2013: a View to a Scam

There are plenty of scams effective enough to rate a warning or three, in the hope of alerting potential victims to the kind of gambit they use. And so, even though much of ESET’s business is focused on the bits and bytes of malicious software, I’ve spent a lot of time writing on WeLiveSecurity and

Yes there is a Data Privacy Day, and it will be here soon

The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.

Target Breach Explored

The Target security breach, in which criminal hackers stole data on tens of millions of credit and debit cards from the well-known retail giant, is set to become the most widely known incident of its kind. Why? Because more people have shopped at Target than any other retailer who has suffered a breach of this

Wi-Fi woes: Linksys and Netgear router models at risk from backdoor that offers access to ‘controls’

Many popular models of wireless router from brands such as Linksys and Netgear are vulnerable to a ‘backdoor’, which could allow attackers access to the router’s admin controls, according to a report by Ars Technica.

Discreet messaging site Snapchat leaks 4.6 million phone numbers, names – after ‘ignoring warnings’

Hackers have published what they claim is a database of 4.6 million Snapchat users, with phone numbers matched to usernames, which is searchable online now. The hack could be a huge blow to the ‘discreet’ photo-message service.

Could new malware steal data from INSIDE your SD card? Researchers claim even solid-state PC drives could be at risk

Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards themselves. The attack could be used to copy or steal data – and even modify sensitive data such as encryption keys.

Greetings, Android! 12 tips to toughen up your new device for the real world

ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…

Internet rallies round dog-themed cryptocurrency after holiday heists hit two Dogecoin sites

Dog-themed cryptocurrency Dogecoin fell victim to two robberies over the holiday season, as hackers hit two sites which traded in the cult currency – but the goodwill of the internet could see the Shiba-themed virtual coins bouncing back.

Phishing for Tesco Shoppers

A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this a topical trend?

The worst passwords and PINs

Just in time to help the tens of millions of people potentially affected by the Target data breach, veteran security expert Aryeh Goretsky talks about avoiding weak passwords and Personal Identification Numbers (PINs) in your online and offline activities.

What’s New In Windows 8.1 Security

Get the latest on Windows 8.1 and security from Aryeh Goretsky, the ESET security researcher who has earned more than ten Microsoft MVP awards (as in Most Valuable Professional) for his contribution to online communities in the IT industry.

The ‘Digital Guardian': IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep you secure

Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.

Clubbed to death? Bitcoin-only poker site Seals With Clubs leaks 42,000 passwords in attack

An online poker site which did all its cash-ins and cash-outs in Bitcoin has admitted to a data breach in which 42,000 user passwords were stolen – and is instituting emergency measures to prevent the attackers gaining access to the cryptocurrency.

A look back at 2013 from some folks who live security

A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.

Cryptolocker 2.0 – new version, or copycat?

Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.

Target breached: 5 defensive steps shoppers should take now

Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.

Target down? “Biggest data breach ever” leaks 40 million credit and debit cards from retailer at height of shopping season

Details of 40 million customer debit and credit cards may have leaked in a data breach at American retailer Target – which began on November 27 and ended on December 15, affecting stores at the height of shopping season.

Holiday shoppers turning to mobile to bag bargains – but ignoring security risk, survey finds

This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling year-on-year – but nearly one third of shoppers polled admitted to serious security errors, such as storing card details in smartphones.

The Death of Anti-Virus: conference paper

Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR conference in Chennai, which was kindly presented by ESET’s Chief Research Officer Juraj Malcho, as neither Larry nor myself were able to attend the conference in the end. The paper is also available

Qadars – a banking Trojan with the Netherlands in its sights

The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers – 75% of detections come from this region.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

Jean-Ian Boutin

Stephen Cobb

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.