What are the alternatives to passwords?

Is it time for big companies – at the very least – to abandon weak password security? If so, what password alternatives are there?

The utterly crazy story of the death threat hacker (involves a cat)

A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.

Raptr gaming hack leaves user passwords and personal info exposed

Gamers using Raptr and AMD Gaming Evolved chat services should change their login details immediately, following a breach that could give hackers access to names, email addresses and passwords

Internet Explorer exploit could let phishers steal logins

A vulnerability in the latest patched version of Microsoft Internet Explorer that could allow hackers to launch “highly credible phishing attacks” has been uncovered, according to PC World.

Facebook turns 11 – what you need to know, and what do your likes say about you?

Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.

White House seeks 10% increase in cybersecurity spend

President Obama’s budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.

Hacked dating website Topface buys back stolen personal data from hacker

A Russian dating website that had 20 million email addresses stolen last week, has paid the hackers not to sell the information, TechWeek Europe reports.

The New Hacker’s List and an Old Debate: Would you Hire a Hacker?

The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?

BMW fixes security flaw that left more than 2 million cars unlocked

BMW has patched a bug in its ConnectedDrive system that left 2.2 million cars vulnerable to being hacked and unlocked.

HipChat hack leads to precautionary password reset

Use HipChat? Be aware that hackers have accessed the names, usernames, email addresses and encrypted passwords for some users.

Google announces ‘Vulnerability Research Grants’

Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up empty-handed, reports ZDNet.

Facebook porn scam infects 110k users in 48 hours

A new porn scam is spreading startlingly quickly through Facebook – one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.

Q4 DDoS attacks up 90% on previous quarter

The number of distributed denial-of-service attacks on websites in the final quarter of 2014 was up 90 percent on the previous quarter, according to research from Akamai Technologies.

US military explores ‘cognitive fingerprints’ as alternative to passwords

Sky News reports that the United States military is investing heavily in new identify verification techniques that could replace passwords and biometric solutions for security.

Linux haunted by Ghost vulnerability

Security researchers have found a vulnerability inherent to a widely used component in most versions of Linux, reports Computer World.

MSIL/Agent.PYO: Have botnet, will travel

ESET’s researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.

Over 5,000 US gas stations vulnerable to remote hacks

Around 5,300 gas stations in the United States could be vulnerable to a remote cyberattack on the automated tank gauges, causing the pumps to flag alerts or even shut down

Are you being tracked? How to spot a tracking app on your phone

Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.

Top 5 security tips for Android Lollipop

Android Lollipop has a number of new ways to keep your data private. So, start with these top 5 tips to keep your smartphone secure.

The Biggest Hacks of 2014

There were a number of big security breaches during 2014, but which was the biggest? We count down the top 5.

Follow us

Copyright © 2015 ESET, All Rights Reserved.