5 physical security tips for protecting your digital devices

As we read earlier this week, the chances that one or more of your digital devices may get stolen are uncomfortably high. So what would happen if your mobile device falls into the wrong hands? Here are a few tips that will help minimize the damage if it happens to you.

Mystery shopper scam: misery shopping

Money for nothing? Don’t believe it: a variation on the Mystery Shopper scam that misuses the Pinecone Research brand.

Ninety per cent of passwords are vulnerable to hacking, says report

According to the Deloitte Technology Trends 2013 report more than 90 per cent of user-generated passwords are weak and vulnerable to hacking, including those considered strong by IT departments.

Microsoft fixes Explorer vulnerability in out-of-band patch announcement

Microsoft has taken the unusual step of announcing a patch for an Internet Explorer vulnerability just a week after its traditional patch Tuesday announcements.

Are fears of digital device theft justified? Survey says yes

Everybody knows that laptop computers, tablets and smartphones get stolen, and everybody reading this probably owns at least one of these digital devices, so should you be concerned about yours being pinched, pilfered, peculated, purloined, or in other words, stolen?

Euro security agency lists top ten cyber threats

The EU’s cyber security agency ENISA has published its Cyber Threat Landscape analysis of 2012 which puts drive-by-exploits as the top web threat.

Java vulnerability confirmed by US Department of Homeland Security

A Java vulnerability seemingly discovered by a French researcher has been confirmed by the US Government.

More on that Java vulnerability

  [Update 2: a note for Mac users in Turn off that Java Lamp. And Brian Krebs notes that Oracle Ships Critical Security Update for Java] [Update to a link at java.com offering more information on disabling Java in web browsers.] This is a quick pointer to blogs posted by our colleagues in Spain and in

Java 0-Day Exploit CVE-2013-0422

The infamous exploit packs Blackhole and Nuclear Pack now feature a new zero-day Java exploit that exploits the Java vulnerability CVE-2013-0422. The latest version of Java 7 Update 10 is affected. Malware spreading through drive-by-downloads often utilizes exploit packs, which are able to serve malware variants without any user interaction, as opposed to other techniques

European Cybercrime Centre opens in The Hague

As part of an EU drive to combat the growth of cybercrime across member states a new European Cybercrime Centre (EC3) based at Europol headquarters in The Hague opens Friday 11th January.

Stray cat used as bait in Japanese hacking plot

In a story that could be lifted direct from a Hollywood script, a Japanese hacker placed a memory card on the collar of a stray cat found wandering on an island near Tokyo.

FBI snatches Algerian bank hacker in Thailand

Hamza Bendelladj, the Algerian alleged bank hacker responsible for defrauding US banks of millions of dollars has been detained in Thailand, following three years of tracking by the FBI.

2012 malware Top Ten and revisiting 2012’s Threatblog

Apparently we posted 235 blogs here in 2012, just a fraction under 20 blogs per month on average. So this would be a perfect moment to produce one of those summaries of the year’s activities that wordpress.com provides, telling you how many people viewed your blog site and how many times they’d go round the

Unwrapping Mac security

Imperva, VirusTotal, and whether AV is useful

Offending the AV industry is one thing, but do you want to base a security strategy (at home or work) on a PR exercise based on a statistical misunderstanding? (Yes, I’m being diplomatic here…)

2013 Forecast: Malware, scams, security and privacy concerns

What does the New Year hold for information security, malicious software, consumer privacy and cybercrime? Questions of this mature are posed by journalists toward the end of every year and, beginning about November, answers from security specialists start to appear in print. Indeed, ESET researchers in Latin America published a 20-page white paper on this

Phishing and malware – keep Smiling through…

Three current phishing gambits and email-borne malware currently getting past normally efficient email filtering.

Securing a small business is good business

Cyber criminals undoubtedly attack big businesses but smaller businesses are vulnerable too and often fail to take basic steps to protect themselves. Here are our top tips to help keep your small business secure.

The Industrialization of Malware: One of 2012’s darkest themes persists

For several years now, antivirus researchers have observed increasing efficiency and sophistication in malware development and distribution. At the start of 2012, I began using the term “industrialization of malware” to describe this phenomenon. I also drew a picture of the fictitious enterprise “Malware, Inc.” as a means of conveying the transformation that malware has

Unwrapping PC Security

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Lysa Myers

Jean-Ian Boutin

Graham Cluley

Stephen Cobb

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

David Harley

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.