latest posts

Is the federal government doing enough to catch and prosecute computer criminals?

With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.

Beyond TeslaCrypt: Crysis family lays claim to parts of its territory

It has been two weeks since ESET created a TeslaCrypt decryptor, which allows victims of this ransomware to get their files back. Since then, over 32,000 users around the globe have taken advantage of this opportunity and downloaded the tool.

Mark Zuckerberg’s social media accounts accessed

Mark Zuckerberg’s social media accounts have been accessed without his permission or knowledge, it has been revealed.

Infrastructure attacks: The next generation

ESET’s David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?

The security review: Crouching Tiger, Hidden DNS

Welcome to this week’s security review, including the story of a DNS hijack that sets the victim’s computer to use specific DNS servers.

How to delete your smartphone data securely before selling your device

Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.

Nearly all phishing emails now contain ransomware

As many as 93% of all phishing emails now contain ransomware, according to a new report by PhishMe.

Beware online fraudsters jumping on the back of recent data breaches

The Internet Crime Complaint Center (IC3) has issued a public service announcement warning people about online fraudsters, who are attempting to exploit a recent spate of data breaches that have only just come to light.

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim’s computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.

Myspace data breach: 360 million accounts affected

Myspace has revealed that it was the victim of a data breach. The incident took place a few years ago and is thought to have affected close to 360 million accounts.

Children’s Day advice: The risks looming in cyberspace

For many parents, especially those who aren’t digital natives, recognizing risks that loom in cyberspace is not easy. This guide helps point to some of the main threats.

65 million Tumblr users should probably be careful…

65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it’s not just their passwords that they should be concerned about.

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

Decision makers at banks ‘in the dark’ about data breaches

Decision makers at banks are in the dark when it comes to data breaches at their organization, according to KPMG’s 2016 Banking Outlook Survey.

Another malware wave hits Europe, mainly downloading Locky ransomware

ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries.

Beware Burger King WhatsApp scam: It’s a trap

Just when it seemed that the recent raft of WhatsApp scams were coming to a close, we have discovered a new one. This time it involves Burger King.

Phishing attacks on the rise

There has been a notable escalation in phishing attacks in 2016, according to a new report from the Anti-Phishing Working Group (APWG).

GDPR Day: countdown to a global privacy and security regimen?

This thing called GDPR will impact data security and privacy policy at many US firms when it takes effect two years from today. Start learning what the EU General Data Protection Regulation means to your business.

Financial industry ‘needs to come together to fight cybercrime’

The financial industry needs to come together to better understand the threat of cybercrime, according to an expert.

Follow us

Copyright © 2016 ESET, All Rights Reserved.