Will car-hacking be the “next global cybercrime”? Senator’s letter inspires debate

As wireless technologies and electronic controls are increasingly built into cars, vehicles could become vulnerable to hackers – either stealing information, or injecting malware, a U.S. Senator warned – inspiring debate on how real this threat is.

Microsoft uses “telepathy” to warn users off weak passwords

Microsoft’s telepathic power, of course, comes from AI, not magic, and illustrates very clearly which passwords are easy for a computer to “guess” – the tool Telepathwords, guesses the next letter as you type in a password.

Microsoft Windows XP: Not Dead Yet…

Insight and advice on the impending retirement of Microsoft Windows XP from ESET Distinguished Researcher Aryeh Gorestky. With millions of people still using XP the security implications are significant.

Why “crypto” isn’t just for spies: A beginner’s guide to keeping secrets

For years, “encryption” has sounded like James Bond technology to many PC users – but new systems have made “crypto” technology easier to use, and a great way to protect the files you REALLY value.

Microsoft’s new crime-fighting super-team strikes blow against million-strong “zombie army”

Only weeks after Microsoft unveiled a global Cybercrime Center armed with new, hi-tech tools to combat crime, it announced it had carried out a global action leading to “significant disruption” of the Siferef botnet, a network controlling up to two million “zombie” PCs.

Did you say “Advanced” Persistent Threats?

Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we’ve encountered. Here we analyze a targeted attack used in Taiwan and Vietnam – but is this ‘APT’ really that advanced?

Has-bean? Old Androids still on Jelly Bean can be “lock-picked” by malware

A vulnerability in Android could allow attackers to “unlock” phones without cracking PIN codes – using malware to deactivate Google’s locks on handsets and tablets. The vulnerability can “turn off” all locks a user puts in place.

JP Morgan warns 465,000 cardholders of data leak after hackers breach defenses

Personal information for up to 465,000 customers of JP Morgan, Chase & Co. may be at risk after hackers breached its network in July, the bank has admitted. Some reports claim that hackers had access to unencrypted, private information.

Oh look, a hacked package delivery drone

News of Amazon’s plans to use aerial drones to deliver packages raises the prospect of clashing values in areas like use of air space and technology, not to mention privacy and plain old malice.

Why your small business needs an information security policy and a WISP

Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.

Ultrasonic cyber-attack can “steal information” even from high-security systems, researchers warn

An audio communication system designed for ultrasonic underwater communications can be used to steal data – even from disconnected PCs in secure environments, by relaying it to the outside world from PC to PC through computer speakers, researchers claim.

New Apple face-recognizing system could prevent snoopers reading your alerts

Apple users may soon be able not only to unlock their devices simply by showing their face – they may be able to “control” functions on Macs, iPhones and iPads simply by looking at the screen, and prevent people nearby snooping on lock screen alerts.

The Thoughtful Phisher II

In the previous Thoughtful Phisher blog, we looked at some visual clues that should tip you off that a email from a ‘bank’ is not to be trusted. Just as interesting here, though, is the variety of social engineering gambits used by this wave of phish campaigns. It’s worth taking a closer look at some

Spy agencies working on cyberweapon “more powerful than Stuxnet”, claims Iran

An Iranian news agency has said that “malware worse than Stuxnet” may soon be unleashed, to “spy on and destroy the software structure of Iran’s nuclear program”.

Millions in Bitcoin stolen from Sheep dark market as user flees

One of the ‘dark marketplaces’ offering illegal and semi-legal services via the anonymized web browser Tor has shut down, according to reports – with a user fleeing with millions of dollars worth of Bitcoin.

Death message: Google Nexus phones can be remote-crashed by SMS, researcher warns

At least two recent models of Google’s flagship Nexus Android handsets can be crashed remotely – simply by sending them a flurry of SMS text messages, a Dutch researcher has warned.

Malware attack on Seattle hospital leaves 90,000 patients’ details exposed

Systems at Harborview Medical Center and University of Washington Medical Center were infected with malware in October after an employee opened an infected email. This put thousands of patients’ data at risk.

When malware goes bad: an historical sampler

A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped. Can malware spread to quickly for its own good? Can malware authors ever test their wares well enough to work perfectly?

Who’s Responsible For Social Media Safety?

According to a Harris Interactive survey of more than 2,000 U.S. adults commissioned by ESET, almost two thirds of respondents said that online safety (privacy and security) was the responsibility of the individual, not service providers or the government. ESET security researcher Stephen Cobb discusses this and other findings in the Malware Report.

Social media safety: top five tips

Social media sites like Facebook and Twitter are great, but use them with caution. We Live Security has five tips to keep you safe.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Graham Cluley

Aryeh Goretsky

Robert Lipovsky

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.