latest posts

Swooping robot attack which felled triathlete “may be work of hackers”

A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from the sky, causing head injuries. The competitor, Raija Ogden was treated by paramedics at the scene after the UAV (Unmanned Aerial Vehicle) suddenly plunged from the sky, hitting her on the head. The

“Virus Shield” app is top-selling hit – but does absolutely nothing

Armed with an impressive-looking shield logo, security app Virus Shield shot to the top of the sales charts on Android last week. There was one, tiny, problem: the app was a fake.

Two-thirds of parents spy “regularly” on children’s social media accounts

Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge” – and one-fifth had found “incriminating” posts which they confronted children about.

The future of security: Microsoft rewards 5-year-old who found critical password flaw

Most five year olds can write their own name – but few have a job title to put after it. A young Xbox fan has joined an elite group of official Microsoft “security researchers” after he exposed a security flaw on Xbox’s Live Service.

Microsoft to fix zero-day flaw that meant just previewing an Outlook email could infect your computer

It’s one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment – but it’s quite a different level of threat when simply *previewing* a message in your email client infects your computer.

What is EMV, and why is it such a hot topic?

You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.

“Domestic spyware” apps increasingly precursor to violence – or murder

Apps designed to ‘report’ on handset users’ communications while remaining undetected have increasingly become a factor in cases of domestic violence and even murder.

Surveillance cameras hijacked to mine Bitcoin while watching you

Malware written specifically for DVR recorders used for the output of surveillance cameras has forced some machines to mine Bitcoin – although the low-powered machines are ‘very bad’ miners, Wired points out.

With just days to go, just how many PCs are still running Windows XP?

If computers continue to run Windows XP, and don’t receive any more security patches. they are not just putting themselves and the data they carry at risk, they are endangering all of us who use the internet.

Attack on Samsung’s Boxee TV service leaks 158,000 passwords and emails

An attack on the forums for the Boxee internet-TV service has yielded 158,000 customer passwords – and what appears to be email addresses and full messaging histories for the victims.

Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute

DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes how the malware guesses router passwords as part of its campaign to misdirect users, send spam and infect new victims.

New Harris poll shows NSA revelations impact online shopping, banking, and more

A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans and some say they are doing less online banking and less online shopping because of what they have learned about the NSA.

Credit cards are dead, long live fingerprints? Samsung S5 first of ‘many’ scan-to-pay phones

Samsung’s Galaxy S5 offers a cutting-edge component that will change m-commerce forever – a fingerprint-scanner which offers instant authentication with one finger-swipe and which works in stores as well as online.

Tesla shocker as researcher picks electric supercar’s lock

The Model S is rated one of the safest cars on the road – but the electronic security system protecting its locks may not be quite as bulletproof, researchers claim. The six-digit PIN used to protect its lock can be brute-forced, or phished, by attackers.

5 Tips for protecting Windows XP machines after April 8, 2014

Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.

The Internet of Things isn’t a malware-laced game of cyber-Cluedo… yet

Will the future be a murderous game of ‘smart device’ Cluedo, where Colonel Mustard meets his death at the hands of a Wi-Fi pacemaker, and Miss Scarlett is consumed in a Smart Home-ignited blaze. Not likely, says David Harley – where’s the profit motive?

Channel Cybercrime: Bug allows hackers to hijack screen of Philips TVs

Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.

PRISM-proof system could turn servers into spook-proof fortresses

A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues – and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.

Sniffing earwax could offer icky new frontier in biometrics

For most of us, earwax is a bodily product we prefer not to think about, but a team of scientists have discovered that the substance reveals a huge amount about its creator – and could even be used to identify people.

Tumblr adds “nuclear defense system” (well, 2FA) to shield users

Popular blogging service Tumblr has become the latest web giant to add two-factor authentication as an “extra layer” of security for users – describing its new measure as a “nuclear defense system” armed with twin keys.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Jean-Ian Boutin

David Harley

Graham Cluley

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Lysa Myers

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Peter Stancik

Copyright © 2014 ESET, All Rights Reserved.