The immortality of data (and people) in the digital age

In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity be possible (or desirable)?

Hackers phish for data with fake Apple Watch giveaway

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

Google’s Project Zero reveals possible memory leak hack

Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.

Superfish: Lenovo goes on the bloatware offensive

Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish’s Visual Search adware on some of its popular consumer laptops during last year’s holiday shopping season.

The human cost of phone hacking

Phone hacking ruined the lives of celebrities, and – in at least one case – almost drove a victim to suicide.

80 percent of global merchants fail card data security tests

Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not in compliance with card data security standards.

Google Admin console email spoofing loophole patched

A vulnerability in Google Admin that could have allowed domains to be claimed to send out authentic seeming spoofed emails has been patched by the company, reports The Register.

US lawmakers want taxi apps to check driver fingerprints

Ride-sharing taxi apps Uber, Lyft and Sidecar have been asked by US lawmakers to adopt fingerprint-based background checks for their drivers,

US military looks to 3,000 new security hires by 2016

The United States’ military is looking to hire 3,000 cybersecurity professionals to man its infosec unit over the next nine months.

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Three men indicted in ‘one of the largest’ data breaches in US history

The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,”

ESET’s Mark James on 2015’s security trends

how is 2015 shaping up in security? We caught up with ESET security specialist Mark James to get his take on threats, security and how people should ensure their year is free of malware.

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.

DDoS attack on feminist blog backfires on International Women’s Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

Air traffic control vulnerability could allow criminals to hack the skies

The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed by the Government Accountability Office (GAO).

Lysa Myers: “There are still only a handful of women in the security field”

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

Adobe crowdsources its bug-hunting, but no rewards offered

Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper – another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Anthem refuses IT security audit following massive data breach

Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach last month that could have affected up to 80 million of its customers.

Follow us

Copyright © 2015 ESET, All Rights Reserved.