latest posts

Rise of free Wi-Fi hotspots ‘presents serious security risks’

The BBC reports that there is currently one Wi-Fi hotspot for every 150 people in the world, but these unmonitored hotspots can potentially cause problems, experts have warned.

Facebook welcomes private browsers with dedicated Tor link

Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren’t mistaken for botnets, Gizmodo reports.

Microsoft issues rapid fix to GroupMe exploit

iOS and Android messaging app GroupMe has had a possible vulnerability fixed quickly by Microsoft, according to The Register. There was no evidence to suggest any cybercriminals had been able to exploit the flaw before it was patched.

Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits

Two Flash vulnerabilities that were fixed by Adobe 2 weeks ago are now being used in exploit kits. This is in addition to a third vulnerability, CVE-2014-0556, that was patched in September and that has also been added to Nuclear EK last week.

Police can make you unlock your phone with a fingerprint – judge

A judge in Virginia has ruled that the police can require you to unlock your smartphone with a fingerprint, but not with a passcode, Mashable reports.

How to make sure Adobe Flash is up-to-date and enabling it on-demand

Learn how to update Adobe Flash Player, to help protect against malware attacks.

“More human” carder malware emerges for sale in dark web

A carder like tool for cybercriminals that promises to use stolen credit card details in a more ‘human way’ to bypass fraud detection has been found on sale for as little as $180, according to The Register.

Stealthy malware uses Gmail drafts to steal data

A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as “the command and control to steal data.”

Wearable tech and security – can watches help?

So far, wearable tech has been of interest mainly to fitness fiends – but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even ‘three-factor security’. Can a watch really keep secrets?

Top Cyber Security Awareness Month themes, topics, and resources

National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

‘Find My Mobile’ system can be used to attack Samsung handsets

One of the most popular and useful security functions of mobile handsets can be turned against the owner.

White House hit by “sustained” cyber attack, hackers breach unclassified network

IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?

Google outlines new security features in Android 5.0

Google has outlined the enhanced security credentials of the upcoming Android 5.0 – nicknamed Lollipop – in an official blog post.

AVAR Down Under – Security Researchers at Work

ESET will be well represented in papers presented at the AVAR conference in November, but that’s not the only interesting content on the agenda.

British job centers to introduce biometric recognition

Job centers across the United Kingdom are due to get a technological makeover, courtesy of biometric and signature recognition pads, reports IT Pro Portal.

Fidelity National Financial warns of data leak after phishing attack

Fidelity National Financial has been contacting an “undisclosed number of individuals”, notifying them that a selection of personal data may have been exposed after some of the Fortune 500 company’s employees had their email accounts targeted by a phishing campaign, SC Magazine reports.

How do open source tools stay secure?

Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,

42% of Americans hit by regular online attacks

A study by Microsoft has revealed that 42 percent of Americans face ‘weekly or daily’ attacks by cybercriminals trying to access their computers, Network World reports.

Tor users targeted with exit node malware

An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this “would not prevent copycat attackers from the more than 100 exit nodes in operation.”

Internet trolls – how to deal with online abuse

Most internet users have faced some kind of problems with internet trolls – and a new study has thrown light on who they are. We discuss how best to deal with the online pests.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Robert Lipovsky

Joan Calvet

Sébastien Duquette

Graham Cluley

David Harley

Cameron Camp

Lysa Myers

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Marc-Etienne M.Léveillé

Copyright © 2014 ESET, All Rights Reserved.