latest posts

Windows XP users slow to upgrade despite risks

Users of Windows XP are not upgrading to safer versions of the operating system after the April 8 deadline when Microsoft stopped supporting the aging OS – with a drop of just 2.4% in market share worldwide.

Phishers turn to Dropbox links as fresh bait for victims

Convincing-looking emails where the victim is directed to click on a Dropbox link to download a supposedly unpaid invoice (and other classic phishing tricks) are circulating widely on the internet.

GameOver Zeus and Cryptolocker: Law enforcement hits gang responsible

FBI names as “Most Wanted” the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and Cryptolocker schemes, as law enforcement agencies crack down on cyber crime infrastructure.

“Hacking” cars on the road wirelessly is easy, claims expert

It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.

EBAY Breach: What Should Users Do?

How to defend against eBay hackers

The recent security breach at eBay has caused wide spread concern that personal information has been leaked. There is no need to panic, but by following these basic steps your information will be a lot more secure.

How to spring clean your PC

You may naturally think your PC has become infected when it starts to slow down, but it may be that your computer just needs a good clean. Follow these 5 simple steps to get back up to speed.

Android to power Space Station’s “Star Wars” floating robot

No one is too surprised to meet robots on the International Space Station – its Robonaut has posed for dozens of photos with astronauts – but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.

Watch Dogs: How realistic is PS4 city-hack thriller?

In Ubisoft’s Watch Dogs, a man out for vengeance chooses an odd weapon – a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?

iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.

Thousands of ex-workers in IT “still have password” for old jobs

Ex-employees often still have full access to the network of their previous employer, leaving the company open to “revenge attacks” – or just practical jokes.

Spotify breached – but just one mystery user is hacked

Music streaming service Spotify has urged its Android users to upgrade to a new version of the app after “unauthorized access to our systems and internal company data” – but only one, unnamed person fell victim.

Watch Dogs pirates hit by scurvy Bitcoin-mining malware

Pirates who have downloaded one of the most popular torrent files of this week’s big game release Watch Dogs – ironically, themed around computer hacking – found malware pilfering their virtual gold (well, Bitcoins).

Android “eye spyware” takes photos without users knowing

Android users beware: a loophole in the mobile OS allows apps to take pictures without users knowing and upload them to the internet, a researcher has found.

Oculus Rift used to create “3D battlefield” for cyber defense

Pentagon officials showed off a virtual reality battlefield, using the Oculus Rift motion-sensing 3D VR headset, which turns cyber attacks into 3D visions where defenders can “look around” using the gadgets’s built in accelerometers.

Router attacks: Five simple tips to lock criminals out

Cybercriminals always look for the weakest link when planning their attacks – and failings in home routers can allow another “way in”. A few simple adjustments will keep yours safe.

How to spot dangerous Android apps

There a huge number of apps and games to download on your Android, but app stores are also full of threats and scams. Follow these 5 top tips to help spot dangerous Android apps.

Password inventor says his creation is now “a nightmare”

Fernando Corbato, the MIT computer scientist widely credited with inventing the computer password, says that he and his colleagues could not foresee the World Wide Web from the early Sixties – and passwords have now become “kind of a nightmare.”

Activision Blizzard attacks hidden market in game “cheats”

Activision Blizzard – makers of game hits such as Call of Duty and World of Warcraft – have taken “aggressive” legal moves against gamers who use illegal software to cheat in games – in particular, the hit strategy title Starcraft 2.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Graham Cluley

Aryeh Goretsky

Robert Lipovsky

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.