latest posts

SWIFT: We’re not responsible for Bangladesh Bank cyberheist

SWIFT has delivered a strongly-worded statement that rejects the claims made by both Bangladesh Bank and Bangladesh Police’s Criminal Investigation Department over one of the biggest cyberheists in history.

Exploiting 1-byte buffer overflows

Matías Porolli shows how exploit another classic buffer overflow vulnerability, in which the ebp register is moved to execute an arbitrary code.

After authentication comes authorization and access control

In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET’s Lysa Myers.

Top tech firms ordered to disclose approach to mobile patches

Top tech organizations have been “ordered” to disclose their approach to security updates with mobile devices.

Big businesses in the UK ‘experience regular data breaches’

Data breaches are widespread among large businesses in the UK, according to a new report. The Cyber Security Breaches Survey found that two-thirds of the biggest firms have experienced an attack of some kind over the past 12 months.

Mother’s Day comparison: Which nation has the strictest moms?

On Mother’s Day, ESET takes a deeper look into the results of its recent survey focusing on parenting in a digital era. We looked at how moms in the US, Germany, the UK and Russia are trying to protect their children.

The security review: Jigsaw and passphrases

Welcome to this week’s security review, which includes Jigsaw & the increasing aggressiveness of ransomware and the importance of passphrases.

FBI: No, you shouldn’t pay ransomware extortionists

The FBI has published a list of tips to reduce the chance of ransomware being the ruin of your company – and is keen that you don’t pay the extortionists.

Data loss scenarios: Which are the most probable?

Research shows that running regular backups for data, as well as encrypting them, is necessary for organizations to ensure that their information is safe.

New York experiences surge in reported data breaches

The New York State Office of the Attorney General has experienced a massive increase in the number of reported data breaches in 2016.

Interop: Getting a few more years out of your tech

Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.

272 million email accounts compromised in major data breach

Hundreds of millions of email usernames and passwords are ‘up for grabs’ in Russia’s criminal underworld, thanks to a major data breach.

Forget about passwords: You need a passphrase!

Forget about passwords – it’s all about passphrases. Longer, more complex and easy to remember, they will help you be more safe and secure. Our guide shows you how to create a passphrase.

10-year-old Finnish boy uncovers Instagram comments vulnerability

A 10-year old boy has found a security flaw in Instagram and, for his efforts, been rewarded $10,000 by Facebook.

Jigsaw and how ransomware is becoming more aggressive with new features

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort, reports ESET’s Josep Albors.

Google introduces HTTPS for blogspot domain names

Google is adding further security to the world wide web by introducing HTTPS for every blogspot domain name.

Third party risks ‘ a serious risk’

Third party risks to organizations has been described as a “serious threat”, a new study by the Ponemon Institute and Shared Assessments as revealed.

Authentication 101

Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are, says ESET’s Lysa Myers.

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.

Cybercriminals ‘increasingly relying upon ransomware’

Ransomware is being increasingly relied upon in cyberattacks, according to Verizon’s latest Data Breach Investigations Report.

Follow us

Copyright © 2016 ESET, All Rights Reserved.