latest posts

Android banking trojan masquerades as Flash Player and bypasses 2FA

This malware masquerades as Flash Player, behaves like a screen locker, and can bypass two-factor authentication. This combination of features turns it into a powerful tool for stealing money from victims’ bank accounts.

Businesses fail to prepare as cybercrime surges globally

Cybercrime is now the second most reported economic crime and has affected at least a third of organizations in the past 24 months, yet many businesses are still underprepared.

The women of ENIAC and the future of women in tech

In 1942 six mathematicians were selected to program a machine that would help the US army calculate complex wartime ballistics tables. They helped to create ENIAC – one of the world’s first ever electronic computers. They were also all women.

Verizon Wireless fined $1.35m in ‘supercookie’ privacy settlement

Verizon Wireless will pay a $1.35 million fine after the company inserted undeletable ‘supercookies’ into its users’ browsing sessions without consent.

Introducing Google’s ‘Security Princess’: Parisa Tabriz

Parisa Tabriz may not be a household name, but it’s only a matter of time. We take a look at Google’s Security Princess, who is changing the face of tech.

Beware spear phishers trying to hijack your website

If you fail to take proper care, it would be all too easy to type your password into a phishing site and hand control of your website over to a online criminal gang.

New Mac ransomware appears: KeRanger, spread via Transmission app

New ransomware infecting Apple OS X surfaced on March 4th, 2016, with the emergence of KeRanger. The first inkling of trouble came at the weekend.

The security review: Security is ‘easy’ – just ask someone at RSA

Welcome to this week’s security review, in which we’ll be assessing the buzzword-laden security startups of RSA, and rounding up the week’s biggest stories.

The family security checklist

Keeping your family safe online is not about making a one-off investment in a security solution. It requires a proactive approach, once every two to three months for example, where you tick off a checklist. Here are five things to keep on top of.

Just 1 in 7 security chiefs report to the CEO, despite boardroom concern

Most businesses now recognize internet security as a real concern, yet new research has found that just 1 in 7 security chiefs report directly to their CEO.

RSA: Will your next phone have quantum cryptographic 2FA?

Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be ‘yes’ says ESET’s Cameron Camp.

One-third of HTTPS websites left vulnerable to DROWN attack

A new vulnerability could leave as many as one-third of HTTPS websites open to decryption.

Security is ‘easy': Just ask someone at RSA

This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.

Managing agile virtual machine security across the enterprise: A closer look

It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET’s Cameron Camp.

IRS issues warning to HR professionals over phishing scam

Less than a month after it “renewed a consumer alert” for phishing scams, the Internal Revenue Service (IRS) in the US has delivered another warning aimed this time at payroll and human resources professionals.

RSA: Can crypto save your life?

Is there such a thing as security technology that is too good? ESET’s Cameron Camp, who is in attendance at RSA, discusses further.

Snapchat staff payroll data leaked in phishing scam

Snapchat has said that is “impossibly sorry” after a data leak exposed payroll information for some of its current and former employees.

Super Tuesday is still offline. What’s the catch?

Even though the US is among the most technologically advanced nations in the world, most of its voters cannot cast their ballots online. Is internet voting a risk? Ondrej Kubovič reports.

5 threats every company needs to pay attention to

ESET’s Pablo Ramos takes a closer a look at the most common threats facing companies today and the impact that they can have.

The security review: porn clicker trojans at Google Play

Highlights from the past seven days in information security include porn clicker trojans at Google Play, digital childhoods and the security/privacy debate.

Follow us

Copyright © 2016 ESET, All Rights Reserved.