TalkTalk cyberattack: The story so far

The TalkTalk cyberattack has attracted a lot of media attention since it was first reported that a serious incident had taken place. We cut through the noise and offer a concise summary of what has transpired.

5 top tips on buying online in a safe and secure way

The world wide web has made shopping an altogether more pleasant, cost-effective and user-friendly experience. However, buying online has its risks. Here are five top tips to stay safe and secure.

Walgreens ‘halts’ Theranos partnership following WSJ technology expose

The fallout from a Wall Street Journal technology expose that claims Theranos has been less than transparent over its blood tests continues with Walgreens putting its partnership with the company “up for discussion”.

IT workers ‘the riskiest users of technology’

A new report finds that in the world of business, it is in fact IT workers who are the riskiest users of technology.

Police force blames hacker after #CyberAware tweet sent out containing bogus security advice

Organisations of all sizes need to do more to protect their social media accounts from being hijacked.

TalkTalk ‘receives ransom demand’ for cyberattack

TalkTalk’s chief executive has confirmed that she has received a ransom demand from an individual or group claiming responsibility for the cyberattack.

TalkTalk experiences ‘significant and sustained cyberattack’

It has been revealed that TalkTalk has been subject to a “significant and sustained cyberattack”, with criminals likely to have accessed personal and banking details belonging to its customers.

‘Collaboration needed’ to combat low-impact cybercrime

Greater collaboration between the UK’s technology industry and police forces is essential to successfully tackle “high-volume, low-impact cybercrime”, a new report advises.

Apple: It is impossible to access encrypted data on iPhones

Apple has once again reiterated its claim that it is technically impossible for it to access encrypted data on iPhones that are running iOS 8 or higher and even if it was possible, it would be apprehensive to perform such an action.

Is the cloud more secure for you? Only you hold the answer

Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?

Sony agrees to $8 million settlement over 2014 data breach

Sony Pictures Entertainment says that it will pay out $8 million to its employees, over a data breach last year. The studio was attacked by cybercriminals over the release of the movie The Interview.

Multi-stage exploit installing trojan

Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.

CIA director’s personal email account ‘breached by teen’

It has been claimed that the director of the CIA has had his personal email account breached by a teenager, with social engineering playing a part in the hack.

LTE vulnerabilities puts Android devices at risk of attack

Vulnerabilities that have been found in LTE networks leave Android devices open to a DDoS attack, according to the Computer Emergency Response Team Coordination Center (CERT/CC) at Carnegie Mellon University.

Facebook to alert users to state-sponsored cyberattacks

Facebook has revealed that it will let its users know if their accounts have been subject to state-sponsored cyberattacks.

False sense of security leaves American homes vulnerable to cybercriminals

Many American homes have a false sense of security when it comes to their devices and networks – their digital doors could do with better protection.

Brolux trojan targeting Japanese online bankers

A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer.

Adobe Flash is putting your computer at risk – and there’s no patch yet

Sooner or later you are going to have to address the Flash problem on your computers.

And there doesn’t seem a better time with a zero-day vulnerability being actively exploited by an organised hacking gang.

Crime levels in England and Wales rise with cybercrime inclusion

There has been a sharp rise in crime levels in England and Wales as cybercrime data has been included in official statistics for the first time.

10 key facts you need to know about cyber insurance

The regular occurrence of data breaches is pushing organizations to think more seriously about updating their risk management policies. With that in mind, we look at the top ten things you need to know about cyber insurance, which is fast becoming a business necessity.

Follow us

Copyright © 2016 ESET, All Rights Reserved.