What to do if your password is leaked

If disaster strikes and your password is leaked, don’t panic! We Live Security has a simple guide to help limit the damage.

Top 5 security tips for online shopping

Online shopping is fast, easy and convenient, but is it safe? Stay secure with We Live Security’s Top 5 tips.

Time to Move On From Windows XP

Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support for this venerable operating system. ESET discusses implications and resources.

Better Mac Testing: Static versus Dynamic Testing

Dynamic or on-access Mac testing of AV products is problematical with samples for which Apple has implemented signature detection.

How to make safer online payments

Paying for things online is as easy as clicking a mouse, making online stores are a logical target for cybercriminals. Make safer online payments with this guide from We Live Security.

Mark Zuckerberg invests in CAPTCHA-crushing AI which “thinks like a human”

Mark Zuckerberg, Paypal founder Elon Musk and Ashton Kutcher have invested $40 million in an artificial-intelligence start-up, Vicarious, which can already ‘read’ CAPTCHA codes – and aims to mimic functions of the human brain.

President Obama’s BlackBerry survives assault from Korean Androids

Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.

Bitcoin fixes Mt Gox theft bug – as exchange staff find 200,000 BTC in ‘forgotten’ wallet

Bitcoin’s developers have released a new version of the software, which includes a long-awaited fix for the “transaction malleability” bug which is said to have brought down the Mt Gox exchange – and Mt Gox staff have ‘found’ 200,000 BTC in an abandoned wallet in the exchange.

Google encrypts ALL Gmail to keep snoopers out

Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access the service – and will use security measures when moving mails internally, citing fears over government snooping.

HIMSS Conference 2014 Insights

Master of Mavericks: How to secure your Mac using Apple’s latest update

Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk

Stealth malware sneaks onto Android phones, then “turns evil” when OS upgrades

A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS – allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.

Target breach optioned as Sony feature film

The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as a feature film by Sony. The studio bought the rights to the New York Times article, “Reporting From the Web’s Underbelly,” with a view to creating a “cyber thriller.”

Facebook’s ‘Deepface’ photo-matching is nearly as good as human brains

Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings – a huge leap forward in the technology, with some potentially alarming implications for privacy.

Google Glass spyware lets snoopers “see through wearer’s eyes”

Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.

Revenue Service breach may have leaked data on 20,000 employees

Personal data for around 20,000 workers for the U.S. Internal Revenue Service (IRS), including names, social security numbers and addresses may have been exposed, after an employee plugged a thumb drive into a computer on an unsecured home network.

Top 5 Windows phone security tips

Windows 8 phones are pretty secure as standard, but try WeLiveSecurity.com’s five tips to keep your phone safe from prying eyes and malware.

Better Mac Testing? How OS security can make AV testing harder

As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.

Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.

Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Lysa Myers

Graham Cluley

Stephen Cobb

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Robert Lipovsky

Bruce Burrell

Copyright © 2014 ESET, All Rights Reserved.