September 23, 2013: HIPAA health data security compliance deadline looms

Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.

Cybercriminals turn to Perfect Money after Liberty Reserve takedown

Cybercriminals are turning to a new digital currency, Perfect Money, in the wake of the closure of the notorious Liberty Reserve, which was described as “the bank of choice” for cybercrime.

Don’t get zombified! Security tips for PC gamers

Don’t let your PC end up in someone’s zombie army. Gamers are prime targets for cybercriminals – our tips should help you avoid ending up an infected victim…

Stop TVs spying on us! U.S. Senator calls for safer “Smart” devices

“You expect to watch TV, but you don’t want the TV watching you,” said Senator Charles E Schumer, as he called for improved security measures in “Smart” televisions.

Warning over security flaws in HP printers which can reveal passwords

Security flaws in some models of HP LaserJet Pro printers can reveal users’ administrator passwords to remote attackers, a researcher has revealed.

Whiter-than-white hats, malware, penalty and repentance*

I was recently contacted by a journalist researching a story about ‘hackers’ quitting the dark side (and virus writing in particular) for the bright(-er) side. He cited this set of examples – 7 Hackers Who Got Legit Jobs From Their Exploits – and also mentioned Mike Ellison (formerly known as Stormbringer and Black Wolf, among

“Black hat” hacker claims to earn $20,000 per hour – but Reddit doubts it

A self-styled “hacker” claims that crime can pay – saying that his 3 million-strong PC botnet earns him up to “$15,000 to $20,000” per hour.

Google Chrome in privacy row over plain-text passwords

Google’s Chrome browser has been criticized over its password security, after a developer found that anyone logged into the same OS account could easily see any saved website passwords in plain text.

Crytek is latest gaming company to face security breach

The German developer of the hit shoot ‘em up series Crysis has taken its websites offline after a security breach in which user login details “may have been compromised.”

Stop using Windows, Tor Project advises users after malware outbreak

The Tor Project has advised users of the anonymous browser to stop using Windows, in the wake of a malware attack which exploited a Firefox vulnerability in the Tor Browser Bundle.

“Worst of the worst” abuse images may be being used to spread Trojan, charity warns

Websites for businesses such as furniture stores have been hacked to host child pornography images – and the likely motivation is to spread malware, an internet charity has warned.

Paranoid Android user? Maybe this “security pouch” will help

The waterproof metal-fabric pocket ensures users cannot be tracked or contacted – offering a level of privacy that DIY alternatives such as cocktail shakers cannot match.

Identity-exposing malware on Tor “could be work of FBI”

A malware outbreak which reveals the IP addresses of computer users has struck sites on the anonymous Tor network, including some said to host child pornography – with forum users suggesting that the outbreak might be the work of the FBI.

My Back Pages* – Virus Bulletin papers and articles

I recently completed my 14th Virus Bulletin conference paper, co-written with Intego’s Lysa Myers, on “Mac hacking: the way to better testing?” to be presented at the 23rd VB conference in October, in Berlin. The paper itself won’t be available until after the conference, but the abstract is on the Virus Bulletin conference page here.

Bulletproof Inbox: Tips for staying safe (and sane) on email

Many of us have got wiser to email spams and scams – but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the “click of death”…

NIST Cybersecurity Framework 101

Java adverts can be used to create million-strong botnets for just $500

Fake adverts could be used to “remote control” internet browsers on a massive scale – allowing for cheap DDoS attacks, where millions of unwitting web users “attack” target sites.

What do a banking Trojan, Chrome, and a government mail server have in common?

New analysis and white paper detail how ESET researchers helped stop criminal hackers exploiting a Brazilian government website to retrieve data stolen by Trojan code that used spam and a Chrome browser plugin to steal confidential data from online banking customers.

Revealed: How a “malicious charger” infects iPhone with spyware in under a minute

Borrowing an iPhone charger – or using one in a public place – might be more risky than you think. Researchers from Georgia Tech showed off an attack this week which used a modified iPhone charger to infect an iPhone 5 with spyware in under a minute.

Pets’ names and partners’ names remain top password choices, says Google

One in six adults use the name of a pet as the basis of their password, and two-thirds use their partner’s name, according to a new survey commissioned by Google.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Aryeh Goretsky

Lysa Myers

David Harley

Stephen Cobb

Robert Lipovsky

Joan Calvet

Sébastien Duquette

Graham Cluley

Cameron Camp

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Marc-Etienne M.Léveillé

Copyright © 2014 ESET, All Rights Reserved.