latest posts

Hackers blamed for Bridezilla post on photographer’s Facebook page

Is a hacker really to blame for unflattering comments posted on a wedding photographer’s Facebook page?

David Harley: “New scams are difficult to spot even for a trained eye”

Harley says that scams and social engineering have been a constant in cybercrime – but in the past few years, some scams have got markedly more sophisticated, and more difficult even for a trained eye to spot.

National Small Business Week: a cybersecurity survival guide

It’s National Small Business Week in the U.S. and, because properly protecting the digital assets of your small business could be vital to its success, here’s a cybersecurity survival guide.

The world’s most wanted hackers

The FBI is taking cybercrime seriously. Here are some of the most wanted hackers in the world, and what they’re wanted for…

Google releases Password Alert: an anti-phishing Chrome extension

Google has taken a stand against phishing attacks by revealing Password Alert: a Chrome extension designed to neutralize them after a user is taken in.

Ryanair hack: $5 million stolen from low-cost airline

Budget airline Ryanair has been the victim of a major banking hack, with more than $5 million stolen from its business account last week.

5 signs you’re in hackers’ sights

“It won’t happen to me” is often uttered by citizens and businesses who are adamant that they won’t become a victim of cybercrime. But this confidence is often misplaced, with even the most basic security errors exploited by hackers.

Accident Scam Waiting to Happen

Beware of that accident scam call or text: losing money isn’t the only risk.

Smart technology could give hackers key to the city

The adoption of smart technology to power city services could leave urban areas “wide open” to being hacked on a mass scale, says a cybersecurity expert.

IDS, Firewall and Antivirus: what you need to have installed?

What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.

Hand implant chip lets hacker attack Android phones via NFC

A security expert has had a computer chip designed for tracking cows implanted into his hand by an ‘unlicensed amateur’ to hack phones from underneath the skin, reports Gizmodo.

Interop in Las Vegas: interconnecting everything post-PC

Reporting from Interop 2015, Las Vegas, where it’s all about the connectivity and the massive leaps forward in network capacity and speed, but security concerns are also in the mix.

Unboxing Linux/Mumblehard: Muttering spam from your servers

Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.

Macro malware attacks on the rise, says Microsoft

Macro-malware attacks are on the rise, particularly in the United States and the United Kingdom, Microsoft has reported in a blog post.

OFAC! An acronym that cybersecurity professionals need to know

OFAC will soon be enforcing economic and trade sanctions against individuals and groups outside the United States that use cyber attacks to threaten U.S. foreign policy, national security or economic stability.

The curious case of the ex-hacker “banned from the internet”

What kind of punishment best fits a convicted hacker? Jail time for serious computer crimes is almost a certainty, but for one ex-hacker, Higinio Ochoa, the terms of his parole also include being “banned from the internet”.

Zero-day lets hackers hijack WordPress through rogue comments

A vulnerability in the WordPress blogging platform has been uncovered which allows hackers to hijack websites with a comment containing malicious JavaScript, The Hill reveals.

WattsUpDoc: US hospitals trial AC power probes to treat medical malware

Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.

Thirty Meter Telescope website falls over in hacktivist DDoS attack

Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern hemisphere’s largest, most advanced optical telescope.

Point-of-Sale vendor has used the same admin password for 25 years

A major vendor of point-of-sale terminals has not changed the default passwords used on its devices in a quarter of a century, researchers have revealed at RSA 2015.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Lukas Stefanko

Graham Cluley

David Harley

Stephen Cobb

Cameron Camp

Marc-Etienne M.Léveillé

Jean-Ian Boutin

Raphael Labaca Castro

Lysa Myers

Aryeh Goretsky

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.