latest posts

Phishing unravelled

Phishing may well be one of the oldest online scams in the world, but it’s also one of the most effective and commonly deployed. Here’s what to be aware of.

NICE news about the cybersecurity skills shortage (and a call for papers)

The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.

Lenovo disables ‘unremovable software’

Lenovo has announced that LSE,a virtually unremovable software, is no longer being installed on its products.

BitTorrent family susceptible to DRDoS attacks

A new study shows that applications belonging to the BitTorrent family are vulnerable to DRDoS attacks.

Apple releases major security updates

Significant issues evident in Apple products have been patched with a raft of new updates.

Are you still vulnerable to Stagefright? Get your Android device checked now

Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a crafted MMS. According to them up to 950 million devices could be vulnerable.

Signatures, product testing, and the lingering death of AV

Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.

How to stop pervy pics popping up on your iPhone

Don’t be cyber-flashed by a pervert. Make sure that your iOS device’s AirDrop settings are configured properly to protect your eyes from unpleasantness.

Researchers win Internet Defense Prize for C++ detection tool

Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.

Corvette hacked with a text message

Researchers have hacked into a Corvette with a simple text message, taking control over its brakes.

Cybercriminals and traders charged with $100m ‘newswire fraud’

An international team of hackers and traders who benefited from illegal pre-publication access to company finance updates have been charged with fraud.

Facebook data security loophole ‘needs to be fixed’

A data security loophole discovered in Facebook needs to be fixed, according to a software engineer.

5 child geniuses destined for a career in cybersecurity

There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.

Firefox Under Fire: Anatomy of latest 0-day attack

The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.

Glasses that ‘block’ facial recognition technology to launch in 2016

Glasses that are capable of blocking facial recognition technology are to go on sale in Japan next year.

ICO investigating major data breach at Carphone Warehouse in the UK

The Information Commissioner’s Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.

DEF CON – Upgrading your mom’s basement

If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.

Universal remote can ‘hack into any car’

A hacker has developed a device that is capable of hacking into most modern cars by bypassing the rolling code security system.

Black Hat 2015 – Threats hit the road

This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.

20,000 NHS Wales PCs still running Windows XP from beyond the grave

An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.

Is that really an appropriate level of security for computers that could be holding patients’ medical information?

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

David Harley

Stephen Cobb

Lysa Myers

Bruce Burrell

Graham Cluley

Raphael Labaca Castro

Anton Cherepanov

Cameron Camp

Aryeh Goretsky

Robert Lipovsky

Lukas Stefanko

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.