latest posts

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Three men indicted in ‘one of the largest’ data breaches in US history

The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,”

ESET’s Mark James on 2015’s security trends

how is 2015 shaping up in security? We caught up with ESET security specialist Mark James to get his take on threats, security and how people should ensure their year is free of malware.

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.

DDoS attack on feminist blog backfires on International Women’s Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

Air traffic control vulnerability could allow criminals to hack the skies

The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed by the Government Accountability Office (GAO).

Lysa Myers: “There are still only a handful of women in the security field”

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

Adobe crowdsources its bug-hunting, but no rewards offered

Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper – another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Anthem refuses IT security audit following massive data breach

Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach last month that could have affected up to 80 million of its customers.

Five alternatives to Bitcoin

Here’s a small selection of alternatives to Bitcoin – each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however – minimal or zero transfer fees, and freedom from traditional banking restrictions.

Fake Amazon gift cards offer only malware to Android devices

Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Toys “R” Us resets account passwords to counter stolen reward points

Account holders with Toys “R” Us have been informed that their passwords will be reset, after unauthorised third-parties attempted to gain access to the company’s reward program.

India blocks third party email services to government officials

The Indian government has changed the way in which its officials are allowed to operate when working, it has been announced.

Hillary Clinton used personal email for government business, putting security at risk

Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That’s potentially a breach of federal law, but it’s definitely a security risk.

10 tips for protecting your virtual Bitcoin wallet

There have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.

Uber security breach could leave 50,000 drivers exposed

As many as 50,000 Uber drivers could have been affected by a security breach last year, potentially leaving their personal data in the hands of an unauthorized third-party, reports Tech Crunch.

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

David Harley

Aryeh Goretsky

Marc-Etienne M.Léveillé

Joan Calvet

Guest Writer

Stephen Cobb

Cameron Camp

Sebastián Bortnik

Sébastien Duquette

Pablo Ramos

Copyright © 2015 ESET, All Rights Reserved.