latest posts

Metadata from phone calls ‘reveals personal information’

Metadata that is generated through phone calls discloses a significant amount of personal information, a new study from Stanford University in the US has found.

ESET releases new decryptor for TeslaCrypt ransomware

If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or left unchanged, then ESET has good news for you.

Operation Groundbait: Espionage in Ukrainian war zones

After BlackEnergy and Operation Potao Express, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait.

Jigsaw ransomware 2.0: A fake or work in progress?

Jigsaw 2.0 is not fully-fledged ransomware, but it does try to feed off of ransomware’s current popularity amongst cybercriminals, writes ESET’s Ondrej Kubovič.

Android apps ‘need to follow better security practice’

Many Android apps in Google Play are still not following best practice when it comes to authentication and authorization.

Cybercrime on the rise as economic crime ‘goes digital’

Incidents of cybercrime are on the rise, with a new study from PwC reporting it as the “only economic crime to have registered an increase”.

Privacy and security fears – predictably – impact US online commerce

US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.

Location-tracking apps ‘breach of European data protection law’

A Norwegian-based watchdog has identified a breach of European data protection law by fitness tracking app, Runkeeper.

Expect the unexpected: The importance of audit logging

ESET’s Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.

The security review: Online safety for families and TalkTalk

Welcome to this week’s security review, which includes an online safety guide for families over the years, the repercussions of last year’s data breach at TalkTalk, and a warning from Adobe of a Flash zero-day vulnerability.

Online safety for families across the years

When it comes to online safety, it can be difficult to understand what’s suitable for different age groups. Our guide offers advice on how to manage this over the years.

Another Eurovision contestant? Even malware can ‘perform music’

In contrast to the Eurovision contestants, malware writers try to make their creations as stealthy as possible. But thanks to unique behavior and sometimes even unintended showmanship of their malicious code, they end up in the limelight.

TalkTalk profits halve following last year’s major cyberattack

The UK-based telecommunications company TalkTalk has seen its profits more than halve, following last year’s “significant and sustained cyberattack”.

Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals

Adobe Flash users find themselves in danger once again, as they wait for an emergency security patch to fix a vulnerability being actively exploited in the wild.

SWIFT: We’re not responsible for Bangladesh Bank cyberheist

SWIFT has delivered a strongly-worded statement that rejects the claims made by both Bangladesh Bank and Bangladesh Police’s Criminal Investigation Department over one of the biggest cyberheists in history.

Exploiting 1-byte buffer overflows

Matías Porolli shows how exploit another classic buffer overflow vulnerability, in which the ebp register is moved to execute an arbitrary code.

After authentication comes authorization and access control

In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET’s Lysa Myers.

Top tech firms ordered to disclose approach to mobile patches

Top tech organizations have been “ordered” to disclose their approach to security updates with mobile devices.

Big businesses in the UK ‘experience regular data breaches’

Data breaches are widespread among large businesses in the UK, according to a new report. The Cyber Security Breaches Survey found that two-thirds of the biggest firms have experienced an attack of some kind over the past 12 months.

Mother’s Day comparison: Which nation has the strictest moms?

On Mother’s Day, ESET takes a deeper look into the results of its recent survey focusing on parenting in a digital era. We looked at how moms in the US, Germany, the UK and Russia are trying to protect their children.

Follow us

Copyright © 2016 ESET, All Rights Reserved.