Acrobat in hands of hackers, millions of customer details stolen, as Adobe admits to “unprecedented” breach

Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code for its Acrobat software, used to make and read PDF files. Adobe also admitted hackers had stolen data on 2.9 million customers.

Grim warning for bounty hunters – Yahoo pays out paltry $12.50 per vulnerability

Finding vulnerabilities can be a profitable business – even if you work for the right side of the law. Last month, Facebook paid out $12,500 to a researcher for finding a bug – this month, Yahoo! paid out … $12.50.

Here be dragons: Explorer “in dangerous territory” after public IE exploit release?

An exploit for a vulnerability which affects all versions of Microsoft’s Internet Explorer has been released as a module for the popular penetration testing tool Metasploit – sparking fears of a new wave of attacks.

Getting warmer? New Hotspot 2.0 “could offer safer public Wi-Fi”

Logging into public Wi-Fi hotspots can be risky, particularly for business users with sensitive data on their devices – but a new breed of hi-tech hotspots may make things safer, the Wi-Fi Alliance claims.

Loose lips sink ships: Apple’s voice assistant Siri lets ANYONE in – again

An Israeli security researcher has found another way round Apple’s Fingerprint ID security system – this time via a two-step lock-screen glitch which works with the new iOS update 7.0.2.

“One click, then boom”: Spear-phishing could “black out” energy companies, expert warns

Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned – and all it takes is one lucky strike to cause devastating damage to the power grid, or to companies which supply oil and gas.

New British Cyber defense force will protect industry – and “if needed, strike in cyberspace”

A new cyber defense force is being set up in the UK to protect critical private and government computer networks from attack – “if necessary, to strike in cyberspace,” Britain’s Defense Secretary Philip Hammond has said.

Spear-phishing is “super-strain” of bacteria threatening business, investor warns

Spear-phishing is creating a new era of cybercrime, according to Chris Dixon, a partner at venture capital firm Andreesen Horowitz – and in terms of its threat to enterprise, it’s comparable to a “super strain of bacteria.”

Walk this way! Forget fingerprints – could our daily habits be the passwords of the future?

One day, your smartphone might “recognise” you by the way you walk, the way your fingers tap on a touchscreen – or even simply where you go during the day. Habits such as your walk can be as distinctive as a fingerprint, researchers claim.

Help for the little guys: Small businesses offered “cyber insurance” – starting at $800

Small businesses will be able to buy “cyber assurance” packages to protect against possible losses from cyber attacks – with a British insurance firm offering packages starting at £500 ($800).

Millions of ID records on sale as five big data firms hacked “for months”

An “identity theft service” which specialises in selling personal details gained access to some of the biggest consumer data firms, including Lexis Nexis and Kroll – and has had access to their computer systems “for months”. Stars such as Beyonce (pictured) had personal details leaked.

Win32/Napolar – A new bot on the block

There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of malware came to our attention mid-August because of its interesting anti-debugging and code injection techniques.

“I was invited to their friend’s wedding!” Recycled Yahoo! IDs leak VERY private information

Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers – but some customers who have acquired these “second-hand” email addresses say they are receiving a “bonus” of personal information relating to the old owners.

Future cyber attacks could attack medical implants – or wage “psychological war” in virtual reality, Europol warns

New hi-tech cyber attacks could threaten energy supplies, “wearable” computers – and even medical implants, according to a study conducted by Europol’s European Cybercrime Centre (EC3) and the International Cyber Security Protection Alliance (ICSPA).

BYO-Doh! How not to be the “bring your own disaster” guy

Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work – a practise described as “Bring Your Own Disaster” by IT wags for years. Disasters, of course, DO happen – our tips should help you avoid being the guy who brings one.

Keep your Droid on a leash: Google lets users change passwords remotely

Android users will now be able to remotely add a password to a lost device, even if it’s locked, or already being used. Android police describe the new feature as “incredibly robust.”

Filecoder: Holding your data to ransom

Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new. We’ve noted a significant increase in Filecoder activity over the past few summer months – in this blog post we address the questions we’re getting about this issue.

Known unknowns – detecting rootkits under OS X

We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right now. We know that we don’t know. Today, ESET is releasing a simple tool to detect rootkits on OS X.

“Do not keep sensitive data on iPhone,” group warns after latex-fingerprint hack

Germany’s Chaos Computer Club released a video showing how a “fake fingerprint” made from latex could be used to fool the sensor, allowing any attacker access to the handset.

Grand Theft Android: Gamers warned to avoid fake “iFruit” GTA app

Android gamers have been warned to be wary of Grand Theft Auto V’s official “partner” app – Grand Theft Auto iFruit – after a slew of fake, malicious apps appeared online in advance of the real version. The app, available now on iPhone, allows gamers to customise cars, and interact with a virtual pet –

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Jean-Ian Boutin

David Harley

Graham Cluley

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Lysa Myers

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Peter Stancik

Copyright © 2014 ESET, All Rights Reserved.