Phish Allergy – Recognizing Phishing Messages

While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.

5 reasons not to “hack back”

Are hacking victims “hacking back”? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of “hacking back” when he asked me about revenge hacking.

Microsoft warns of banking malware targeting German speakers

Microsoft has warned of a new variant of a banking malware that appears to be targeting German speakers, according to PC World.

AOL blocks malicious ads from its advertising platform

AOL has taken steps to stop a set of malicious advertisements being served through their sites, including The Huffington Post, Computer Business Review reports.

CES 2015 in Las Vegas: first impressions, 5 hot topics

With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.

University researchers concerned with wearable privacy

A paper from researchers at various universities suggests that security is an area that needs work for wearables, according to a report in The Register.

Bitstamp hacked for $5 million in Bitcoin

19,000 Bitcoin – valued at around $275 each, so $5 million together – have been stolen from a majour European Bitcoin exchange, reports RT.

Unpatched security hole has left millions of Moonpig customers at risk for 17 months

Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.

Hackers ‘mistakenly’ take down local bus schedule website

A hacking group has ‘mistakenly taken down’ a local bus website under the impression that it is a far more significant target, The Guardian reports.

Chick-fil-A investigating possible credit card hack

Chick-fil-a has ordered an investigation into a possible data breach that occurred just before Christmas, according to The Guardian.

Google reveals Windows 8.1 security exploit after 90 day period elapses

Google has published details of a Windows 8.1 security exploit that could see the lowest level users obtaining total administrative control of a system running the operating system, Slash Gear reports.

Police close in on Bitcoin fraudsters who stole $370m in Mt Gox collapse

Police are closing in on thieves who stole Bitcoin valued at $370 million during the collapse of popular exchange Mt Gox – and just 1% of the theft is believed to be the work of outside hackers.

Sony execs turned to old BlackBerries from basement in wake of attack

Sony executives turned to old BlackBerries found in a basement in the firm’s California headquarters in, using SMS text messages and a ‘phone tree’ to communicate in the wake of the attack.

Nvidia breach – employee information leaks

Graphics card company Nvidia suffered a data breach in which private employee information was leaked, the company has revealed.

XBox and PSN attacks were “marketing scheme” for Lizard Squad’s DDoS service

The attack which knocked the PlayStation Network (PSN) and Xbox Live offline over Christmas appears to have been a publicity stunt, designed to gain notoriety and draw attention to the hacking group which has claimed responsibility – Lizard Squad.

Facebook privacy – network faces court for ‘reading user messages’

Facebook is to face a class action lawsuit over ‘reading’ its user’s messages, a U.S. judge has ruled.

Hobbit-inspired sword can help you find unsecured WiFi hotspots

Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age – long before Peter Jackson turned J R R Tolkien’s middle-earth fantasy books into a series of blockbuster movies.

Biometrics – can your fingerprint be ‘copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones – but biometrics may not be as secure as many believe.

Amazon, Xbox Live, PSN and more: Hackers leak 13,000 passwords

13,000 login details including payment card numbers an expiry dates have leaked from online services including Amazon, Xbox Live, Playstation Network and more, according to Tech Crunch.

Spyware abuse – partner tracking reaching “epidemic proportions”

Realtime call-monitoring and GPS tracking of partners by domestic abusers is on the rise, both via dedicated electronic listening devices or using sophisticated spyware software.

Follow us

Copyright © 2016 ESET, All Rights Reserved.