latest posts

Krysanec trojan: Android backdoor lurking inside legitimate apps

One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and to stick to the official Google Play store, where malware does show up from time to time but is much better controlled, thanks to the Google Bouncer, than on alternative app stores.

Facebook privacy – is Messenger watching you?

Facebook’s new Messenger app has spared privacy concerns after a list of Permisssions appears to show the app could be taking video of users in secret, according to the Washington Post.

Wi-Fi security: Flight systems “are safe… for now” claims expert

An aircraft security expert has eased the worries of a lot of frequent flyers this week — by reassuring them that aircraft are not “hackable” in mid flight. The claim was made at Black Hat last week.

Week in security: FBI malware, billion password leak – Chinese hotel goes mad

With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week – but revelations about FBI malware and a trove of a billion passwords inspired furious debate too.

Internet of Things: Google’s Nest hacked into “full-fledged” spy gizmo

Yet another “connected” device was outed as a potential spy this week – as researchers showed how Google’s Nest thermostat could be turned into a “fully-fledged spying device”.

Flash Memory Card Risks

The state of healthcare IT security: are Americans concerned enough?

The privacy and security of medical records is a matter of concern to many Americans now that most are now stored electronically, but is there cause for concern? And who is most concerned?

Internet of things: Hacker unleashes “mayhem” in 200 hotel rooms

Today’s fashion for high-end electronics in luxury hotels allowed a hacker to wreak havoc in 200 suites at once in a five-star hotel in China – switching off lights, changing the TV channel, raising blinds and fiddling with the temperature.

Common password mistakes we all make

Passwords are critical to safeguarding our personal and financial information, but when using them so often it can be easy to make mistakes. Follow these five simple steps from We Live Security to keep your passwords safe.

Online privacy – FBI ‘using malware’ to track site visitors

For several years, FBI agents have been taking an unusual approach to detective work online – using malware against suspects who have not been proven guilty, just visited the wrong Tor site.

CyberVor hacking gang steals 1.2 billion usernames and passwords

Somewhere in a small city in south central Russia, a group of men in their twenties have got away with what some are describing as one of the biggest cyber-heists in history.

Malware behind 25% of cyber attacks – and DoS is ‘so last year’ says CERT team

Cybercriminals are waging a game of ‘cat and mouse’ with corporations, well-armed with malware protection AV software but facing adversaries who scan constantly for weak points, according to the first quarterly report released by the UK’s new Computer Emergency Response Team.

Wi-Fi security – can inflight internet REALLY hack planes?

Aircraft communications equipment can be hacked via Wi-Fi and inflight entertainment systems, allowing access to communications systems aboard aircraft in flight – and even military systems could be at risk.

Dark web II: Tor’s markets ramp up security – and business booms

Since a recent claim researchers could “uncloak” Tor users for less than $3,000, there has been a flurry of activity in the “anonymous” online service – but in the form of new adverts, new markets, and new security.

Sharing documents… without sharing secrets

Sharing documents through the web is essential in most occupations. When sharing sensitive information, though, it’s important you take the necessary precautions to keep you and your data safe. Here’s how to share documents without sharing secrets…

Data breach burns Firefox – add-on creators hit by email leak

After a technical error on a Mozilla database, thousands of email addresses and encrypted passwords were exposed for nearly a month – leaving 78,000 Mozilla app developers vulnerable to hackers.

Malware is called malicious for a reason: the risks of weaponizing code

The risks of using government use of malicious code in cyber conflict are examined in this paper by Andrew Lee and Stephen Cobb: Malware is called malicious for a reason: the risks of weaponizing code.

Business Continuity Management 101

Homeland Security warns of new Point of Sale attacks

New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.

Week in Security: Tor in turmoil, USB ports in a storm, Android app attack

This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Aryeh Goretsky

Graham Cluley

Robert Lipovsky

Stephen Cobb

Lysa Myers

David Harley

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.