category
Threats

Hack on the track: Signaling flaw leaves UK trains vulnerable

UK train services could be vulnerable to being hacked, hijacked and crashed, due to the trial of new digital signaling system designed to make lines safer.

Minecraft exploit makes it “easy” for hackers to crash servers

A security researcher has posted a Minecraft flaw that makes it “easy” for hackers to crash the game’s servers.

USB Type-C: Could new laptop ports be a malware entry point?

USB Type-C will both charge your laptop battery and offer fast data transfer speeds, but what does this mean for security?

Vulnerability in common hotel routers threatens guest devices

A vulnerability in the Wi-Fi routers used in hundreds of hotels across the world has been uncovered by security researchers, Wired reports.

National Power Grid suffers frequent cyberattacks, says report

The US national power grid is subject to physical or online attacks around once every four days, a report by USA Today reveals.

Ships at risk of hacking, says report

A report suggests that while the number of ships lost at sea is decreasing, cyberthreats are becoming a more pressing issue for the maritime industry.

Hacker threatens cyberattacks against Detroit over court decision

A hacker going by the name of ‘Bitcoin Baron’ has issued a threat to the city of Detroit after a Wayne County Circuit Court Judge dismissed a police manslaughter charge.

Google’s Project Zero reveals possible memory leak hack

Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.

Google Admin console email spoofing loophole patched

A vulnerability in Google Admin that could have allowed domains to be claimed to send out authentic seeming spoofed emails has been patched by the company, reports The Register.

ESET’s Mark James on 2015’s security trends

how is 2015 shaping up in security? We caught up with ESET security specialist Mark James to get his take on threats, security and how people should ensure their year is free of malware.

Adobe crowdsources its bug-hunting, but no rewards offered

Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Exploits: What are they and how do they work?

What is an exploit and why are they important?

Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP

A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.

12,000 exposed to possible ID theft after Jeb Bush publishes emails

Possible 2016 Republican presidential candidate Jeb Bush has has had to retroactively redact over 12,000 personal details from emails published in the name of transparency

Google’s Project Zero extends 90 day exploit disclosure deadline

Google has extended the disclosure period for vulnerabilities uncovered in its Project Zero program by an additional two weeks, if a vendor is planning a patch in the two weeks following the deadline.

Internet of Things: a Security Timebomb?

Hailed as a panacea by those for whom the world cannot move quickly enough, the Internet of Things has been a long time coming. But is Internet of Things security up to scratch?

7 unromantic Valentines gifts from a cybercriminal

We’ve already looked at online dating scams to be aware of for Valentines Day, but here’s some more threats that not-so-special someone could end up sending you, if you’re not careful!

Microsoft phishing email targeting corporate networks with ‘neurotic malware’

Security researchers have uncovered a trojan that evades sandboxes specifically targeted at corporate users, hidden in legitimate looking phishing email that apes Microsoft’s Volume License.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.