Cyber-warriors, your country needs you: Governments hit by “shortage” of experts

Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks – but there aren’t enough experts to go round.

Some D-Link routers contain “backdoor” which allows remote access, researcher warns

Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.

The Adobe Source Code Breach

One of the biggest security breaches of the year hit software giant Adobe. ESET security researcher Aryeh Goretsky explains what happened.

Win32/KanKan – Chinese drama

In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities – and discuss the evidence that Xunlei Networking Technologies is implicated.

The wrong cable guys: Card skimmers install bogus wires into cash registers in Nordstrom store

A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.

Supercar security? Porsche and Lacie unveil “ultra-secure” encrypted USB stick

For many PC users USB keys must seem like a relic of a bygone age – but for security-conscious workers, keys can be a very safe place for data. Porsche and Lacie’s new USB offers password-protected storage for sensitive files.

Five bad PC habits many of us STILL have – and how to stop today

Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.

Microsoft pays out $100,000 in single “bug bounty”

Bounty hunting just got serious – Microsoft has paid out $100,000 to a security researcher in a single “bug bounty” for uncovering a weakness in the preview version of Windows 8.1.

Smartphone users want more protection – and don’t mind being fingerprinted, says Paypal

Smartphone users want more protection for the data on their cellphone – and are perfectly comfortable being fingerprinted if that’s the best option, accoriding to a new survey commissioned by PayPal.

EU cyber agency warns of “outdated” systems in power plants – and suggests new safety measures

Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure – and action is needed to ensure nations stay safe, the EU’s cyber security agency ENISA said today.

Ponemon study shows costs of cybercrime still rising – each attack now costs $1 million

The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the Ponemon Institute. Each cyberattack now costs companies nearly $1 million to resolve, on average – and the annualized cost to a sample of U.S. organizations was $11.56 million.

Android users to get Apple-baiting fingerprint protection “by next year”

Apple’s fingerprint sensor has drawn a huge amount of attention (and hack attempts) ever since it launched on iPhone 5S – but it seems Android users will get their own fingerprint protection shortly.

Waking Shark: Banks to face biggest cyber war game ever in UK

A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of banks, markets and payments systems against a simulated “major” attack by cybercriminals.

Who goes there? Voice-recognizing biometrics are set to take off, claims Nuance exec

The human voice can be used as a secure, quick way to identify people, claims Bretislav Beranek of voice-recognition software company Nuance. Beranek claims that voice ID is gaining ground – and could even be used to authenticate users for credit cards.

Skorpion smartphone charger lights up if your phone contains malware

Plugging your smartphone in to charge up could soon offer an alert that you’ve contracted malware – with a new charger that lights up when it detects malicious software. For businesses, it could be a “last line of defense” against employees bringing infected devices to work.

Hacked Card Readers And The Gangs Behind Them

Fake card readers discussed by ESET security researcher, how they work and new developments like pre-packaged crimeware kits.

Internet Explorer vulnerability will finally be patched on Tuesday after “months” of attacks

Internet Explorer users will be a great deal safer from Tuesday onwards, after Microsoft announced a patch for a vulnerability that has been exploited by attackers “for months” according to some reports.

Acrobat in hands of hackers, millions of customer details stolen, as Adobe admits to “unprecedented” breach

Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code for its Acrobat software, used to make and read PDF files. Adobe also admitted hackers had stolen data on 2.9 million customers.

Grim warning for bounty hunters – Yahoo pays out paltry $12.50 per vulnerability

Finding vulnerabilities can be a profitable business – even if you work for the right side of the law. Last month, Facebook paid out $12,500 to a researcher for finding a bug – this month, Yahoo! paid out … $12.50.

Here be dragons: Explorer “in dangerous territory” after public IE exploit release?

An exploit for a vulnerability which affects all versions of Microsoft’s Internet Explorer has been released as a module for the popular penetration testing tool Metasploit – sparking fears of a new wave of attacks.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Graham Cluley

David Harley

Lysa Myers

Robert Lipovsky

Aryeh Goretsky

Stephen Cobb

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.