Tech Support Scammers: Talking to a Real Support Team

It so happens that I live over 5,000 miles from the ESET North America office in San Diego, and so tend not to have water cooler conversations with the people located there. Of course, researchers working for and with ESET around the world maintain contact through the wonders of electronic messaging, but there are lots

LG admits that its ‘Smart TVs’ have been watching users – and transmitting data without consent

Some LG ‘Smart TVs’ watch their owners – logging their viewing habits without their permission – and transmitting the information back to the company, LG has admitted. The TVs do this even if the user has specifically selected an option not to share data.

Safer Cyber Shopping

This edition of the Malware Report offers tips for safer cyber shopping this holiday season, provided by ESET security researcher Lysa Myers.

PC gaming service fined $1m for serving up Bitcoin-mining malware

The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered surreptitiously alongside the company’s official client.

ESET Parental Controls

ESET has a parental control built into its anti-virus software. Watch this video to find out how they can help protect your children.

What becomes of the broken hearted? Dating website leaked 42 million usernames and passwords

Dating site Cupid Media left personal details and plain text passwords for 42 million users exposed after an attack earlier this year. The details included names, emails and birthdays for users of the dating service, according to reporter Brian Krebs.

Graham Cluley: AV shouldn’t just be something on your hard drive – it should be part of a global immune system

In the first of a series of guest blog posts AV industry veteran Graham Cluley voices his opinion on how security has changed – and the changes we all need to make for the future.

Does your mouse know it’s you? Researchers claim patterns can “fingerprint” users – and lock out imposters

When any computer user types on a keyboard, the pattern of keystrokes is unique – like a fingerprint. When using a mouse, the patterns for each user are just as different – and Iowa State engineers aim to combine these “patterns” to identify people, offering a more secure alternative to passwords.

Chronology of a Skype attack

By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk – an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.

Active Defense: Good protection doesn’t need to be offensive

Just Google for the search term ‘“active defense” startup’ and it is clear that this is a hot growth area in Internet security. But what is it, exactly? The answer to that question is difficult and controversial.

Derivatives trader admits to “cyber intrusion” which leaked customer information

CME, described by Bloomberg as the world’s largest futures trader, said in a statement that “to date” there was no evidence that the unknown attackers had affected trades on CME Globex, but customer information had leaked.

More woes for BlackBerry after “serious” security bug alert

Embattled handset maker BlackBerry has faced another blow, after the company warned users of a security bug affecting the software used to link its BB10 handsets to PCs.

Androids destroyed: Hacking contest pays out $50,000 “bug bounties” for successful attacks on Nexus 4 and Galaxy S4

“Pinkie Pie”, an under-21 hacker won $50,000 at the Pwn2Own contest, as he used drive-by attacks to take over a Samsung Galaxy S4 and a Nexus 4, both of which run Android.

“Tens of millions” at risk from Filecoder due to “mass email spam event” targeting small businesses, British police agency warns

Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from Britain’s National Cyber Crime Unit, which is targeting small businesses with a spam campaign.

Windows 8.1 – security improvements

A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new “.1″ point release of Windows 8.

Is NSA Surveillance Affecting Online Behavior?

Results of an ESET commissioned survey show that, in the wake of the Snowden/NSA revelations, 50% of Americans have less confidence in technology companies like Internet Service Providers and software firms. A surprising 1 in 5 are now doing less online banking and 14% have cut back their online shopping.

Microsoft goes on the attack with global Cybercrime Center

Microsoft has opened a new Cybercrime Center – a war room where the tech giant’s lawyers and security experts will use bleeding-edge technology and industry expertise to battle crime online.

Safer cyber-shopping! 12 tips for a happier Holiday Season

Don’t let cybercriminals spoil your holidays! Our tips will ensure you don’t get fooled by the latest scams while you hunt down the best deals for your family.

Keypic aims to replace wobbly-text CAPTCHAS with pictures that “lock” spammers out

Keypic uses an image – usually an advert, but it can be a single pixel, an animation, or anything the site’s administrator wants – and checks for typically “human” behavior. It’s already used on nearly 6,000 sites, and is available as a plug-in for WordPress and Drupal.

One in five big banks has faced “high risk” security incidents via web apps

Half of the world’s 50 biggest banks have faced security incidents affecting their web applications. Fifteen per cent of those incidents were classified as “high” or “critical” risks, a new study has revealed.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Aryeh Goretsky

Lysa Myers

David Harley

Stephen Cobb

Robert Lipovsky

Joan Calvet

Sébastien Duquette

Graham Cluley

Cameron Camp

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Marc-Etienne M.Léveillé

Copyright © 2014 ESET, All Rights Reserved.