The two million people who had chosen “123456” as their Adobe password were widely mocked online after the company’s security breach – but most users (and companies) hate passwords, and some have big (and surreal) ideas about what’s coming next….
(All four blog articles in this series, of which this article is the last, are available as a single paper here: The_Thoughtful_Phisher_Revisited.) From the sort of ‘visit this link and update or we’ll cancel your account’ message that we saw in the previous blog in this series (The Less Thoughtful Phisher), it’s a short step
The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
A Firefox add-on has turned 12,500 users of the browser into a botnet which scours every page visited by infected users for vulnerabilities. The ‘Advanced Power’ add-on ensnared 12,500 PCs – and found 1,800 vulnerable websites for its unknown creators.
A new ‘Smart ID’ card, BluStor, aims to “eliminate hacking and identity theft” – using a combination of voiceprints, fingerprints and iris readings and connecting to mobile devices via Bluetooth, so an app can confirm a user’s ID instantly.
The assault by cybercriminals against big businesses continued this year -78% were attacked by outsiders, according to a report by Price Waterhouse Cooper. But small businesses – those with less than 50 employees – are rapidly becoming a target.
An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the NSA, according to an interview given to CBS by NSA director Keith Alexander. The attack could have “taken down the U.S. economy”, an NSA official claimed.
Your next PC password could be President Bill Clinton kissing a fish – and that disturbing mental image, and similar surreal “story images” could be the key to creating strong passwords across multiple accounts, according to Carnegie Mellon researchers.
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.
All of the top 100 apps on Google’s Play store have been hacked, and hackers now specifically target financial apps, such as those used by banks – with 53% of Android banking apps having been cracked, according to a report by Arxan.
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker – based on opinion polls of 100,000 smartphone users around the world.
This week, UK IT worker and social engineering blogger Dale Pearson was targeted – with eight phone calls from a company claiming there was a fault on his PC – but Pearson had both the time and the equipment to fight back.
Less innovative than the scam mails described in my previous articles (Phish to phry and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still active – November has been particularly eventful. In this post, we’ll give an update on the situation and malware developments.
Have you been wondering what trends in security and privacy ESET researchers are predicting for 2014? The following is a sampling, a year-end snack plate if you will, featuring predictions from Aryeh Goretsky, Righard Zwienenberg, David Harley, Cameron Camp, Lysa Myers, and more.
Few things are sacred to today’ cybercriminals – and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime – rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here’s how to stay safe.
The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC webcams, a court has heard. The teams operate “like normal hackers” – and rely on phishing and other criminal techniques.
Have you checked out the weekly podcast by ESET security researchers? It’s called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.