U.S. Energy Dept admits to second big data leak this year

Personal information for 14,000 U.S. Department of Energy employees has leaked in a data breach, according to the Wall Street Journal. It’s the second major breach the Department has suffered this year.

LastPass owns up to password-exposing Internet Explorer bug

The bug allowed attackers to see any passwords using in a recent browsing session by performing a “memory dump”, and would have worked even if the user was not logged into LastPass.

Radar Love: how classic rock helps to highlight Java problems

Java has been – and still is – one of the more problematic issues security-wise. A website showing song lyrics from Golden Earring’s Radar Love shows off problems that can leave users at the mercy of Java attacks.

“Dr Jekyll” apps can sneak into App Store by hiding their dark side, researchers claim

Apps with a hidden “dark side” could sneak past Apple’s approval process, according to researchers at Georgia Tech. The researchers proved this theory using a malicious app which was approved and downloaded via App Store in March this year.

Dislike! No bounty for posting Facebook bug alert to Mark Zuckerberg’s wall

A security researcher demonstrated an exploit to Facebook by using the bug to post directly to Mark Zuckerberg’s Facebook wall. Facebook responded by issuing a statement saying he would not be paid.

“Constant attack from malicious apps”: Facebook purge goes wrong

An outage which affected Facebook apps and developer accounts this week was caused by over-zealous attempts to disable malicious apps, the social network has admitted.

Justin Bieber’s AMAZING diet: Five social posts you should never click

Most of us have faced cyber attacks sent by our best friends – Facebook “offers” they’ve clicked by accident, spamming everyone on their friends list, or Twitter stories they’ve shared without checking.

New York Post and SocialFlow are latest victims of Twitter hackers

The New York Post has become the latest victim of a prolific hacking campaign targeting the social media accounts of worldwide media outlets – and SocialFlow, a social media company used by the Post and other media outlets, has also fallen victim.

Hacker spies on and insults toddler in bed via baby monitor

A Texas family were horrified by an apparent hacker attack in which a criminal was able to spy on their two-year-old daughter and insult her through an internet-connected webcam.

Catch me if you can: Can we predict who will fall for phishing emails?

A new paper aims to profile the victims most likely to fall for a phishing attack. But what is less clear is how you develop a profile while avoiding the pitfalls of stereotyping.

Healthcare IT security: infographic stats point to big privacy holes

An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.

YouTube download plug-ins hijack browsers to deliver malware-laced adverts

Two video plug-ins for YouTube hijack users visits to the site and insert extra adverts – some of which are being hijacked by “malvertisers”, sending users to fake adverts which attempt to infect their PCs.

Blackout warning: Philips “Smart lightbulbs” can be switched off by malware – and won’t come back on

Philips Hue lighting system is vulnerable to attacks which can cause a “perpetual blackout” in the homes of users, according to a security researcher. The Hue wireless system – on sale in Apple store – controls wireless LED light bulbs in the home via a wireless bridge, and can be controlled by iOS and Android

Cybercriminals “saving up” wave of Windows XP attacks for when Microsoft stops support

Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed.

Bitcoin wallets “at risk” due to Android security flaw

A security flaw has left all Android Bitcoin wallets vulnerable to theft, Bitcoin.org has warned. The vulnerability affects all Bitcoin wallets on the Android plaform.

September 23, 2013: HIPAA health data security compliance deadline looms

Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.

Cybercriminals turn to Perfect Money after Liberty Reserve takedown

Cybercriminals are turning to a new digital currency, Perfect Money, in the wake of the closure of the notorious Liberty Reserve, which was described as “the bank of choice” for cybercrime.

Don’t get zombified! Security tips for PC gamers

Don’t let your PC end up in someone’s zombie army. Gamers are prime targets for cybercriminals – our tips should help you avoid ending up an infected victim…

Stop TVs spying on us! U.S. Senator calls for safer “Smart” devices

“You expect to watch TV, but you don’t want the TV watching you,” said Senator Charles E Schumer, as he called for improved security measures in “Smart” televisions.

Warning over security flaws in HP printers which can reveal passwords

Security flaws in some models of HP LaserJet Pro printers can reveal users’ administrator passwords to remote attackers, a researcher has revealed.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar


Select month
our experts

Rob Waugh

David Harley

Lysa Myers

Robert Lipovsky

Aryeh Goretsky

Graham Cluley

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.