category

Threats

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim’s computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.

Companies fear data breaches caused by compromised credentials

Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.

Trident nuclear system to be updated to protect against hacking attacks

It’s a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers… imagine if you were responsible for the security of Britain’s nuclear deterrent?

Wearables: where’s the security risk?

At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For

Is the UK’s Trident nuclear program at risk from cyberattack?

Former British defence secretary Des Brown called on the British Prime Minister to hold an ‘end-to-end assessment’ of the Trident nuclear program’s cybersecurity, or risk potential weaknesses in the system.

Ransomware: To pay or not to pay?

The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?

Trick or treat? Beware so a ransomware won’t end up between your Halloween sweets

Ghosts, monsters and the living dead can all send a chill down one’s spine. Ransomware, for some people, is just as spooky. This Halloween, we look at why.

The Internet of Things: Groundbreaking tech with security risks

The Internet of Things (IoT) is the latest buzzword taking hold of the technology industry, but what does it mean exactly and how does it impact citizens and businesses? We take a closer look.

The great car hacking debate

Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to help answer this question.

Multi-stage exploit installing trojan

Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.

Brolux trojan targeting Japanese online bankers

A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer.

10 key facts you need to know about cyber insurance

The regular occurrence of data breaches is pushing organizations to think more seriously about updating their risk management policies. With that in mind, we look at the top ten things you need to know about cyber insurance, which is fast becoming a business necessity.

Beware banking trojans and their nasty helpers

Banking trojans are ubiquitous and growing in number and sophistication, largely through trojan downloaders and webinjects. Here are four severe cases.

The most frequent threats on email

As part of World Post Day (October 9th), we take a closer look at the many security risks associated with email, the electronic cousin of regular mail.

An Ashley Madison response plan: does your company have one?

The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here’s what you need to know.

Firefox Under Fire: Anatomy of latest 0-day attack

The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.

20,000 NHS Wales PCs still running Windows XP from beyond the grave

An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.

Is that really an appropriate level of security for computers that could be holding patients’ medical information?

What is the core idea behind applying ISO 27001?

This article looks at the core idea behind applying ISO 27001.

Facebook Security Checkup feature now available

Facebook has made a new feature called Security Checkup generally available after testing on an invite-only group, according to SoftPedia.

Follow us

Copyright © 2016 ESET, All Rights Reserved.