latest posts

Silk Road 2.0 drug market hit, millions stolen from bitcoin reserve

A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.

Two-thirds of couples ‘share passwords to online accounts’, Pew research finds

Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.

Critical IE and other flaws discovered. Patch your systems now, says Microsoft

If your system administrator looks a little frazzled this week, be nice to him or her and don’t grumble too much about the photocopier being jammed. It may be that they have more serious issues on their mind.

Personal email and cloud storage pose ‘biggest threat’ to corporate data, report claims

Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.

Worldwide cost of identity theft could be $5 billion per year, Microsoft survey finds

A Microsoft survey of 10,000 consumers found that the worldwide annual cost of identity theft and phishing could be as high as $5 billion – and the cost of repairing damage to people’s reputation online could be even higher.

Half of children left exposed to online threats as parents fail to use built-in controls

Less than half of parents use parental controls on internet-enabled devices bought for their children – leaving millions of youngsters potentially exposed to online threats, according to new research.

Windows exploitation in 2013

The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.

Corkow – the lesser-known Bitcoin-curious cousin of the Russian banking Trojan family

A little-known banking trojan, developed in Russia, has managed to infect thousands of victims’ computers without the knowledge of their owners. Graham Cluley takes a closer look.

Two-factor authentication: What is it – and why do I need it?

Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ’2FA’.

Microsoft boosts security for Office 365 users with two-factor logins

Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication being rolled out to versions of Office 365 this week.

Phishy business: Surge in tax scams as emails rise by nearly 50% in one year

Fraudulent emails offering refunds of overpaid tax have surged by nearly 50% in the past year, according to a report by Accountancy Age. Customers reported 23,347 phishing emails to the British tax authorities in the three months before the deadline.

American law firm admits entire server of legal files fell victim to Cryptolocker

A small American law firm has admitted that every document on a server at the North Carolina company has fallen prey to the Cryptolocker ransomware, according to a report by local station WSO CTV.

Facebook’s ‘A Look Back’ video used as bait for malware, report claims

A fake version of Facebook’s 10th anniversary celebration video page, ‘A Look Back’ is spreading via the social network, with users directed instead to another website, where they are prompted to download files.

Wangiri Telephone Fraud – One Ring to Scam Them All

Missed a phone call? The Better Business Bureau says answering international telephone fraud calls looking like US calls might cost you more than you think.

U.S. hotel firm ‘knew of credit card breach for two weeks’ before going public

Managers at White Lodging, a hotel management firm that works with various brands including Hilton, Marriott, Westin, Sheraton and Hyatt, may have known of a major credit card data breach for two weeks before details were made public.

Sniffing body odor has ‘enormous potential’ for biometrics, researchers claim

Body odor could be used as a biometric identifier, with high rates of accuracy, due to chemical patterns in the smell that are unaffected by bodily changes – or deodorant – according to Spanish researchers.

Flipboard: A new way to enjoy We Live Security on the move

We Live Security has launched on Flipboard – the hit magazine-style app for Kindle, Android and iOS. Every week, we’ll hand-pick the best articles from We Live Security, and the app will automatically keep you up to date with our latest news, features and research.

Cellphone-sized $20 gadget can remote-control car electronics, researchers claim

A tiny, cheap gadget which can ‘hack’ into the network of modern cars to receive radio commands ranging from controlling steering and brakes to switching off headlights is to be shown off at the Black Hat Asia security conference in Singapore next month.

419 Scams: Let The Seller Beware

419s are a well-known scam type, but some scams are more obvious than others. And sometimes it’s the seller who’s cheated not the buyer.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

David Harley

Graham Cluley

Rob Waugh

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Lysa Myers

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Jean-Ian Boutin

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Peter Stancik

Copyright © 2014 ESET, All Rights Reserved.