tag

Malware

Bundestag computer system goes offline

The computer system in the Bundestag is now offline, to allow technicians to perform essential maintenance work.

5 security tips to defeat cybervillains at Comic-Con 2015

The crowds at Comic-Con are a tempting target for cybvervillains, so get prepared with these top tips for keeping your data and devices safe.

Dino – the latest spying malware from an allegedly French espionage group analyzed

In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.

The role of proxies and protocols in malware investigations

What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?

Jamie Oliver website makes a meal of malware clean-up

The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year, potentially infecting the computers of the site’s visitors.

Rombertik: the malware that ‘destroys’ computers if detected

Researchers have uncovered a new malware which will try to ‘destroy’ the computer, reports Cisco. Let’s understand how it really is.

WattsUpDoc: US hospitals trial AC power probes to treat medical malware

Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.

New malware ‘Punkey’ detected in new point-of-sale attack

A new advanced malware program targeting point-of-sale terminals is putting customer credit card details at risk, following a number of similar attacks already this year.

Lawyer claims police placed malware on requested external hard drive

A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.

Hackers hide malware in fake game pages hosted on Steam

Gamers downloading from Steam should beware of fake game pages, after a spate of clone titles were found on the service hiding harmful malware.

Hackers set up Pirate Bay clone to distribute banking trojan

Wordpress sites are being targeted by a Pirate Bay clone set up by hackers to distribute malware and a banking trojan, reports The Next Web.

Google Play security tightened with human screening process

Google is taking additional security measures to shut out malware from its app store by introducing a human screening process.

The utterly crazy story of the death threat hacker (involves a cat)

A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.

Thunderstrike! How a radar-proof rootkit could infect your Mac

A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.

Microsoft warns of banking malware targeting German speakers

Microsoft has warned of a new variant of a banking malware that appears to be targeting German speakers, according to PC World.

Charge Anywhere warns of payment data leak

Mobile payment platform Charge Anywhere has revealed an exploit in its software that means that five year’s worth of credit card data could be at risk.

Week in Security: Grief for gamers, Unicorn spotted – and America wakes up

Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam – but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.

Facebook scams – ‘Naked woman eaten by shark’ is latest bait

The latest salacious video – promising ‘Naked Woman Eaten by a Shark’ – is just one in a long chain of viral video scams spread via Faceboook.

Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims

A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information – without using hardware such as USB keys.

White House hit by “sustained” cyber attack, hackers breach unclassified network

IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

6 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.