The hottest IT trend in the workplace right now is definitely BYOD: Bring Your Own Device. This is popular with employees who regard it as a convenient way to read private e-mail and to browse to (work-unrelated) sites at the office, and moreover as a way to work for their employer on a device they
Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we
According to the EU’s law enforcement agency Europol a complex ransomware network has been shut down. The operation to close the network was headed by Spanish police in cooperation with the agency. Eleven people have been arrested from Russia, Georgia and Ukraine. The scheme planted malware on computers which accused the users of viewing illegal
Could distributed denial of service (DDoS) malware be evolving to defeat anti-DDoS security measures like CloudFlare? We do not usually see a lot of innovative denial-of-service malware in our day-to-day work. What we do see usually boils down to the basic flooding techniques: TCP Syn, UDP and ping floods, and sometimes HTTP-oriented floods. Of course,
U.S. President Barack Obama plans to release a long-awaited executive order aimed at improving cyber security were realised Tuesday.
The order is designed to better protect the country’s critical infrastructure from cyber attacks that are a growing concern to the economy and national security, according to Reuters.
The United States Attorney for the Southern District of New York filed an indictment against two defendants allegedly involved in an ATM skimming operation that resulted in the loss of over $3 million from 6000 bank accounts.
According the UK’s National Audit Office (NAO) the Cyber Strategy outlined in November 2011 has started to deliver benefits but more must be done. According to the NAO the cost of cyber crime to the UK is estimated to be between £18 billion and £27 billion. Business, government and the public must therefore be constantly
Several email accounts belonging to family members of former President George W. Bush were hacked and the contents made public, exposing private data, correspondence and personal photos, according to The Smoking Gun. The apparent hack affected email threads between several members of the Bush family, including both former U.S. Presidents. According to the report, the
British defence company BAE Detica is predicting a “gearing up” of cyber attack capabilities across an increasing number of nation states in 2013.
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
ESET’s threat researchers received a surprise earlier this week when they began receiving reports from ESET LiveGrid that downloads of ComboFix, a tool popular with advanced users for removing malware, were detected as being infected by a variant of the Sality virus, Win32/Sality.NBA.
Following the examples of Google, Facebook, Yahoo and DropBox, Twitter is reportedly ready to roll out a two factor sign in process for its millions of users. This comes in light of February’s attack when some 250,000 passwords were stolen.
I received a “shared” messages from a friend about “a leaked scandal video of Justin Bieber and Selana Gomez” promising a “naked Justin Bieber”, with a Photoshopped picture, which we – for family-friendliness – censored a bit.
The uncertainty around Java shows no sign of abating as Apple blocks all versions of Java on OS 10.6 and above through its anti-malware security applet, XProtect. This follows the blocking in all but name by Mozilla as it moved to end auto-loading of plug ins for the Firefox browser.
In various blog-posts, users have been encouraged by ESET experts to download applications from the official website for that application, as you never know what might have happened to the software when you download it from a mirror site or a download site.
Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the “correct’ answer has changed over time.
Malware authors have a solid track record in regards to creative Command and Control protocols. We’ve seen peer-to-peer protocols, some custom (Sality), some standard (Win32/Storm uses the eDonkey P2P protocol).