The perils of passwords – and how to avoid them

There are lots of ways that hackers can steal your passwords, and use them against you. So what can you do to fight back?

Most small-office routers have ‘critical’ vulnerabilities as mysterious ‘Moon’ worm spreads

A large majority of routers used in small offices are plagued with security vulnerabilities – with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.

Neiman Marcus attackers set off 60,000 alerts – but went unnoticed

Hackers who stole hundreds of thousands of card details from upscale retailer Neiman Marcus set off more than 60,000 security alerts – but these were all missed by security staff at the company, according to a report by Bloomberg Businessweek.

Urgent iPhone and iPad security update, Mac OS X as well

Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.

An In-depth Analysis of Linux/Ebury

In this blog post, we provide an in-depth analysis of Linux/Ebury – the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.

HIMSS 2014: Protecting Medical Data

ESET security researcher Stephen Cobb discusses the security of electronic health records and the threats to medical privacy from criminals.

Android under assault as spyware and Trojans ‘grow by 400%’, company claims

Malicious apps are multiplying rapidly in Google’s Play store – where a survey found that the number of malicious apps had grown 388% from 2011 to 2013, according to Risk IQ.

Scams: Tech Support, Accident Insurance, PPI, Oh My My

It’s not just fake tech support: call centre cold-callers are operating various kinds of insurance scams, too.

Tinder dating app gave away exact locations of users for months

Smartphone dating app Tinder revealed more about its users than they might have wished over a period of several months last year – revealing their location to other app users to an accuracy of around 100 feet, according to The Verge’s report.

How can doctors practice better health information security?

Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.

QR codes pose hidden danger to smartphone users, researchers claim

The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print magazines could pose a risk to smartphone users, Australian researchers at Murdoch University have warned

Belkin’s ‘Smart Home’ system has security flaws which could ‘black out’ homes – or start fires

Belkin’s WeMo home automation systems contain multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system – for instance, blacking out lighting in a home, or even starting fires, researchers have claimed.

Google buys firm with password-busting “silent sound” authentication system

Google has bought a company offering a new form of two-factor authentication – using “silent” sounds played via PC and smartphone speakers to verify a user is who he or she claims to be

Tax Scams, Malware, Phishing and a 419

A roundup of scam information, including a tax scams article, email with a link to malware, a phish, and the worlds laziest 419.

New to Mac? Four security tips you need to know

Mac OS X is a slick, easy-to-use operating system with an impressive record on security – and basic malware detection built in since 2009’s Snow Leopard update. While Macs have seen sales slowing in the past year, due largely to losing market share to their own stablemates, iPads, and other mobile devices, they’re a growing

Mysterious ‘Moon’ worm spreads into many Linksys routers – and hunts new victims

Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers – even ones protected by passwords – it’s still not clear how many are infected – or if the malware has a purpose beyond simply spreading.

The password is ‘burger joint’; places could be key to secure passwords

Could places, not phrases, be the basis of secure passwords. UAE researchers have created a system for creating complex passwords using facts about a user’s favourite place – and claim it can foil ID-theft attacks.

Kickstarter hacked. Users told to change passwords

Security expert Graham Cluley takes a look at the Kickstarter hack, and discovers there’s more to think about than just changing your passwords.

Online Dating and Privacy

ESET security researchers Cameron Camp and Lysa Myers discuss the privacy and safety implications of online dating in today’s world of potential over-sharing.

Silk Road 2.0 drug market hit, millions stolen from bitcoin reserve

A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Graham Cluley

Aryeh Goretsky

Robert Lipovsky

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.