latest posts

ESET expert: Google Play porn clicker ‘is a truly large-scale campaign’

Google Play porn clicker campaign: A single family of malicious apps masquerading as popular games or apps, designed to bypass Google’s security checks.

Porn clicker trojans keep flooding Google Play

ESET researchers have found 343 malicious porn clicker trojans on Google Play over the last seven months – and their numbers keep rising.

Porn clicker trojans at Google Play: An analysis

ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Privacy and security ‘war’ must come to an end

Cybersecurity experts are joining forces with government officials to try and “end the war between privacy and security”, it has been revealed.

The industrialization of cybercrime may be upon us

We are slowly seeing the industrialization of cybercrime according to an expert. Dr. Adrian Nish, head of cyber threat intelligence at BAE Systems, said that cybercriminals are becoming more “professionalized”.

Digital childhoods: How different nations bring up their kids

ESET has looked deeper into what parents in the United States, Germany, the United Kingdom and Russia regard as the appropriate age for digital activities.

4 internet-savvy countries agree: Kids go digital too early

Online surveys by ESET show that a majority of parents in Russia, the United Kingdom, Germany and the United States are not at all happy about their children going digital too early.

Linux Mint site hacked, users unwittingly download backdoored operating system

Linux users should not fool themselves into believing that they are somehow magically immune from malware attacks.

The security review: The state of security in companies in the EMEA region

Highlights from the past seven days in information security include the state of security in companies in the EMEA region and advice on support scams.

Average cost of cybercrime rises by 200% in just five years

Cybercrime is costing the global economy up to $450 billion annually, a new report by Hamilton Place Strategies reveals.

The Four “A”s of Account Management

It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

Apple and ‘exceptional access’ to crypto protection

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.

Healthcare data breaches lead patients to withhold information from doctors

New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.

How the threat experts see it …

A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.

The rise of Android ransomware

Lock-screen types and file-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. ESET has prepared a topical white paper on the growth of this insidious Android malware.

Major vulnerability found in GNU C Library

Security researchers have identified a serious vulnerability in an open-source library of code that is known as GNU C Library (glibc).

Anonymous leaks 18GB worth of data belonging to Turkey’s national police force

The hacktivist group Anonymous has released close to 18GB worth of sensitive data from Turkey’s national police database, according to reports.

How is cryptography incorporated into PoS terminals?

Whenever there is information that needs to be protected, there is a need to use cryptographic solutions. POS applications are no exception explains ESET’s Lucas Paus.

How to bypass this LG smartphone’s fingerprint security in just 30 seconds

A troubling vulnerability has been uncovered that may make you think twice about ever even temporarily allowing a friend, partner or acquaintance to use your new LG V10 Android smartphone.

Follow us

Copyright © 2016 ESET, All Rights Reserved.