latest posts

Tech Support Scams: Second Byte at the Cherry

Is there really anything new to be said about tech support scams? Unfortunately, the FTC tells us there is. Not only because people are still falling prey to this type of fraud, but because the scammers are still finding new approaches to harvesting their victims’ credit card details. Some quite interesting, sophisticated technical tricks are

NSA “Hard Target” project planned $80m quantum “God Machine” to ‘own’ the Internet

An $80m ‘quantum computer’ capable of breaking any encryption code, including those used to protect government information and banking systems – and thus ‘owning the net’ was planned by the NSA, according to leaked documents.

Gamers warned after hi-tech malware leapfrogs World of Warcraft’s security with fake website

Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by Curse – but it is fake, laced with a Trojan which steals passwords, account emails and authenticator information at once, Blizzard said.

2013: a View to a Scam

There are plenty of scams effective enough to rate a warning or three, in the hope of alerting potential victims to the kind of gambit they use. And so, even though much of ESET’s business is focused on the bits and bytes of malicious software, I’ve spent a lot of time writing on WeLiveSecurity and

Yes there is a Data Privacy Day, and it will be here soon

The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.

Wi-Fi woes: Linksys and Netgear router models at risk from backdoor that offers access to ‘controls’

Many popular models of wireless router from brands such as Linksys and Netgear are vulnerable to a ‘backdoor’, which could allow attackers access to the router’s admin controls, according to a report by Ars Technica.

Discreet messaging site Snapchat leaks 4.6 million phone numbers, names – after ‘ignoring warnings’

Hackers have published what they claim is a database of 4.6 million Snapchat users, with phone numbers matched to usernames, which is searchable online now. The hack could be a huge blow to the ‘discreet’ photo-message service.

Could new malware steal data from INSIDE your SD card? Researchers claim even solid-state PC drives could be at risk

Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards themselves. The attack could be used to copy or steal data – and even modify sensitive data such as encryption keys.

Greetings, Android! 12 tips to toughen up your new device for the real world

ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…

Internet rallies round dog-themed cryptocurrency after holiday heists hit two Dogecoin sites

Dog-themed cryptocurrency Dogecoin fell victim to two robberies over the holiday season, as hackers hit two sites which traded in the cult currency – but the goodwill of the internet could see the Shiba-themed virtual coins bouncing back.

Phishing for Tesco Shoppers

A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this a topical trend?

The ‘Digital Guardian’: IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep you secure

Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.

Clubbed to death? Bitcoin-only poker site Seals With Clubs leaks 42,000 passwords in attack

An online poker site which did all its cash-ins and cash-outs in Bitcoin has admitted to a data breach in which 42,000 user passwords were stolen – and is instituting emergency measures to prevent the attackers gaining access to the cryptocurrency.

A look back at 2013 from some folks who live security

A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.

Cryptolocker 2.0 – new version, or copycat?

Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.

Target breached: 5 defensive steps shoppers should take now

Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.

Target down? “Biggest data breach ever” leaks 40 million credit and debit cards from retailer at height of shopping season

Details of 40 million customer debit and credit cards may have leaked in a data breach at American retailer Target – which began on November 27 and ended on December 15, affecting stores at the height of shopping season.

Holiday shoppers turning to mobile to bag bargains – but ignoring security risk, survey finds

This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling year-on-year – but nearly one third of shoppers polled admitted to serious security errors, such as storing card details in smartphones.

The Death of Anti-Virus: conference paper

Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR conference in Chennai, which was kindly presented by ESET’s Chief Research Officer Juraj Malcho, as neither Larry nor myself were able to attend the conference in the end. The paper is also available

Qadars – a banking Trojan with the Netherlands in its sights

The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers – 75% of detections come from this region.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Lysa Myers

Graham Cluley

Jean-Ian Boutin

David Harley

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Copyright © 2014 ESET, All Rights Reserved.