A large majority of routers used in small offices are plagued with security vulnerabilities – with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.
It’s not just fake tech support: call centre cold-callers are operating various kinds of insurance scams, too.
Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.
Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.
The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.
Missed a phone call? The Better Business Bureau says answering international telephone fraud calls looking like US calls might cost you more than you think.
One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.
‘The first thing you need to know about quantum cryptography is that it isn’t cryptography. At least, not the quantum part,’ writes Rob Slade, information security researcher, author and malware expert.
In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.
This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive traffic to advertisement websites by using various click fraud techniques, and thus earn money from these websites as an “advertiser”.
Is there really anything new to be said about tech support scams? Unfortunately, the FTC tells us there is. Not only because people are still falling prey to this type of fraud, but because the scammers are still finding new approaches to harvesting their victims’ credit card details. Some quite interesting, sophisticated technical tricks are
There are plenty of scams effective enough to rate a warning or three, in the hope of alerting potential victims to the kind of gambit they use. And so, even though much of ESET’s business is focused on the bits and bytes of malicious software, I’ve spent a lot of time writing on WeLiveSecurity and
A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this a topical trend?
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR conference in Chennai, which was kindly presented by ESET’s Chief Research Officer Juraj Malcho, as neither Larry nor myself were able to attend the conference in the end. The paper is also available
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers – 75% of detections come from this region.
(All four blog articles in this series, of which this article is the last, are available as a single paper here: The_Thoughtful_Phisher_Revisited.) From the sort of ‘visit this link and update or we’ll cancel your account’ message that we saw in the previous blog in this series (The Less Thoughtful Phisher), it’s a short step
The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.