latest posts

Were you planning on downloading the Pokémon GO APK? Beware fake versions!

Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.

Nymaim rides again in 2016 and reaches Brazil

During the first half of this year, ESET has observed an increase in the number of detections of Nymaim, a long-known malware family whose prevalence has fallen markedly since 2014.

Hi, I’m the enemy: Different perspectives on a pentest

WeLiveSecurity begins a new series of articles showing the different angles that can be taken when tackling a pentest.

Over 1000 Wendy’s restaurants hacked – customers’ credit card details stolen

Fast food giant Wendy’s says that it now believes that more than 1000 of its restaurants across the United States have fallen victim to a hacking gang, who used malware to steal customers’ credit and debit card information.

‘Ruthless’ cybercriminals pose a major threat to organizations

Organizations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG.

Types of VPN networks and how they work: do you know which kind to use?

WeLiveSecurity delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?

Ransomware: First files … now complete devices

Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.

New OSX/Keydnap malware is hungry for credentials

For the last few weeks, ESET has been investigating OSX/Keydnap, a malware that steals the content of the keychain while maintaining a permanent backdoor.

Chicago man pleads guilty in celebrity iCloud data breach

A 28 year-old Chicago man has pleaded guilty to using phishing scams to illegally access more than 300 iCloud and Gmail accounts, around 30 of which belonged to celebrities.

Data leak dangers: Know your weak spots

When it comes to data leaks, what are the major weak spots you need to be looking out for? This feature explores three common causes.

The security review: How secure are our cash machines?

Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.

Espionage toolkit targeting Central and Eastern Europe uncovered

Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit.

‘Fansmitter’ malware can extract data from air-gapped computers

Fansmitter, a new malware with the capability to extract data from air-gapped computers, has been developed by scientists in Israel.

How to secure your social media accounts

Social media platforms are increasingly being targeted, as Facebook CEO Mark Zuckerberg found out earlier this month. Here, we look at how to keep your accounts secure.

Hard Rock Hotel & Casino Las Vegas experiences data breach

The Hard Rock Hotel & Casino Las Vegas has experienced a data breach. Its investigation found unauthorized access to its payment card environment.

Stay cyber safe on the road: 10 tips for this summer season

If you are traveling this summer and taking your gadgets with you, this guide will ensure that you keep cyber safe when on the road.

Digital patch kit: How to protect yourself from data leaks

Knowing where your weak spots are as organization is important, as is ensuring that you actively do everything you can to stay secure from data leaks.

Please stop spreading the Facebook privacy notice hoax

A widespread hoax is being circulated between Facebook users, in the mistaken belief that posting the message will will give them more control over their privacy.

Google’s CEO Sundar Pichai’s online accounts hijacked

Google’s CEO Sundar Pichai is the latest public figure to have his online accounts hijacked by OurMine.

Malicious scripts in compromised websites and how to protect yourself

Some of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors.

Follow us

Copyright © 2016 ESET, All Rights Reserved.