tag
Google

Wi-Fi security alert on Chromecast as ‘Rickmote’ hijacks nearby boxes

A security researcher has built a remote control which hijacks any nearby Chromecast highlighting a Wi-Fi security issue, which allows an attacker to play a ‘surprise’ video on nearby gadgets.

Project Zero, la apuesta de Google para disminuir los ataques dirigidos

Google anunció el lanzamiento oficial de Project Zero, una iniciativa que nucleará a investigadores de seguridad que buscarán reducir la cantidad de personas afectadas por ataques dirigidos en Internet. El objetivo del equipo será buscar vulnerabilidades críticas en los sistemas y alertar sobre ellas antes de que sean explotadas con fines maliciosos.

Google Drive privacy warning – could yours have leaked data?

Files sent as a link from Google Drive could have shared more than their senders intended, Google admitted this week – in a Google Drive privacy post where the internet giant admitted files could be visible to people other than their intended recipients.

How to remove your house from Google Street View

How are YOU supposed to remove your house from Google Street View if you don’t like the idea that Google drove one of its Street Cars up your road, took a photo of your front door without your permission, and then published it on the net?

Fortunately, there is a way…

Prueba de concepto: spyware desarrollado para Google Glass

Como suele suceder con las nuevas tecnologías que surgen en el mercado, es cuestión de tiempo para que empiecen a aparecer pruebas de concepto de diversos ataques. Este fue el caso de Google Glass, ya que durante esta semana apareció un spyware que permite sacar fotos a través de este equipo sin que el usuario

Firefox, Internet Explorer y Adobe vulnerados en concurso de ethical hacking

Esta semana se ha desarrollado el concurso Pwn2Own, en el que se repartieron $400.000 a algunos participantes que han logrado vulnerar aplicaciones tan populares como Internet Explorer, Safari, Mozilla Firefox y algunos productos de Adobe. El grupo francés Vupen, conocido por comercializar las vulnerabilidades que han encontrado, se alzó con el premio más grande otorgado,

Microsoft y Google dan un paso más por la seguridad de los niños en Internet

Proteger a los más pequeños en Internet ha sido prioridad para muchas empresas y organizaciones en el mundo. Esta vez Microsoft y Google han acordado aplicar una serie de medidas para disminuir el intercambio de pornografía infantil en la red. La noticia que fue publicada por el diario británico Daily Mail resalta como estos dos gigantes

Encuentran vulnerabilidades críticas en Samsung Galaxy S4 y iPhone 5

Investigadores presentes en la competencia de hacking de plataformas móviles Mobile Pwn2Own dieron a conocer esta semana varias vulnerabilidades que permitirían el robo de información y, en algunos casos, la instalación de malware en el dispositivo atacado. Las fallas de seguridad fueron atacadas con exploits zero-day, y serán corregidas de forma inmediata, otorgando premios monetarios a

Do consumers pass the buck on online safety? New survey reveals mixed messages

Who is responsible for privacy and online safety on social networks? ESET asked Harris Interactive to poll American adults and found some interesting responses, positive advances in cyber-citizenship, but also some apparent disconnects.

Google identifies 10,000 phishing and malware sites every day

Google’s Safe Browsing program is now flagging 10,000 suspect websites per day, the search giant announced in a blog post

Criminal hackers increasingly attracted to smaller businesses

Even the smallest web based business in the world will attract criminal hackers interested in stealing financially valuable data.

Rogue developers hiding Android malware in apps on Google Play

Respected security blogger Brian Krebs reports that an “explosion in Android malware” is being fuelled by a growing market for hijacked of rogue developer accounts on Google Play, Google’s official Android app store.

Twitter makes two factor the authentication process du jour

Following the examples of Google, Facebook, Yahoo and DropBox, Twitter is reportedly ready to roll out a two factor sign in process for its millions of users. This comes in light of February’s attack when some 250,000 passwords were stolen.

What do Win32/Redyms and TDL4 have in common?

At the beginning of January 2013, we started tracking the interesting Win32/Redyms trojan family. Redyms is notable for changing search results from popular search engines on infected machines.

How to keep your email clean and safe

Your email account can be used by cyber criminals to spread malware or attempt to steal personal details from you. Follow our tips for a safer email experience.  Create and use secure passwords As with all your online activity, you should always choose passwords that are hard to guess and to crack. This means long

The Dynamic Duo for Securing your Android: Common Sense and Security Software

On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,

You've Got (Nation State Hacked) Mail

We read in the New York Times that Google is rolling out a service that will attempt to alert users when it thinks their accounts might be subject to hacking by a government, hoping the user will take precautions after getting a notice that says “Warning: We believe state-sponsored attackers may be attempting to compromise

Google's data mining bonanza and your privacy: an infographic

Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you

Windows Phone 8: Security Heaven or Hell?

Introduction Mobile World Congress 2012 is almost upon us, and one of the most hotly-anticipated topics is the next generation of Microsoft’s smartphone operating system Windows Phone 8, which has been kept under wraps far more tightly than its PC counterpart, Windows 8. While Microsoft was an early adopter in the creation of smartphones with

Beware of SOPA Scams

Tomorrow, on January 18, 2012, dozens of popular websites covering a diverse range of subjects will be blacking out their home pages in protest of the U.S. Stop Online Piracy Act (SOPA).  Some of these websites are well-known, such as the English language web site for the encyclopedic Wikipedia and quirky news site Boing Boing,

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
17 Jul 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.