Law “may need longer arm” to tackle international cyber gangs, British police chief admits

Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit has admitted – and says he will discuss the issue with government if necessary.

Stop, thief! Five new tricks used by cybercriminals – and how to stay safe

From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here are some of the latest traps laid by cybercriminals – and how to sidestep them.

Security alert over sensors in smartphones – is your accelerometer selling you out?

Most smartphones today contain an accelerometer – without them, the latest fitness apps don’t work – but a Stanford researchers has shown that the sensor can be used to “fingerprint” a device, handing valuable data to unscrupulous advertisers.

Cyber-warriors, your country needs you: Governments hit by “shortage” of experts

Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks – but there aren’t enough experts to go round.

Some D-Link routers contain “backdoor” which allows remote access, researcher warns

Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.

The Adobe Source Code Breach

One of the biggest security breaches of the year hit software giant Adobe. ESET security researcher Aryeh Goretsky explains what happened.

Win32/KanKan – Chinese drama

In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities – and discuss the evidence that Xunlei Networking Technologies is implicated.

The wrong cable guys: Card skimmers install bogus wires into cash registers in Nordstrom store

A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.

Supercar security? Porsche and Lacie unveil “ultra-secure” encrypted USB stick

For many PC users USB keys must seem like a relic of a bygone age – but for security-conscious workers, keys can be a very safe place for data. Porsche and Lacie’s new USB offers password-protected storage for sensitive files.

Five bad PC habits many of us STILL have – and how to stop today

Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.

Microsoft pays out $100,000 in single “bug bounty”

Bounty hunting just got serious – Microsoft has paid out $100,000 to a security researcher in a single “bug bounty” for uncovering a weakness in the preview version of Windows 8.1.

Smartphone users want more protection – and don’t mind being fingerprinted, says Paypal

Smartphone users want more protection for the data on their cellphone – and are perfectly comfortable being fingerprinted if that’s the best option, accoriding to a new survey commissioned by PayPal.

EU cyber agency warns of “outdated” systems in power plants – and suggests new safety measures

Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure – and action is needed to ensure nations stay safe, the EU’s cyber security agency ENISA said today.

Ponemon study shows costs of cybercrime still rising – each attack now costs $1 million

The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the Ponemon Institute. Each cyberattack now costs companies nearly $1 million to resolve, on average – and the annualized cost to a sample of U.S. organizations was $11.56 million.

Android users to get Apple-baiting fingerprint protection “by next year”

Apple’s fingerprint sensor has drawn a huge amount of attention (and hack attempts) ever since it launched on iPhone 5S – but it seems Android users will get their own fingerprint protection shortly.

Waking Shark: Banks to face biggest cyber war game ever in UK

A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of banks, markets and payments systems against a simulated “major” attack by cybercriminals.

Who goes there? Voice-recognizing biometrics are set to take off, claims Nuance exec

The human voice can be used as a secure, quick way to identify people, claims Bretislav Beranek of voice-recognition software company Nuance. Beranek claims that voice ID is gaining ground – and could even be used to authenticate users for credit cards.

Skorpion smartphone charger lights up if your phone contains malware

Plugging your smartphone in to charge up could soon offer an alert that you’ve contracted malware – with a new charger that lights up when it detects malicious software. For businesses, it could be a “last line of defense” against employees bringing infected devices to work.

Hacked Card Readers And The Gangs Behind Them

Fake card readers discussed by ESET security researcher, how they work and new developments like pre-packaged crimeware kits.

Internet Explorer vulnerability will finally be patched on Tuesday after “months” of attacks

Internet Explorer users will be a great deal safer from Tuesday onwards, after Microsoft announced a patch for a vulnerability that has been exploited by attackers “for months” according to some reports.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Lysa Myers

Jean-Ian Boutin

Stephen Cobb

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.