DDoS attack on feminist blog backfires on International Women’s Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

Air traffic control vulnerability could allow criminals to hack the skies

The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed by the Government Accountability Office (GAO).

Lysa Myers: “There are still only a handful of women in the security field”

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

Adobe crowdsources its bug-hunting, but no rewards offered

Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper – another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Anthem refuses IT security audit following massive data breach

Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach last month that could have affected up to 80 million of its customers.

Five alternatives to Bitcoin

Here’s a small selection of alternatives to Bitcoin – each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however – minimal or zero transfer fees, and freedom from traditional banking restrictions.

Fake Amazon gift cards offer only malware to Android devices

Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Toys “R” Us resets account passwords to counter stolen reward points

Account holders with Toys “R” Us have been informed that their passwords will be reset, after unauthorised third-parties attempted to gain access to the company’s reward program.

India blocks third party email services to government officials

The Indian government has changed the way in which its officials are allowed to operate when working, it has been announced.

Hillary Clinton used personal email for government business, putting security at risk

Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That’s potentially a breach of federal law, but it’s definitely a security risk.

10 tips for protecting your virtual Bitcoin wallet

There have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.

Uber security breach could leave 50,000 drivers exposed

As many as 50,000 Uber drivers could have been affected by a security breach last year, potentially leaving their personal data in the hands of an unauthorized third-party, reports Tech Crunch.

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Tinder – Top 5 security tips

Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.

Facebook rewards ‘white hat’ hackers with $1.3m bounty

Facebook has announced that it paid out $1.3 million last year to ‘white hat’ hackers, as part of a bounty initiative that rewards developers for spotting flaws in the social network.

Exploits: What are they and how do they work?

What is an exploit and why are they important?

Phishing, exploits and botnets – how can they affect your business?

How can phishing exploits and botnets affect a business?

WhatsApp – Top 5 security tips

WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

David Harley

Stephen Cobb

Lysa Myers

Bruce Burrell

Raphael Labaca Castro

Anton Cherepanov

Cameron Camp

Aryeh Goretsky

Robert Lipovsky

Lukas Stefanko

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.