Survey says 77% of Americans reject NSA mass electronic surveillance, of Americans

In light of the Snowden/NSA revelations of mass surveillance, 77% of American adults say it is not okay for the government secretly to monitor all of their communications. And some of us are changing how we use the Internet as a result.

Rogue’s gallery? New app aims to “out” cybercriminals who prey on online daters

A new app, Truly.am, aims to put a stop to a fast-growing area of online fraud – online dating scams – by forcing cybercriminals to prove they are who they say they are.

Artificial intelligence firm claims to have “cracked” CAPTCHAS

An American artificial intelligence company claims to have “cracked” CAPTCHAs – the standard word tests used to tell humans and computers apart online. A program designed by Vicarious can break standard CAPTCHAs with 90% accuracy, Vicarious claims.

Rebuffed! Social site Buffer fights off onslaught of fruity weight-loss spam

An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer – appearing on official accounts for companies such as Brussels Airlines and Startup Genome.

Cyberattack in Israel “shuts down” road for hours

Attackers used a Trojan program to target a security camera system in the Carmel Tunnels toll road in Haifa, shutting down the road for hours, and causing “hundreds of thousands of dollars” in damage.

The Preliminary NIST Cybersecurity Framework published and Workshop #5 scheduled

The newly published Preliminary Cybersecurity Framework from NIST, part of the federal effort to help critical infrastructure owners and operators reduce cybersecurity risks, is now available for review, with some interesting new language and a final workshop scheduled for November.

Cost Of Cyber Attacks Still Rising

The amount of money it costs when security is breached can really add up. Stephen Cobb explains.

PHP site WAS serving malicious code, owners admit after Google raises red flag

When Google’s Safe Browsing service said that programming site PHP.net was hosting and serving malware, it sparked furious discussion – but the site investigated, and has since admitted a Javascript attack, and moved to “clean” servers.

Don’t pay up! How to avoid ransomware threats – and how to fight back

Ransomware can be among the most frightening forms of malware – suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.

New fingerprint ID system scans for living blood – and is “solution to cybercrime”, makers claim

Launched today in London, the technology mixes biometrics and other security technologies for what its makers claim is a “transformative” solution to combating cybercrime – and which can be used for network security, banking machines and even smartphones.

Why Mac security product testing is harder than you think

As both Macs and Mac malware increase in prevalence, the importance of testing the software intended to supplement the internal security of OS X increases too. But testing security products on Mac is tricky, due to Apple’s own countermeasures. Can it be made easier?

Nymaim: Browsing for trouble

We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.

Rotten routers? More brands found to contain hidden “backdoors”

Routers from Chinese manufacturer Tenda contain a hidden “backdoor” which could allow attackers to “take over” the router and send it commands. The company also sells routers branded as Medialink, and the machines are available around the world.

Fake Grand Theft Auto V tempts thousands of PC users to download “malware”

Grand Theft Auto V sold more than $1 billion worth of units in a week – no wonder cybercriminals are tempted to cash in. A torrent offering the game on PC has been downloaded “thousands” of times, sites report.

Is this how Indonesia topped the malicious traffic charts?

Indonesia as a major source of malicious traffic? That’s what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.

Warning overload? Half of PC users ignore virus alerts – and middle-aged are “worst culprits”

Middle aged PC users routinely ignore warnings that sites may harm their computers – and that figure has doubled since 2011, according to research by ESET Ireland.

Millions at risk as guest information from hotel Wi-Fi provider “goes on sale” in China

A huge amount of private information harvested via hotel Wi-Fi networks is on sale in China – including phone numbers, dates of birth and addresses from hotel guests who logged in to networks in their rooms.

Warning over “risky” behavior of under-12s online – and parents need to take action, safety group says

Children indulge in highly risky behavior online – with nearly one in five 9-11 year olds having physically met strangers they encountered online. Others use false identities – with some under-10s pretending to be 25.

Cyberattacks against major firms “double in one year”, report warns

Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll – and the target is often information, rather than cash.

Solutions to current antivirus challenges

The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Robert Lipovsky

Aryeh Goretsky

Graham Cluley

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.