latest posts

Ransomware On Android

‘Major’ Smart TV vulnerability could allow mass wireless attacks

A vulnerability in the way interactive apps work on many so-called Smart TVs could allow teams of relatively unskilled hackers to attack thousands of devices at once, a team of Columbia University researchers claims in a new paper.

Ransomware 101: FAQ for computer users and smartphone owners

Do you know what ransomware is? Do you know a filecoder from a lockscreen?

Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.

Linkedin Scams: Know Your Enemy

Linkedin is the worlds largest professional network, but leaving your personal information open to the general public may expose you to cybercrime. Follow these top tips from We Live Security to help keep your account secure.

Drawing “signature” on screen could replace passwords, study finds

Even smartphone and tablet users who choose a four-digit PIN to protect their device are vulnerable to “shoulder surfers” glimpsing the code and using it later – but an older form of password could come to the rescue…

Android malware: how to keep your device safe from filecoders (and everything else)

When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.

NSA faces fresh revelations as Snowden anniversary arrives

On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.

DARPA to hold $2m Grand Challenge for “fully automated” cyber defense systems

The hi-tech research wing of the US military DARPA (Defence Advanced Research Projects Agency) is to offer a $2 million prize offered for a fully automated defense system – a computer that defends itself without human intervention.

England footballers have their passport details leaked on Twitter

In an embarrassing breach of security, the passport numbers of members of the England Football squad have been accidentally tweeted out by the team’s official sponsor.

ESET Analyzes First Android File-Encrypting, TOR-enabled Ransomware

Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android by our detection engineers.

Windows XP users slow to upgrade despite risks

Users of Windows XP are not upgrading to safer versions of the operating system after the April 8 deadline when Microsoft stopped supporting the aging OS – with a drop of just 2.4% in market share worldwide.

Phishers turn to Dropbox links as fresh bait for victims

Convincing-looking emails where the victim is directed to click on a Dropbox link to download a supposedly unpaid invoice (and other classic phishing tricks) are circulating widely on the internet.

GameOver Zeus and Cryptolocker: Law enforcement hits gang responsible

FBI names as “Most Wanted” the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and Cryptolocker schemes, as law enforcement agencies crack down on cyber crime infrastructure.

“Hacking” cars on the road wirelessly is easy, claims expert

It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.

EBAY Breach: What Should Users Do?

How to defend against eBay hackers

The recent security breach at eBay has caused wide spread concern that personal information has been leaked. There is no need to panic, but by following these basic steps your information will be a lot more secure.

How to spring clean your PC

You may naturally think your PC has become infected when it starts to slow down, but it may be that your computer just needs a good clean. Follow these 5 simple steps to get back up to speed.

Android to power Space Station’s “Star Wars” floating robot

No one is too surprised to meet robots on the International Space Station – its Robonaut has posed for dozens of photos with astronauts – but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.

Watch Dogs: How realistic is PS4 city-hack thriller?

In Ubisoft’s Watch Dogs, a man out for vengeance chooses an odd weapon – a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?

iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Graham Cluley

David Harley

Marc-Etienne M.Léveillé

Lysa Myers

Aryeh Goretsky

Robert Lipovsky

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.