Attack ‘bypasses’ Microsoft’s zero-day protection tool

Researchers have demonstrated an attack that completely bypasses the protections offered by EMET – a Microsoft toolkit used to provide safeguards against zero-day attacks, according to Ars Technica.

Facebook and Whatsapp: Security and privacy after the $19B deal

The acquisition of chat service Whatsapp for $19 billion has been the technology story of the week – but serious privacy and security questions remain over Facebook’s new messaging service.

Samsung Galaxy S5 offers fingerprint security for safe shopping with PayPal

Samsung has introduced fingerprint-scanning security as standard into its new flagship Galaxy S5 handset – with Finger Scanner offering secure shopping via Paypal direct from the handset in stores and websites, with a finger-swipe replacing passwords.

The perils of passwords – and how to avoid them

There are lots of ways that hackers can steal your passwords, and use them against you. So what can you do to fight back?

Most small-office routers have ‘critical’ vulnerabilities as mysterious ‘Moon’ worm spreads

A large majority of routers used in small offices are plagued with security vulnerabilities – with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.

Neiman Marcus attackers set off 60,000 alerts – but went unnoticed

Hackers who stole hundreds of thousands of card details from upscale retailer Neiman Marcus set off more than 60,000 security alerts – but these were all missed by security staff at the company, according to a report by Bloomberg Businessweek.

Urgent iPhone and iPad security update, Mac OS X as well

Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.

An In-depth Analysis of Linux/Ebury

In this blog post, we provide an in-depth analysis of Linux/Ebury – the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server.

HIMSS 2014: Protecting Medical Data

ESET security researcher Stephen Cobb discusses the security of electronic health records and the threats to medical privacy from criminals.

Android under assault as spyware and Trojans ‘grow by 400%’, company claims

Malicious apps are multiplying rapidly in Google’s Play store – where a survey found that the number of malicious apps had grown 388% from 2011 to 2013, according to Risk IQ.

Scams: Tech Support, Accident Insurance, PPI, Oh My My

It’s not just fake tech support: call centre cold-callers are operating various kinds of insurance scams, too.

Tinder dating app gave away exact locations of users for months

Smartphone dating app Tinder revealed more about its users than they might have wished over a period of several months last year – revealing their location to other app users to an accuracy of around 100 feet, according to The Verge’s report.

How can doctors practice better health information security?

Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.

QR codes pose hidden danger to smartphone users, researchers claim

The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print magazines could pose a risk to smartphone users, Australian researchers at Murdoch University have warned

Belkin’s ‘Smart Home’ system has security flaws which could ‘black out’ homes – or start fires

Belkin’s WeMo home automation systems contain multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system – for instance, blacking out lighting in a home, or even starting fires, researchers have claimed.

Google buys firm with password-busting “silent sound” authentication system

Google has bought a company offering a new form of two-factor authentication – using “silent” sounds played via PC and smartphone speakers to verify a user is who he or she claims to be

Tax Scams, Malware, Phishing and a 419

A roundup of scam information, including a tax scams article, email with a link to malware, a phish, and the worlds laziest 419.

New to Mac? Four security tips you need to know

Mac OS X is a slick, easy-to-use operating system with an impressive record on security – and basic malware detection built in since 2009’s Snow Leopard update. While Macs have seen sales slowing in the past year, due largely to losing market share to their own stablemates, iPads, and other mobile devices, they’re a growing

Mysterious ‘Moon’ worm spreads into many Linksys routers – and hunts new victims

Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers – even ones protected by passwords – it’s still not clear how many are infected – or if the malware has a purpose beyond simply spreading.

The password is ‘burger joint'; places could be key to secure passwords

Could places, not phrases, be the basis of secure passwords. UAE researchers have created a system for creating complex passwords using facts about a user’s favourite place – and claim it can foil ID-theft attacks.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Aryeh Goretsky

Lysa Myers

David Harley

Stephen Cobb

Robert Lipovsky

Joan Calvet

Sébastien Duquette

Graham Cluley

Cameron Camp

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Marc-Etienne M.Léveillé

Copyright © 2014 ESET, All Rights Reserved.