latest posts

The security review: Ray-Ban scam is back

Welcome to this week’s security review, including news of a returning Ray-Ban scam that has spread from social media to email.

32 million Twitter account credentials up for grabs – but site says it wasn’t hacked

Over 30 million Twitter account details are put up for sale on the computer underground.

From a drip to a flood: The impact of a data leak

Data leaks, especially from an organization’s point of view, are a huge and growing problem. The impact can be severe, as this feature highlights.

Hours before Euro 2016, fake websites are still offering overpriced tickets

Online scammers are trying to take advantage of fans desperately scouring the web for the last few tickets to Euro 2016 via newly created fake websites.

Hitting emails and Facebook: Ray-Ban scam is back

Recently, we informed you about a Ray-Ban scam campaign flooding Facebook via hacked profiles. It seems this hasn’t satisfied the attackers They’re back.

Most organizations unconfident in ability to protect data after breach

The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach, a Gemalto study has found.

University of Calgary bows down to ransomware demands

The University of Calgary has handed over $20,000 CND to cybercriminals, who had launched a ransomware attack on the institution.

Crimeware: Malware and massive campaigns around the world

Cases of malware and crimeware incidents are reported daily around the world. Indeed, the number of reports, detections and threats grows constantly.

IRS’s new Get Transcript online service benefits from enhanced cybersecurity

The Internal Revenue Service (IRS) in the US has relaunched its Get Transcript online service, which it says is delivers enhanced cybersecurity.

Mandatory password reset for some Facebook and Netflix users in wake of mega-breaches

Don’t panic. Facebook and Netflix have not suffered a data breach. But it’s quite possible that they are asking you to change your password.

Is the federal government doing enough to catch and prosecute computer criminals?

With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.

Beyond TeslaCrypt: Crysis family lays claim to parts of its territory

It has been two weeks since ESET created a TeslaCrypt decryptor, which allows victims of this ransomware to get their files back. Since then, over 32,000 users around the globe have taken advantage of this opportunity and downloaded the tool.

Mark Zuckerberg’s social media accounts accessed

Mark Zuckerberg’s social media accounts have been accessed without his permission or knowledge, it has been revealed.

Infrastructure attacks: The next generation

ESET’s David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?

The security review: Crouching Tiger, Hidden DNS

Welcome to this week’s security review, including the story of a DNS hijack that sets the victim’s computer to use specific DNS servers.

How to delete your smartphone data securely before selling your device

Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.

Nearly all phishing emails now contain ransomware

As many as 93% of all phishing emails now contain ransomware, according to a new report by PhishMe.

Beware online fraudsters jumping on the back of recent data breaches

The Internet Crime Complaint Center (IC3) has issued a public service announcement warning people about online fraudsters, who are attempting to exploit a recent spate of data breaches that have only just come to light.

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim’s computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.

Follow us

Copyright © 2016 ESET, All Rights Reserved.