latest posts

Passwords not compromised by Ubuntu Forums data breach

A major data breach on the Ubuntu Forums has not compromised the passwords of its affected users. Usernames, emails addresses and IPs have been exposed.

Pokémon GO goes down: Hackers claim responsibility

Both the OurMine and PoodleCorp hacking gangs appear to be taking credit for Pokémon GO being offline over the weekend. But might there be a more down-to-earth explanation?

A smarter approach to password security ‘needed’

A smarter approach to password security is needed to help prevent cybercriminals from easily accessing our accounts and stealing personal information.

Firefighting, security and compliance

Security includes firefighting and compliance as well as systems and network management, but should the same people do it all?

Top tips on how to use Pokémon GO safely

The world is going crazy for Pokémon GO. Here are some top tips from ESET’s Lysa Myers on how to enjoy this latest sensation safely.

Flashback Friday: The Melissa virus

In 1999, David L. Smith launched the Melissa virus. Within a few hours, it had infected thousands of computers. We take a look back at its impact.

Pokémon GO hype: First lockscreen tries to catch the trend

ESET has discovered the first ever fake lockscreen app on Google Play, named Pokemon GO Ultimate. As its characteristics suggest, it deliberately locks the screen right after the app is started forcing the user to restart the device.

Fake apps on Google Play tricked users into paying instead of delivering promised followers

ESET has discovered eight fake applications on Google Play, which were promising to boost the number of followers on users’ social network profiles. Our security software is detecting these as Android/Fasurke.

Comic-Con: Travel, safety and privacy guide

Ahead of this year’s Comic-Con in San Diego, ESET’s Aryeh Goretsky has put together a handy travel, security and privacy guide.

Were you planning on downloading the Pokémon GO APK? Beware fake versions!

Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.

Nymaim rides again in 2016 and reaches Brazil

During the first half of this year, ESET has observed an increase in the number of detections of Nymaim, a long-known malware family whose prevalence has fallen markedly since 2014.

Hi, I’m the enemy: Different perspectives on a pentest

WeLiveSecurity begins a new series of articles showing the different angles that can be taken when tackling a pentest.

Over 1000 Wendy’s restaurants hacked – customers’ credit card details stolen

Fast food giant Wendy’s says that it now believes that more than 1000 of its restaurants across the United States have fallen victim to a hacking gang, who used malware to steal customers’ credit and debit card information.

‘Ruthless’ cybercriminals pose a major threat to organizations

Organizations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG.

Types of VPN networks and how they work: do you know which kind to use?

WeLiveSecurity delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?

Ransomware: First files … now complete devices

Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.

New OSX/Keydnap malware is hungry for credentials

For the last few weeks, ESET has been investigating OSX/Keydnap, a malware that steals the content of the keychain while maintaining a permanent backdoor.

Chicago man pleads guilty in celebrity iCloud data breach

A 28 year-old Chicago man has pleaded guilty to using phishing scams to illegally access more than 300 iCloud and Gmail accounts, around 30 of which belonged to celebrities.

Data leak dangers: Know your weak spots

When it comes to data leaks, what are the major weak spots you need to be looking out for? This feature explores three common causes.

The security review: How secure are our cash machines?

Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.

Follow us

Copyright © 2016 ESET, All Rights Reserved.