Human heartbeats are near-unique – each person’s rhythm forms a mathematical pattern which can be used to identify people. A bracelet which aims to use this for secure ID took a big step towards PCs and phones in the home this week, as 6,000 developers began work on apps for it.
A major British horse racing website has been hit by an “aggressive” and “malicious” cyber attack – and user details have leaked, including some passwords which the owners warn “could be deciphered.”
Twitter has unveiled a serious security upgrade to protect its users’ data from cyber-snooping – and has said that this approach should be “the new normal for web service owners.”
A ‘high impact’ security bug affecting Gmail’s password recovery system was discovered by a researcher – and quickly patched. The vulnerability allowed attackers to reset user passwords remotely.
It so happens that I live over 5,000 miles from the ESET North America office in San Diego, and so tend not to have water cooler conversations with the people located there. Of course, researchers working for and with ESET around the world maintain contact through the wonders of electronic messaging, but there are lots
Some LG ‘Smart TVs’ watch their owners – logging their viewing habits without their permission – and transmitting the information back to the company, LG has admitted. The TVs do this even if the user has specifically selected an option not to share data.
The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered surreptitiously alongside the company’s official client.
ESET has a parental control built into its anti-virus software. Watch this video to find out how they can help protect your children.
Dating site Cupid Media left personal details and plain text passwords for 42 million users exposed after an attack earlier this year. The details included names, emails and birthdays for users of the dating service, according to reporter Brian Krebs.
In the first of a series of guest blog posts AV industry veteran Graham Cluley voices his opinion on how security has changed – and the changes we all need to make for the future.
When any computer user types on a keyboard, the pattern of keystrokes is unique – like a fingerprint. When using a mouse, the patterns for each user are just as different – and Iowa State engineers aim to combine these “patterns” to identify people, offering a more secure alternative to passwords.
By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk – an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.
Just Google for the search term ‘“active defense” startup’ and it is clear that this is a hot growth area in Internet security. But what is it, exactly? The answer to that question is difficult and controversial.
CME, described by Bloomberg as the world’s largest futures trader, said in a statement that “to date” there was no evidence that the unknown attackers had affected trades on CME Globex, but customer information had leaked.
Embattled handset maker BlackBerry has faced another blow, after the company warned users of a security bug affecting the software used to link its BB10 handsets to PCs.
“Pinkie Pie”, an under-21 hacker won $50,000 at the Pwn2Own contest, as he used drive-by attacks to take over a Samsung Galaxy S4 and a Nexus 4, both of which run Android.
Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from Britain’s National Cyber Crime Unit, which is targeting small businesses with a spam campaign.
Results of an ESET commissioned survey show that, in the wake of the Snowden/NSA revelations, 50% of Americans have less confidence in technology companies like Internet Service Providers and software firms. A surprising 1 in 5 are now doing less online banking and 14% have cut back their online shopping.