pirates who have downloaded one of the most popular torrent files of this week’s big game release Watch Dogs – ironically, themed around computer hacking – found malware pilfering their virtual gold (well, Bitcoins).
Technology giants with large ad networks need to do more to protect consumers from hackers infiltrating their advertising networks to deliver malicious adverts – or even point users to sites that serve malware, the U.S. Senate has warned.
There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.
‘Smart’ televisions with built-in microphones could be used as bugging devices by corrupting the devices with malware, according to software specialists NCC Group, as reported by The Register.
The torrent site Demonoid was blocked by Google after tests by the search giant found that pages within the site contained banner adverts which were installing malware on users’ PCs.
Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.
Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.
The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.