latest posts

Welcome to We Live Security!

Welcome to the new ESET blog: We Live Security. In fact, We Live Security is a lot more than a blog: it contains the same great content you have enjoyed on blog.eset.com, but also includes new features and a wider range of content. For example, here’s a podcast talking about the new site, one of

How cybercriminals ‘market’ email attacks – and why LinkedIn lures are today’s prize phish

Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how effective a particular email is, according to an email security specialist.

Free Wi-Fi isn’t worth the risk, warns Euro police chief

The head of Europol’s cyber crime division, Troels Oerting, has warned against using public Wi-Fi hotspots, after the law enforcement agency has seen an increase in the misuse of public Wi-Fi for identity theft and financial attacks.

‘Secure’ web browsing can leak private data to employers and ISPs, researchers warn

University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy, revealing data such as health conditions, financial details and sexual orientation.

Courier Scams – don’t give away your bank card

If someone rings you up to tell you that your bank card has been compromised, it may be because they want to get their own hands on it.

Android phones and tablets ship “pre-infected” with malware

Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” – a bogus version of Netflix which sends password and credit card information to Russia, according to app security specialist Marble Security.

WWF warns of ‘arms race’ with ‘cyberpoachers’ targeting endangered species

Criminals seeking to kill endangered species and sell trophies online are turning to increasingly hi-tech methods to target their prey – including cyber attacks built to steal information on where animals patrol, according to the World Wildlife Fund’s Wildlife Crime division.

Bitcoin bank Flexcoin shuts down after attackers loot $570,000 from “hot wallet”

The attackers were able to steal all the bitcoins stored in the bank’s “hot wallet” – the portion of its funds on computers accessible via the internet – due to a transaction flaw in its code.

How can we as patients secure our medical data?

When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.

Don’t panic! Twitter mass password reset was ‘mistake’ company admits

An emailed warning and enforced password reset sent out to Twitter users on Monday due to a supposed compromise of their accounts provoked much discussion among site users – before the company admitted the reset had been initiated by mistake.

More than 300,000 wireless routers hijacked by criminals in global attack

More than 300,000 wireless routers worldwide are under the control of an unknown group of cybercriminals, who have made malicious changes to the devices’ settings – and the attack is part of a “growing trend”, researchers claim.

STEM education, the Target data breach, and the Apple SSL vulnerability

Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?

Mt Gox site code “posted online” as exchange admits $500m in bitcoin is lost

Bitcoin exchange Mt Gox has admitted that nearly $500 million in bitcoin has “disappeared”, in a new statement posted online – as chunks of computer code have appeared on Pastebin which appear to be part of the backend for the site.

Netflix phish, tech support scam, same phrying pan

Yet another innovative tech support scam, using Netflix phishing to get remote access to the victim’s system.

Cisco offers $300,000 for “visionary” solutions to defend ‘Internet of Things’

Networking giant Cisco has launched a “grand challenge” to invent a security solution for the “internet of things” – a broad term used to describe connected devices from industrial equipment to cars to smart home appliances.

CIA chief says internet-connected appliances are ‘worrisome’ new threat

CIA Director John Brennan says that connected appliances and networked vehicles will make the agency’s job harder – with more systems to protect, and more platforms which could be used to launch attacks.

Smells phishy? New email scams – and why smartphone users need to stay alert

Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.

Boeing unveils encrypted ‘Black’ spy phone which self-destructs when tampered with

Boeing has unveiled a smartphone fit for James Bond – the Boeing Black, which can connect to satellites and secret government telecoms networks, will self-destruct if tampered with, deleting all data and rendering the device useless.

Wi-Fi virus Chameleon infects whole cities ‘like airborne disease’

A virus designed to infect Wi-Fi networks can spread through cities “as efficiently as the common cold spreads between humans”, researchers at the University of Liverpool have found.

Corkow: Analysis of a business-oriented banking Trojan

Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Rob Waugh

Jean-Ian Boutin

David Harley

Graham Cluley

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Lysa Myers

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Peter Stancik

Copyright © 2014 ESET, All Rights Reserved.