latest posts

‘Unpatchable’ USB exploit posted to GitHub

Techspot reports that a another USB exploit has been discovered by a pair of researchers who have “thrown caution to the wind by posting code for a similar attack on GitHub.”

Bing: no plans to offer search boost for encrypted websites

Over the summer, Google introduced plans to start giving preference to websites that use HTTPS encryption to try and incentivize good online security practices. PC World reports that Microsoft’s search rival, Bing, has no plans to follow suit with its own search algorithm.

JP Morgan Chase data breach – bank admits 76 million affected

JP Morgan Chase, one of the largest banks in America has admitted that a JP Morgan Chase data breach has affected 76 million customers, and seven million small businesses, the Guardian reports.

Ultra-secure hard drive ‘shatters on demand’

A new gadget from British drive maker Secure Drives forges off into Mission Impossible territory with a genuine, physical ‘self-destruct’ command which can be triggered from anywhere on Earth.

Google faced with $100m legal action over naked celebrity photos

Google is facing a threat of expensive legal action over the recent leaked naked celebrity photographs, according to IT Pro. The basis for the legal threat seems to be built on the idea that the search giant didn’t do enough to prevent people seeing the photographs after the initial leak.

Support Scammers: Hoping to Reign in Spain?

More about the support scammer trend towards finding victims in Spain who aren’t fluent English speakers.

How to keep your child safe on YouTube

YouTube is one of the most popular websites in the world, but can expose younger viewers to inappropriate content. By following these 5 precautionary measures you can keep your child safe from any content that may be unsuitable.

Should I worry about my connected devices?

There could be many benefits of having a connected household, but connecting your appliances to the internet could also put them at risk of being hacked. We provide some useful tips to make sure all of your connected devices are protected.

Phishing attacks ‘enough’ to breach many industrial systems

Basic phishing attacks and easily available tools are all that is needed to compromise many industrial control systems, the head of cybersecurity for the U.S. Department of Energy’s Strategic Petroleum Reserve has warned.

People are willing to trade private data for pistachio cookies

Many New Yorkers don’t place a particularly high value on their private data – from fingerprints to social security numbers – having proven willing to give away such details in return for a literal, edible cookies.

FBI opens malware tool for public “crowdsourcing”

The FBI has opened up its previously in-house malware analyzing tool to the public in order to crowdsource more samples for speedier response, according to The Register.

Found an exploit in Chrome? You could have just earned $15,000

In a bid to improve the security of its Chrome browser, Google has announced that it is upping the ‘bounty’ paid to people who successfully find bugs and exploits hidden in the browser up to a maximum of $15,000. This is an impressive increase on the previous cap of $5,000, reports betanews.

Snapchat privacy – spam deluge may make users feel fat

Concerns over Snapchat privacy rocketed this week after users were bombarded with spam messages written in a style which suggests that a user’s own friends think they are overweight.

Bootkits, Windigo, and Virus Bulletin

ESET research on Operation Windigo received an award at Virus Bulletin 2014. Our research on bootkits was also well received, and is now available publicly.

How to fix Shellshock Bash on Mac OS X: Mavericks edition

Apple Mac OS X users concerned about the Bash vulnerability dubbed Shellshock got some relief late yesterday as Apple published fixes for various versions of OS X. But if you use Mavericks you will need to install 10.9.5 before the Bash fix will work.

StealthGenie CEO arrested for marketing ‘illegal stalking app’

The creator of an app that secretly allows you to monitor another person’s smartphone usage without their knowledge has been arrested in Los Angeles, according to Slashgear.

FBI Director “very concerned” with smartphone encryption

With Apple, Google and other tech companies responding to users’ demands for privacy with further smartphone encryption options, not everyone is happy. FBI Director James Comey is “very concerned” about increased mobile OS encryption, according to TechSpot.

Support Scams: Expect the Scammish Inquisition*

An update on support scams: but are the scammers looking for fresh fields and posturings new?

How George Clooney made sure phone hackers didn’t ruin his wedding

Newly weds George Clooney and Amal Alamuddin supplied guests with “burner phones” to prevent photographs from falling into the hands of hackers and the tabloid press.

Week in security: Bash Bug, BlackEnergy and hoax attacks

This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Stephen Cobb

Lysa Myers

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.