My Back Pages* – Virus Bulletin papers and articles

I recently completed my 14th Virus Bulletin conference paper, co-written with Intego’s Lysa Myers, on “Mac hacking: the way to better testing?” to be presented at the 23rd VB conference in October, in Berlin. The paper itself won’t be available until after the conference, but the abstract is on the Virus Bulletin conference page here.

Bulletproof Inbox: Tips for staying safe (and sane) on email

Many of us have got wiser to email spams and scams – but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the “click of death”…

NIST Cybersecurity Framework 101

Java adverts can be used to create million-strong botnets for just $500

Fake adverts could be used to “remote control” internet browsers on a massive scale – allowing for cheap DDoS attacks, where millions of unwitting web users “attack” target sites.

What do a banking Trojan, Chrome, and a government mail server have in common?

New analysis and white paper detail how ESET researchers helped stop criminal hackers exploiting a Brazilian government website to retrieve data stolen by Trojan code that used spam and a Chrome browser plugin to steal confidential data from online banking customers.

Revealed: How a “malicious charger” infects iPhone with spyware in under a minute

Borrowing an iPhone charger – or using one in a public place – might be more risky than you think. Researchers from Georgia Tech showed off an attack this week which used a modified iPhone charger to infect an iPhone 5 with spyware in under a minute.

Pets’ names and partners’ names remain top password choices, says Google

One in six adults use the name of a pet as the basis of their password, and two-thirds use their partner’s name, according to a new survey commissioned by Google.

New ransomware uses webcam and Homeland Security threat to scare victims

A new ransomware infection scares its victims by invoking the name of the Department of Homeland Security, and the National Cyber Security Division – and frightens users further by posting a webcam picture.

Hackers “frame” security blogger with Silk Road heroin delivery

Members of a Russian cybercrime forum attempted to frame respected security blogger Brian Krebs by mailing 13 bags of heroin to his home and alerting police.

Researchers “remote control” an $80 million yacht – and even aircraft could be vulnerable

A hi-tech spoofing attack took “remote control” of a 213-foot yacht – steering it off course, without anyone touching the steering wheel.

Lost in space? NASA “fell short” on cloud security, report finds

NASA is no stranger to peering into nebulae in space – but the space agency found itself perplexed by the more Earthbound puzzle of cloud computing security, according to a report by the Office of the Inspector General.

Thomson Reuters is latest victim of high-profile Twitter hacks

A Twitter account used by international news agency Thomson Reuters was compromised this week, by hackers affiliated to the Syrian Electronic Army.

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Recently, our anti-virus laboratory discovered an interesting new modification of a file virus known as Expiro which targets 64-bit files for infection. File-infecting viruses are well known and have been studied comprehensively over the years, but malicious code of this type almost invariably aimed to modify 32-bit files. One such family of file viruses, called

Safe Summer PC Usage – beat the heat and stay secure with your laptop, tablet or smartphone

Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby, library, coffee shop or wherever you go to chill out with your digital devices.

Real damage of cybercrime may be counted in job losses, not dollars, says CSIS report

Earlier estimates of “trillion-dollar” damage to the world economy may have overstated the financial impact of cybercrime, according to a report by the Center for Strategic and International Studies.

Avoid “droid rage”: Five tips to keep your Android secure

Many people leave phones and tablets “open” to criminals – both the cyber variety, and the ordinary, non-cyber kind. Our tips should help your handset safe.

“Car hackers” to show off how they can “control” vehicles with a laptop

Two researchers are to demonstrate a “hack” that allows control over automobile systems including brakes and steering in models by Ford and Toyota – overriding the commands sent by the driver.

Overconfident? Introverted? Study reveals personality traits of “perfect” phishing victims

A new study aims to identify the sort of people who are most likely to fall for phishing scams – and has found that women, introverts and the overconfident are more likely to confuse “real” email with phishing scams.

Android spyware “on rise” as snooper apps multiply

Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Lysa Myers

Stephen Cobb

David Harley

Graham Cluley

Sebastián Bortnik

Sébastien Duquette

Pablo Ramos

Aryeh Goretsky

Cameron Camp

Robert Lipovsky

Marc-Etienne M.Léveillé

Copyright © 2015 ESET, All Rights Reserved.