latest posts

Google Glass spyware lets snoopers “see through wearer’s eyes”

Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.

Revenue Service breach may have leaked data on 20,000 employees

Personal data for around 20,000 workers for the U.S. Internal Revenue Service (IRS), including names, social security numbers and addresses may have been exposed, after an employee plugged a thumb drive into a computer on an unsecured home network.

Better Mac Testing? How OS security can make AV testing harder

As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.

Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.

Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”

More than 80% of business leaders feel “unprepared” for cyber incidents

More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a new survey by the Economist Intelligence Unit – despite 77% of companies having faced such incidents in the past two years.

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

Tips for protecting against sextortion

It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.

“You have cancer” phishing attack shows how low cybercriminals will go

A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization – but it’s a malware-laced scam.

New wearable from makers of Pine smartwatch aims to be “key to everything”

A new wearable authenticator built to be the key to “everything” will be designed by some of the hottest new talents in wearable technology, including the creators of the Neptune Pine smartwatch – one of the only wearable devices to work independently of smartphones.

Microsoft Word users urged to apply urgent fix after targeted attacks

Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially crafted” Rich Text Format file allowed attackers to remotely execute code on the victim’s machine.

Brainwave privacy standard “is needed” to prevent spying on EEG scan data, researchers warn

Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.

Fake video of Malaysia Airlines flight MH370 rescue is ‘callous’ cyber scam

A post promising a video of a plane landing on water has been circulating on Facebook, with a title suggesting that it contains news footage of the rescue of passengers on board the missing flight MH370 – but there is no video, and it’s a criminal scam.

More Mystery Shopper Misery

‘Highly-paid’ mystery shopper assignments where you’re sent cashier’s checks upfront can end up costing you a lot of money.

Hidden backdoor in top Samsung Galaxy models ‘allows remote spying on users’

A hidden backdoor in the modified version of Android run by nine Samsung Galaxy models could allow attackers to spy remotely on user data – and even snoop on users using hardware such as the GPS system, camera and microphone.

Top e-commerce sites still fail to warn users who choose “password”

Two-thirds of top e-commerce sites still accept the weakest passwords, such as “123456” and “password” without warning users that these are the very first passwords hackers will use in attempts to breach their accounts, according to a new survey.

Fridge attacks “raise big questions” says Microsoft security chief

The emerging ‘internet of things’ raises big security questions, and vulnerabilities in connected devices such as ‘smart’ fridges may force companies to work together in a way never previously seen, according to Microsoft’s Jan Neutze.

Whatsapp security fears over rogue apps ‘reading’ user chats

Hit messaging app Whatsapp may not be as secure as its 450 million users believe – after an independent security consultant revealed a loophole which rogue app developers could use to steal Android users’ entire Whatsapp history.

Critical Internet Explorer zero-day vulnerability patched by Microsoft

Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don’t delay!

Smartphones with fingerprint-scanning screens ‘on sale by summer’

Smartphones such as iPhone 5S rely on buttons to scan fingerprints – but the CEO of biometrics firm CrucialTec says that smartphones with a new hi-tech bezel-free screen which scans fingerprints will go on sale this summer.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Lysa Myers

Graham Cluley

Jean-Ian Boutin

David Harley

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Copyright © 2014 ESET, All Rights Reserved.