Have you been wondering what trends in security and privacy ESET researchers are predicting for 2014? The following is a sampling, a year-end snack plate if you will, featuring predictions from Aryeh Goretsky, Righard Zwienenberg, David Harley, Cameron Camp, Lysa Myers, and more.
Did you see the recent story about police in England seizing a 3D printer suspected of producing parts for a weapon – a pistol in this case? Yes, the Greater Manchester Police Department was swiftly nipping hi-tech crime in the bud. The only problem: The poor unsuspecting “criminal” was printing out spare parts for a
News of the NSA’s mass electronic surveillance is having a negative impact on consumer sentiment toward online technology and tech companies, according to recent survey that suggests it could hurt GDP and corporate profits.
In light of the Snowden/NSA revelations of mass surveillance, 77% of American adults say it is not okay for the government secretly to monitor all of their communications. And some of us are changing how we use the Internet as a result.
A hi-tech spoofing attack took “remote control” of a 213-foot yacht – steering it off course, without anyone touching the steering wheel.
What needs to happen before the President of the United States can stand before the American people and assure them that a comprehensive and good faith effort has been made to stop cyber attacks disrupting the delivery of essential goods and services? The NIST workshops are seeking answers to that question.
In the ongoing effort to protect cyber aspects of America’s critical infrastructure, the third NIST Cybersecurity Framework workshop is being hosted July 10-12, 2013 by the University of California, San Diego, and the National Health Information Sharing and Analysis Center.
ESET researchers explain the difficulties in attribution of targeted attacks; evidence is often circumstantial and the source never positively identified.
The mysterious Avatar rootkit, detected by ESET as Win32/Rootkit.Avatar, appears to reflect a heavy investment in code development, with an API and a SDK available, plus an interesting abuse of Yahoo Groups for C&C communications.
The new trend for “always online” games such as SimCity and Blizzard’s Diablo 3 may be putting gamers at risk, experts warn. The games, which require an internet connection even for single-player gaming, are designed to protect game companies from piracy.
Technical analysis of Power Loader, a special bot builder for making downloaders for other malware families and yet another example of specialization and modularity in malware production.
While many Android users speculate about Google’s removal of ad-blocking apps from the official Android store, Google Play, we consider the risky behavior that is bound to result.
Adobe and Microsoft have both released patches this week to address vulnerabilities in respective software applications and advise all users to apply the patches as soon as possible, if applicable to them.
A deep dive into Win32/Theola, one of the most malicious components of the notorious bootkit family, Win32/Mebroot.FX. Theola uses malicious Chrome browser plugins to steal money.
Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate Win32/TrojanDownloader.Zortob.B
Slides of ESET presentations at RSA are now available including the SMB Cyber Security Survival Guide and “What THEY want with your digital devices.”
Technical analysis of malware that abuses code signing certificates normally used to positively identify a software publisher and to guarantee code is unchanged.
The hottest IT trend in the workplace right now is definitely BYOD: Bring Your Own Device. This is popular with employees who regard it as a convenient way to read private e-mail and to browse to (work-unrelated) sites at the office, and moreover as a way to work for their employer on a device they
According to the EU’s law enforcement agency Europol a complex ransomware network has been shut down. The operation to close the network was headed by Spanish police in cooperation with the agency. Eleven people have been arrested from Russia, Georgia and Ukraine. The scheme planted malware on computers which accused the users of viewing illegal
British defence company BAE Detica is predicting a “gearing up” of cyber attack capabilities across an increasing number of nation states in 2013.