latest posts

Privacy and security post-Snowden: Pew Research parallels ESET findings

Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.

Public Wi-Fi hotspots – know the risks

For ordinary laptop and smartphone users, Wi-Fi is not ideal – but it’s sometimes near-inescapable.

Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event

The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.

5 new iOS 8 features that make your iPhone safer than ever

The recent release of Apple’s iPhone 6 was coupled with the upgrade in software to iOS 8. This new operating system has come with a host of new features including these 5 that will make your phone safer than ever.

How to stay safe on Snapchat

Snapchat promises self destructing photos, but the recent leak of 13GB of snapchat images through a 3rd part website has left users questioning the app. Here are 5 things to remember when using Snapchat.

G20 2014 Summit Lure used to target Tibetan activists

APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.

MasterCard and Visa to end password authentication

MasterCard and VISA have revealed their plan to end the use of passwords for online payments, reports The Telegraph.

IT Pros also guilty of risqué selfies on mobiles

ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.

BadUSB potential not as widespread as originally thought, but remains difficult to avoid

The BadUSB malware which potentially turns any USB stick into a ‘unpatchable’ malware carrier doesn’t quite have the potential for mayhem it was originally feared, according to the researcher who uncovered the exploit.

.NET goes open source and cross-platform

Microsoft’s .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.

Microsoft discovers vulnerability in all versions of Windows – patch available

Microsoft has uncovered a flaw in all supported versions of Microsoft Windows that could allow hundreds of millions of computers to be taken over by a remote attacker, International Business Times reports.

Snapchat urges users to disconnect third party apps after breach

Following last month’s leak of 13gb worth of private Snapchat videos, the vanishing message service has announced a new policy whereby it will automatically detect third-party apps, and advise users to disconnect them, reports Tech Crunch.

Korplug military targeted attacks: Afghanistan & Tajikistan

After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

Website reveals 73,000 unprotected security cameras with default passwords

As we’ve reported before, users and businesses leaving their router username and passwords as the manufacturer’s default are potentially leaving themselves open to an easy hack, but a new website has sprung up illustrating the point in alarming detail.

Sednit Espionage Group Attacking Air-Gapped Networks

The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks — “air-gapped” networks — and exfiltrate sensitive files from them through removable drives.

Kickstarter campaigns wants your password on your wrist

A new wristband that aims to replace the password has launched a crowdfunding campaign on Kickstarter. At the time of writing, Everykey has passed the halfway mark on its $100,000 funding target with $56,586 pledged with 19 days to reach $100,000. Using Bluetooth, the Everykey promises “immediate access to a user’s password-protected electronics such as

Realistic looking phishing websites work 45% of the time, Google claims

Google has teamed up with the University of California in San Diego to publish surprising new research about phishing, how effective it is and how scammers work their phishing operations.

Amazon phishing scams hit over 750,000 Brits

Although phishing scams are something everyone should always be vigilant to, AppRiver has identified two specific Amazon types which are currently targeting the UK market, Tech Week Europe reports.

Home Depot breach: hackers took 53 million email addresses

September’s breach of Home Depot that saw 56 million sets of credit and debit card data stolen was not the only thing lost in the leak, the company has revealed.

Apple Pay and security – what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments – both from Apple’s own system, and rivals playing catch-up.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

David Harley

Stephen Cobb

Robert Lipovsky

Joan Calvet

Sébastien Duquette

Graham Cluley

Cameron Camp

Lysa Myers

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Marc-Etienne M.Léveillé

Copyright © 2014 ESET, All Rights Reserved.