QR codes pose hidden danger to smartphone users, researchers claim

The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print magazines could pose a risk to smartphone users, Australian researchers at Murdoch University have warned

Belkin’s ‘Smart Home’ system has security flaws which could ‘black out’ homes – or start fires

Belkin’s WeMo home automation systems contain multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system – for instance, blacking out lighting in a home, or even starting fires, researchers have claimed.

Google buys firm with password-busting “silent sound” authentication system

Google has bought a company offering a new form of two-factor authentication – using “silent” sounds played via PC and smartphone speakers to verify a user is who he or she claims to be

Tax Scams, Malware, Phishing and a 419

A roundup of scam information, including a tax scams article, email with a link to malware, a phish, and the worlds laziest 419.

New to Mac? Four security tips you need to know

Mac OS X is a slick, easy-to-use operating system with an impressive record on security – and basic malware detection built in since 2009’s Snow Leopard update. While Macs have seen sales slowing in the past year, due largely to losing market share to their own stablemates, iPads, and other mobile devices, they’re a growing

Mysterious ‘Moon’ worm spreads into many Linksys routers – and hunts new victims

Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers – even ones protected by passwords – it’s still not clear how many are infected – or if the malware has a purpose beyond simply spreading.

The password is ‘burger joint'; places could be key to secure passwords

Could places, not phrases, be the basis of secure passwords. UAE researchers have created a system for creating complex passwords using facts about a user’s favourite place – and claim it can foil ID-theft attacks.

Kickstarter hacked. Users told to change passwords

Security expert Graham Cluley takes a look at the Kickstarter hack, and discovers there’s more to think about than just changing your passwords.

Online Dating and Privacy

ESET security researchers Cameron Camp and Lysa Myers discuss the privacy and safety implications of online dating in today’s world of potential over-sharing.

Silk Road 2.0 drug market hit, millions stolen from bitcoin reserve

A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.

Two-thirds of couples ‘share passwords to online accounts’, Pew research finds

Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.

Critical IE and other flaws discovered. Patch your systems now, says Microsoft

If your system administrator looks a little frazzled this week, be nice to him or her and don’t grumble too much about the photocopier being jammed. It may be that they have more serious issues on their mind.

Personal email and cloud storage pose ‘biggest threat’ to corporate data, report claims

Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.

Worldwide cost of identity theft could be $5 billion per year, Microsoft survey finds

A Microsoft survey of 10,000 consumers found that the worldwide annual cost of identity theft and phishing could be as high as $5 billion – and the cost of repairing damage to people’s reputation online could be even higher.

Half of children left exposed to online threats as parents fail to use built-in controls

Less than half of parents use parental controls on internet-enabled devices bought for their children – leaving millions of youngsters potentially exposed to online threats, according to new research.

Windows exploitation in 2013

The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.

Corkow – the lesser-known Bitcoin-curious cousin of the Russian banking Trojan family

A little-known banking trojan, developed in Russia, has managed to infect thousands of victims’ computers without the knowledge of their owners. Graham Cluley takes a closer look.

Two-factor authentication: What is it – and why do I need it?

Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ‘2FA’.

Microsoft boosts security for Office 365 users with two-factor logins

Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication being rolled out to versions of Office 365 this week.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

David Harley

Stephen Cobb

Robert Lipovsky

Joan Calvet

Sébastien Duquette

Graham Cluley

Cameron Camp

Lysa Myers

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Marc-Etienne M.Léveillé

Copyright © 2014 ESET, All Rights Reserved.