Flipboard: A new way to enjoy We Live Security on the move

We Live Security has launched on Flipboard – the hit magazine-style app for Kindle, Android and iOS. Every week, we’ll hand-pick the best articles from We Live Security, and the app will automatically keep you up to date with our latest news, features and research.

Cellphone-sized $20 gadget can remote-control car electronics, researchers claim

A tiny, cheap gadget which can ‘hack’ into the network of modern cars to receive radio commands ranging from controlling steering and brakes to switching off headlights is to be shown off at the Black Hat Asia security conference in Singapore next month.

419 Scams: Let The Seller Beware

419s are a well-known scam type, but some scams are more obvious than others. And sometimes it’s the seller who’s cheated not the buyer.

Target attackers ‘broke in using log-in from air-con contractor’

Attackers involved in the Target breach, which led to the theft of 40 million debit and credit card details late last year, broke into the retailer’s network via a heating and air-conditioning contractor, according to a new report.

Hacktivists try tampering with facebook.com domain

The group of hackers that calls itself the Syrian Electronic Army (SEA) briefly claimed control of the facebook.com domain via an attack on MarkMonitor. It appears normal Facebook service has been resumed, but here’s what you need to know.

Zombie detector: Half-century-old tool may help sniff out botnets, researchers claim

A statistical tool first used in 1966 and currently used in speech and gesture recognition may hold a key to sniffing out botnets – by predicting the likely “next move” of infected PCs and the healthy computers around them, researchers have claimed.

Weak passwords and ancient software left U.S. Government data vulnerable, DHS report finds

Weak passwords and rarely updated software are a recurring theme behind the 48,000 cyber incidents reported to the Department of Homeland Security – including the theft of data on the nation’s weakest dams by a “malicious intruder”, a DHS report has found.

Government committee to set facial recognition guidelines

A Department of Commerce committee will meet for the first time this Thursday to begin discussions on a standard of guidelines for facial recognition software.

Browser security gets a boost with updates to Chrome and Firefox for Android

It is now possible to enable HTTPS secure browsing on every website using Firefox for Android, the Electronic Frontier Foundation has announced.

California students expelled for using a keylogger to hack teachers’ computers

Eleven high school students have been expelled after being caught bugging their teachers’ computers with a key logger device to change their grades.

Hotel franchise hit by credit card hack

White Lodging, a hotel management firm that works under brands including Hilton and Marriott, has suffered a credit card hack revealing customers’ details.

Yahoo Mail falls victim to password hack

Yahoo has announced that its email system has recently been subject to a “coordinated effort to gain unauthorized access”.

‘Honey Encryption’ foils hackers with false positive data

The key to beating hackers might not just lie in stronger security measures and ‘unbreakable’ passwords. Now, it seems like an element of trickery is required – almost beating hackers at their own game. Two independent security researchers have developed a system which they call ‘Honey Encryption’, which promises to make it harder for hackers

3G and 4G USB modems give hackers access for phishing scams

Independent security research has revealed that several 3G and 4G USB modems have security flaws which allow hackers access for phishing scams.

Android 4.4 revealed to have VPN security flaw

Researchers as Ben Gurion university in Israel have discovered a vulnerability in Android 4.4 KitKat that allows an attacker to intercept and divert secure virtual private network (VPN) traffic.

Protecting Kids on Social Media

More tips from ESET security researcher Lysa Myers on protecting kids who use social media, with information and advice for folks who want to protect kids online.

Myths of the Target Breach

One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.

Russian creator of ‘SpyEye’ malware pleads guilty to bank fraud

The FBI has announced the arrest and charge of Alexsandr Panin, 24, a Russian hacker who developed the SpyEye trojan and used it to steal financial information and money from around the world.

Blackberry rolls out picture passwords for handsets and bolsters Enterprise security system

The Blackberry 10 operating system has been updated to include a ‘photo password’ mechanism, as well as stronger message filtering capabilities.

FBI makes arrests in global email-hacking ring

The FBI has announced several arrests in a worldwide coordinated effort to break up a gang of email ‘hackers for hire’.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

Jean-Ian Boutin

Stephen Cobb

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.