Corkow – the lesser-known Bitcoin-curious cousin of the Russian banking Trojan family

A little-known banking trojan, developed in Russia, has managed to infect thousands of victims’ computers without the knowledge of their owners. Graham Cluley takes a closer look.

Two-factor authentication: What is it – and why do I need it?

Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ’2FA’.

Microsoft boosts security for Office 365 users with two-factor logins

Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication being rolled out to versions of Office 365 this week.

Phishy business: Surge in tax scams as emails rise by nearly 50% in one year

Fraudulent emails offering refunds of overpaid tax have surged by nearly 50% in the past year, according to a report by Accountancy Age. Customers reported 23,347 phishing emails to the British tax authorities in the three months before the deadline.

American law firm admits entire server of legal files fell victim to Cryptolocker

A small American law firm has admitted that every document on a server at the North Carolina company has fallen prey to the Cryptolocker ransomware, according to a report by local station WSO CTV.

Facebook’s ‘A Look Back’ video used as bait for malware, report claims

A fake version of Facebook’s 10th anniversary celebration video page, ‘A Look Back’ is spreading via the social network, with users directed instead to another website, where they are prompted to download files.

Wangiri Telephone Fraud – One Ring to Scam Them All

Missed a phone call? The Better Business Bureau says answering international telephone fraud calls looking like US calls might cost you more than you think.

Parental Controls and Technology

ESET security researchers Cameron Camp and Lysa Myers discuss parental controls and child surveillance options for parents looking to protect kids using digital devices.

U.S. hotel firm ‘knew of credit card breach for two weeks’ before going public

Managers at White Lodging, a hotel management firm that works with various brands including Hilton, Marriott, Westin, Sheraton and Hyatt, may have known of a major credit card data breach for two weeks before details were made public.

Sniffing body odor has ‘enormous potential’ for biometrics, researchers claim

Body odor could be used as a biometric identifier, with high rates of accuracy, due to chemical patterns in the smell that are unaffected by bodily changes – or deodorant – according to Spanish researchers.

Flipboard: the smarter way to enjoy We Live Security on smartphones

Hand-picked stories from We Live Security are now available free on Flipboard, a magazine-style app for iOS, Android and Kindle.

Flipboard: A new way to enjoy We Live Security on the move

We Live Security has launched on Flipboard – the hit magazine-style app for Kindle, Android and iOS. Every week, we’ll hand-pick the best articles from We Live Security, and the app will automatically keep you up to date with our latest news, features and research.

Cellphone-sized $20 gadget can remote-control car electronics, researchers claim

A tiny, cheap gadget which can ‘hack’ into the network of modern cars to receive radio commands ranging from controlling steering and brakes to switching off headlights is to be shown off at the Black Hat Asia security conference in Singapore next month.

419 Scams: Let The Seller Beware

419s are a well-known scam type, but some scams are more obvious than others. And sometimes it’s the seller who’s cheated not the buyer.

Target attackers ‘broke in using log-in from air-con contractor’

Attackers involved in the Target breach, which led to the theft of 40 million debit and credit card details late last year, broke into the retailer’s network via a heating and air-conditioning contractor, according to a new report.

Hacktivists try tampering with facebook.com domain

The group of hackers that calls itself the Syrian Electronic Army (SEA) briefly claimed control of the facebook.com domain via an attack on MarkMonitor. It appears normal Facebook service has been resumed, but here’s what you need to know.

Zombie detector: Half-century-old tool may help sniff out botnets, researchers claim

A statistical tool first used in 1966 and currently used in speech and gesture recognition may hold a key to sniffing out botnets – by predicting the likely “next move” of infected PCs and the healthy computers around them, researchers have claimed.

Weak passwords and ancient software left U.S. Government data vulnerable, DHS report finds

Weak passwords and rarely updated software are a recurring theme behind the 48,000 cyber incidents reported to the Department of Homeland Security – including the theft of data on the nation’s weakest dams by a “malicious intruder”, a DHS report has found.

Government committee to set facial recognition guidelines

A Department of Commerce committee will meet for the first time this Thursday to begin discussions on a standard of guidelines for facial recognition software.

Browser security gets a boost with updates to Chrome and Firefox for Android

It is now possible to enable HTTPS secure browsing on every website using Firefox for Android, the Electronic Frontier Foundation has announced.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Robert Lipovsky

Aryeh Goretsky

Graham Cluley

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.