Wi-Fi security – can inflight internet REALLY hack planes?

Aircraft communications equipment can be hacked via Wi-Fi and inflight entertainment systems, allowing access to communications systems aboard aircraft in flight – and even military systems could be at risk.

Dark web II: Tor’s markets ramp up security – and business booms

Since a recent claim researchers could “uncloak” Tor users for less than $3,000, there has been a flurry of activity in the “anonymous” online service – but in the form of new adverts, new markets, and new security.

Sharing documents… without sharing secrets

Sharing documents through the web is essential in most occupations. When sharing sensitive information, though, it’s important you take the necessary precautions to keep you and your data safe. Here’s how to share documents without sharing secrets…

Data breach burns Firefox – add-on creators hit by email leak

After a technical error on a Mozilla database, thousands of email addresses and encrypted passwords were exposed for nearly a month – leaving 78,000 Mozilla app developers vulnerable to hackers.

Malware is called malicious for a reason: the risks of weaponizing code

The risks of using government use of malicious code in cyber conflict are examined in this paper by Andrew Lee and Stephen Cobb: Malware is called malicious for a reason: the risks of weaponizing code.

Business Continuity Management 101

Homeland Security warns of new Point of Sale attacks

New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.

Week in Security: Tor in turmoil, USB ports in a storm, Android app attack

This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.

Tor ‘unmasked’ – but who is at risk?

Users of the online privacy service Tor – designed to allow users to access hidden sites anonymously – may have been unmasked after an attack lasting five months, crafted to de-anonymise traffic on the service.

Malware: Every USB port is “defenseless” against new scam

The billions of USB ports in use in PCs are vulnerable to a new attack – which can undetectably install malware, steal data and seize control of machines.

Facebook privacy – the 20,000 who just logged out (and why)

Set up in the wake of Facebook’s controversial ‘experiment’, the 99 Days project aims to work out a more profound question: does the site make us happy?

Internet of things – tests show almost all devices “riddled” with flaws

A new report found hundreds of serious security flaws in some of the most popular Internet of Things gadgets – the problem is far deeper than thought, with 70% of the most popular such gadgets having serious security flaws.

Android security flaw gives bad apps super-powers

A new Android flaw potentially affecting up to 80% of users could leave handsets vulnerable to rogue apps – leapfrogging the defenses used to ensure malicious developers are kept out.

Windows XP Doomed – hackers play classic shooter on ATM

For computer hackers, making the classic first-person shooter Doom play on odd devices is a quest that never ends – but an Australian team may have won the game for good, by running Doom on an ATM.

Microsoft denies it has ever been asked to plant a snooping backdoor into its products

If intelligence and law enforcement agencies have a genuine need to spy upon some communications then it should not be via a backdoor that could put millions of innocent, law-abiding users at risk.

Identity fraud: How one email wiped out $300m – and sender walked free

A single email wiped $300 million off the value of an Australian mining company, after an environmental activist, Jonathan Moylan and sent a press release to media organizations.

Sony hacked: Victims to get $15m in ‘quality’ games – some day

Victims of the notorious attack against Sony’s online gaming service and associated websites in 2011, which exposed details for up to 77 million subscribers, are to be offered $15m in digital goods as compensation.

Cloud security – fears as zombie army finds gold in heavens

Using free cloud application hosting can allow an attacker to create a “free supercomputer” according to The Register’s report – used to mine cryptocurrency, researcher Oscar Salazar warns.

The Mid-Year Threat Highlights

Data breach – European bank’s info “held to ransom”

The European Central Bank has revealed that information including email addresses and contact data has leaked in a data breach – and that the unknown attackers demanded “financial compensation” from the bank in return for not releasing the information, according to the BBC’s report.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Jean-Ian Boutin

Raphael Labaca Castro

Graham Cluley

David Harley

Lysa Myers

Aryeh Goretsky

Marc-Etienne M.Léveillé

Joan Calvet

Guest Writer

Stephen Cobb

Cameron Camp

Sebastián Bortnik

Pablo Ramos

Copyright © 2015 ESET, All Rights Reserved.