Warning over “risky” behavior of under-12s online – and parents need to take action, safety group says

Children indulge in highly risky behavior online – with nearly one in five 9-11 year olds having physically met strangers they encountered online. Others use false identities – with some under-10s pretending to be 25.

Cyberattacks against major firms “double in one year”, report warns

Cyber attacks have doubled in the year 2012-2013, according to a fraud report released by investigators Kroll – and the target is often information, rather than cash.

Solutions to current antivirus challenges

The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?

iPhone 5s: Biometrics For The Rest Of Us

The implications of Apple’s implementation of biometrics on the iPhone 5s. ESET security researcher Stephen Cobb likes it, especially if it is used as a second or added authentication factor.

New IBM system adds “robust” security to smartphone banking and shopping

Cybercriminals are already targeting mobile banking apps as a “way in” to customer accounts – as witnessed in ESET’s discovery of a new, advanced Trojan, Hesperbot. But a new IBM system may help secure smartphones – by using near-field communications chips (NFC) for an additional layer of security. It’s the first system to allow “two-factor”

Adobe hackers behind breach at PR Newswire – but company claims “no fake releases” have gone out

The global press release distribution firm PR Newswire has admitted to a large-scale breach, in which usernames and passwords were stolen – but claims hackers have not sent out “fake” releases, which can be used to manipulate financial markets.

Clean up, speed up: How to make your PC run faster

On average, Windows PC users spend five days a year waiting for their machines to load – and the culprit for slow machines isn’t always malware. Here are a few tips to restore your grumbling old PC to top speed.

A prompt to save the world: new security features against malware in AutoCAD

Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.

Indonesia overtakes China as leading source of cyberattacks, Akamai reports

Cyberattacks seem to be a growth industry in Indonesia, with the region having pushed China off the top spot as the leading source of attack traffic in the last quarter, according to internet services provider Akamai.

New iPad will add iPhone 5S-style fingerprint scanner, leaked picture hints

Apple has announced an event for October 22, with the usual teasing headline, “We still have a lot to cover.” Leaked pictures hint that at least one of those things will be an iPad protected by the Fingerprint ID system used in iPhone 5S.

Is cybersecurity by fiat dead on arrival?

Are legislation and regulation a viable means of making people and organizations do better at securing data systems and devices? I’m not talking about FIAT the car maker, but fiat: “an official order given by someone who has power.” How’s that working in light of NIST CSF and HIPAA?

Law “may need longer arm” to tackle international cyber gangs, British police chief admits

Bringing the international gang lords of cybercrime to justice is a “challenge”, the interim head of Britain’s new National Cyber Crime Unit has admitted – and says he will discuss the issue with government if necessary.

Stop, thief! Five new tricks used by cybercriminals – and how to stay safe

From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here are some of the latest traps laid by cybercriminals – and how to sidestep them.

Security alert over sensors in smartphones – is your accelerometer selling you out?

Most smartphones today contain an accelerometer – without them, the latest fitness apps don’t work – but a Stanford researchers has shown that the sensor can be used to “fingerprint” a device, handing valuable data to unscrupulous advertisers.

Cyber-warriors, your country needs you: Governments hit by “shortage” of experts

Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks – but there aren’t enough experts to go round.

Some D-Link routers contain “backdoor” which allows remote access, researcher warns

Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and private data, a researcher has warned.

The Adobe Source Code Breach

One of the biggest security breaches of the year hit software giant Adobe. ESET security researcher Aryeh Goretsky explains what happened.

Win32/KanKan – Chinese drama

In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities – and discuss the evidence that Xunlei Networking Technologies is implicated.

The wrong cable guys: Card skimmers install bogus wires into cash registers in Nordstrom store

A trio of men plugged keyloggers disguised as ordinary connectors into cash registers in a Nordstrom department store in Florida, and returned to collect days later, according to security blogger Brian Krebs.

Supercar security? Porsche and Lacie unveil “ultra-secure” encrypted USB stick

For many PC users USB keys must seem like a relic of a bygone age – but for security-conscious workers, keys can be a very safe place for data. Porsche and Lacie’s new USB offers password-protected storage for sensitive files.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Graham Cluley

David Harley

Cameron Camp

Lysa Myers

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.