Cybercriminals trying new tactics, security body warns – and attacks could have “large impact”

Cybercriminals are switching tactics, a leading security body has warned – and the combination of anonymisation technologies, mobile devices, and social media attacks could lead to cyberattacks with a “large impact”.

Can’t keep a bad man down: “Shylock” Trojan returns to attack U.S. banks

A stealthy banking Trojan known as Caphaw or Shylock has resurfaced – and is attacking customers of 24 American banks. It’s armed with defensive abilities including the power to “restore” itself during shutdown.

HIPAA 9/23 compliance deadline looms as breaches continue

This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that handle protected health information (PHI) need to be sure they are up to speed on the changes and ready to withstand scrutiny. In general, you will need new NPPs and BAAs (Notices of

Live fast, die old: Pro browsing tips to enjoy the Web at full speed (and safely too)

Malware, phishing and ID thieves are everywhere – but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.

Poison Apple? “Kissing” picture spreads Trojan to Mac users

A picture of a smooching couple actually delivers a kiss of death to Mac OS X users – it’s a new Mac Trojan which opens a backdoor on users’ machines. It’s the second piece of Mac malware detected in a week.

“More trouble” brewing as mobile threats multiply “exponentially”, ex-ISACA chief warns

Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer – warning that targeted attacks are already attempting to exploit it.

Fake card reader “texts” PINs to thieves instantly – and drains bank accounts in three hours

A hacked card reader – similar to the ones used in shops and restaurants – is on sale on Russian forums for $2,000, and can “text” details including PIN numbers to cybercriminals, who empty bank accounts in three hours using teams of money-launderers.

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of detection – even by advanced inspection systems using optical microscopes.

NIST cybersecurity framework: Your insurance company is watching

Cybersecurity insurance or “cyber insurance” was a hot topic at the latest NIST workshop on the critical infrastructure cybersecurity framework (CSF) in Dallas. Will the CSF become a standard used by insurers to determine rates?

Remote Desktop (RDP) Hacking 101: I can see your desktop from here!

With malicious remote access attacks of the rise it is time to check your computer’s RDP configuration and apply restrictions, like turning it off, limiting users,and applying strong passwords.

Brainwave-scanning hat could be most secure car key ever made

A brainwave scanner could be used as the ultimate biometric “car key” according to researchers at Tottori University – and even prevent carjackings, drunk driving, or accidents caused by drivers falling asleep.

A dream job at a luxury store? Nope – just a clever $1.5 million phishing scam

Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods department store were used as “bait”.

Companies that allow home working “ignore security risks”, report claims

Iron Mountain claims that up to two-thirds of employees work from home in Europe at least part of the time – but a mere 18% of firms offer guidance on how to protect information outside the office.

Tibet-targeting Mac OS malware rears its head again

A new variant on a family of Mac OS X malware which targets Tibetan activists has been found in the wild and shared on the Virus Total website, where security researchers show off new “finds”.

Phishing warning after Vodafone hack leaks personal information for 2 million customers

A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.

The end? “Passwords are done,” says Google security chief

“Passwords are done at Google,” said Heather Adkins, Google’s information security chief – and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.

A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will

These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.

Encryption advice for companies in the wake of Snowden NSA revelations

What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.

Twitter faces fruit invasion as weight-loss spammers invade via Hootsuite

Twitter has been hit by a wave of spam promising “pure garcinia cambogia” – a vegetable extract used in weight loss supplements. High-profile accounts such as Jane Fonda’s fell victim, with attackers compromising Hootsuite accounts to gain entry.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Jean-Ian Boutin

David Harley

Graham Cluley

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Lysa Myers

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Peter Stancik

Copyright © 2014 ESET, All Rights Reserved.