An $80m ‘quantum computer’ capable of breaking any encryption code, including those used to protect government information and banking systems – and thus ‘owning the net’ was planned by the NSA, according to leaked documents.
Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by Curse – but it is fake, laced with a Trojan which steals passwords, account emails and authenticator information at once, Blizzard said.
There are plenty of scams effective enough to rate a warning or three, in the hope of alerting potential victims to the kind of gambit they use. And so, even though much of ESET’s business is focused on the bits and bytes of malicious software, I’ve spent a lot of time writing on WeLiveSecurity and
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
Many popular models of wireless router from brands such as Linksys and Netgear are vulnerable to a ‘backdoor’, which could allow attackers access to the router’s admin controls, according to a report by Ars Technica.
Hackers have published what they claim is a database of 4.6 million Snapchat users, with phone numbers matched to usernames, which is searchable online now. The hack could be a huge blow to the ‘discreet’ photo-message service.
Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards themselves. The attack could be used to copy or steal data – and even modify sensitive data such as encryption keys.
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…
Dog-themed cryptocurrency Dogecoin fell victim to two robberies over the holiday season, as hackers hit two sites which traded in the cult currency – but the goodwill of the internet could see the Shiba-themed virtual coins bouncing back.
A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this a topical trend?
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.
An online poker site which did all its cash-ins and cash-outs in Bitcoin has admitted to a data breach in which 42,000 user passwords were stolen – and is instituting emergency measures to prevent the attackers gaining access to the cryptocurrency.
A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.
Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
Details of 40 million customer debit and credit cards may have leaked in a data breach at American retailer Target – which began on November 27 and ended on December 15, affecting stores at the height of shopping season.
This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling year-on-year – but nearly one third of shoppers polled admitted to serious security errors, such as storing card details in smartphones.
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR conference in Chennai, which was kindly presented by ESET’s Chief Research Officer Juraj Malcho, as neither Larry nor myself were able to attend the conference in the end. The paper is also available
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers – 75% of detections come from this region.
Employers are failing to face up to the threats posed by employees who use their own mobile devices at work – 40% of companies do not consider the ‘bring your own device’ (BYOD) trend even to be on their agenda, according to a survey of IT workers.