Uncategorized

Taxing Times: Dealing with tax identity fraud in America

Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here’s why, and what you can do about it.

German security agency warns botnet ‘army’ has harvested 18 million emails and passwords

Scans of a huge botnet have revealed that it has harvested at least 16 million usernames and passwords for email sites and other online services, according to a report released by German security agency, the Bundesamt für Sicherheit in der Informationstechnik (BSI).

10 years of Mac OS X malware

The malware problem on Mac OS X is nothing like as bad as it is on Windows, but that doesn’t mean it can be ignored.

NSA revelations shake faith in U.S. tech firms as Harris poll shows public conflicted

The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on public confidence in technology companies in America, such as Internet service providers and software companies, according to a Harris poll commissioned by ESET. The poll found that two-thirds of adult Americans who said

Goodbye, Windows XP!

This patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003. After today, these programs have reached their End of Life (EOL) status, and will no longer be supported by Microsoft

New Harris poll shows NSA revelations impact online shopping, banking, and more

A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans and some say they are doing less online banking and less online shopping because of what they have learned about the NSA.

Tesla shocker as researcher picks electric supercar’s lock

The Model S is rated one of the safest cars on the road – but the electronic security system protecting its locks may not be quite as bulletproof, researchers claim. The six-digit PIN used to protect its lock can be brute-forced, or phished, by attackers.

5 Tips for protecting Windows XP machines after April 8, 2014

Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.

President Obama’s BlackBerry survives assault from Korean Androids

Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.

Master of Mavericks: How to secure your Mac using Apple’s latest update

Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk

Stealth malware sneaks onto Android phones, then “turns evil” when OS upgrades

A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS – allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.

Better Mac Testing? How OS security can make AV testing harder

As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.

The Billgate Foundation – the fall for money, eh many…

Recently it was announced that Satya Nadella will be Steve Ballmer’s successor as CEO of Microsoft. Of course for the cybercriminals this is the time to dust off and polish the good old Microsoft Lottery scam and update it.

Welcome to We Live Security!

Welcome to the new ESET blog: We Live Security. In fact, We Live Security is a lot more than a blog: it contains the same great content you have enjoyed on blog.eset.com, but also includes new features and a wider range of content. For example, here’s a podcast talking about the new site, one of

STEM education, the Target data breach, and the Apple SSL vulnerability

Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?

Smells phishy? New email scams – and why smartphone users need to stay alert

Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.

BlackBerry security revisited: How do the BB10’s stack up?

Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to

Urgent iPhone and iPad security update, Mac OS X as well

Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.

Android under assault as spyware and Trojans ‘grow by 400%’, company claims

Malicious apps are multiplying rapidly in Google’s Play store – where a survey found that the number of malicious apps had grown 388% from 2011 to 2013, according to Risk IQ.

Silk Road 2.0 drug market hit, millions stolen from bitcoin reserve

A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

1 article related to:
Hot Topic
14 Apr 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.