category
Uncategorized

The state of healthcare IT security: are Americans concerned enough?

The privacy and security of medical records is a matter of concern to many Americans now that most are now stored electronically, but is there cause for concern? And who is most concerned?

Malware is called malicious for a reason: the risks of weaponizing code

The risks of using government use of malicious code in cyber conflict are examined in this paper by Andrew Lee and Stephen Cobb: Malware is called malicious for a reason: the risks of weaponizing code.

Homeland Security warns of new Point of Sale attacks

New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.

Data breach – European bank’s info “held to ransom”

The European Central Bank has revealed that information including email addresses and contact data has leaked in a data breach – and that the unknown attackers demanded “financial compensation” from the bank in return for not releasing the information, according to the BBC’s report.

Could latest NSA revelations further impact online behavior, denting the economy?

Internet surveillance by America’s National Security Agency (NSA) has been further exposed by two new developments: the analysis of leaked NSA surveillance reports and the XKeyscore targeting code. Will these stories increase the number of Internet users who say they are inclined to reduce their online engagement due to the activities of the NSA and GCHQ.

Facebook may face FTC fines over research into users’ emotions

With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous privacy settlement, the social network could be facing a hefty fine for emotion-based manipulation of the Newsfeed for research purposes.

Support Scam: Old Racket Still in Service

One of the support scam sites used to mislead victims may be down, but the scam definitely isn’t about to go away.

Criminals target school data: top 10 security measures for educational institutions

Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market to other criminals who turn the data into cash through a range of fraudulent schemes. Here are ten security measures schools should take to defend against this type of data crime.

Free Wi-Fi offered by smartphone networks poses “serious threat” new report warns

Smartphone users are at risk from bogus hotspots set up to harvest login details on networks such as AT&T – and the fake hotspots can easily be created on devices as small as an Android phone, a new report warns.

Catch the ESET 2014 Mid-Year Threat Report broadcast

With the first half of the year almost over, it’s time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar, this one hour event will look at some of the more interesting pieces of malware and Internet security threats that have occurred during the first six months of the year.

Would you allow cybercriminals onto your computer for money?

Cybercriminals could buy their way into your computer for less than a dollar, a new study has found. The study, led by Nicolas Christin at Carnegie Mellon University, examined how much money they would have to offer home users to install software onto their computers or other devices.

Cyber Boot Camp and tomorrow’s cyber security professionals

The top three teams from the fifth annual Mayors’ Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North America for five days of hands-on security training and lectures from IT experts, law enforcement, and career advisors.

Don’t let social media undermine the promise of graduation

Graduation is a great time to review your social media profile. Don’t let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.

Encryption essential for cyber security: A million reasons to encrypt sensitive data

Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.

NSA faces fresh revelations as Snowden anniversary arrives

On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.

GameOver Zeus and Cryptolocker: Law enforcement hits gang responsible

FBI names as “Most Wanted” the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and Cryptolocker schemes, as law enforcement agencies crack down on cyber crime infrastructure.

eBay customers urged to change their passwords after breach

eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.

Behind Blackshades: a closer look at the latest FBI cyber crime arrests

Blackshades is a RAT and the FBI has just arrested a lot of people involved in its use and distribution. But what’s a RAT and how will these arrests impact cyber crime?

Don’t forget flash: memory cards can be a data loss and infection vector

A reminder that malicious code can be spread via flash memory cards like SD cards, just as easily as it can spread on USB flash drives. Check these tips to get protected.

Business continuity management: key to securing your digital future

Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
08 Aug 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.