latest posts

VPNs illegal in UAE, says Dubai Police

A senior official in the Dubai Police force has stated that the use of Virtual Private Networks is illegal across the United Arab Emirates.

Hacker holds South Korean nuclear plant to ransom

A hacker who claims to have stolen sensitive data belonging to South Korea’s nuclear power plants is demanding money to keep the information private.

BBC website goes offline, but Jeremy Clarkson probably not to blame

This weekend, the BBC’s website went offline. The first conclusion many people jump to? It must be the work of Anonymous hacktivists angry about the suspension of Jeremy Clarkson. But how likely is that?

Women in Federal cybersecurity – How did they get their start?

While there may still be only a handful of women in Information Security, they can be found in increasing numbers in important, high-profile positions. In this post we look at how three women in Federal cybersecurity got their start.

Obama administration seeks more power to tackle botnets

The Obama administration wants greater power to shut down botnets, responding to the growing threat of cybercrime and increasingly complex, modern techniques.

British Bank trials heartbeat based authentication

A British bank has been trialling a different type of biometrics, allowing their customers to confirm their identity via heartbeat according to the BBC.

Heimdal blog, 19 Experts, 50+ Security Tips

Heimdal asked a range of security experts for their essential security tips. 19 experts (including David Harley) offered over 50 tips.

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

The immortality of data (and people) in the digital age

In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity be possible (or desirable)?

Hackers phish for data with fake Apple Watch giveaway

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

Google’s Project Zero reveals possible memory leak hack

Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.

Superfish: Lenovo goes on the bloatware offensive

Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish’s Visual Search adware on some of its popular consumer laptops during last year’s holiday shopping season.

The human cost of phone hacking

Phone hacking ruined the lives of celebrities, and – in at least one case – almost drove a victim to suicide.

80 percent of global merchants fail card data security tests

Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not in compliance with card data security standards.

Google Admin console email spoofing loophole patched

A vulnerability in Google Admin that could have allowed domains to be claimed to send out authentic seeming spoofed emails has been patched by the company, reports The Register.

US lawmakers want taxi apps to check driver fingerprints

Ride-sharing taxi apps Uber, Lyft and Sidecar have been asked by US lawmakers to adopt fingerprint-based background checks for their drivers,

US military looks to 3,000 new security hires by 2016

The United States’ military is looking to hire 3,000 cybersecurity professionals to man its infosec unit over the next nine months.

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Three men indicted in ‘one of the largest’ data breaches in US history

The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,”

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Cameron Camp

Graham Cluley

David Harley

Jean-Ian Boutin

Raphael Labaca Castro

Lysa Myers

Aryeh Goretsky

Marc-Etienne M.Léveillé

Joan Calvet

Guest Writer

Sebastián Bortnik

Copyright © 2015 ESET, All Rights Reserved.