Luxury retailer Neiman Marcus has revealed that a breach which led to customer payment cards being used for fraud after shopping in its stores was far worse than first revealed – with 1.1 million cards affected over several months.
Scans of a huge botnet have revealed that it has harvested at least 16 million usernames and passwords for email sites and other online services, according to a report released German security agency, the Bundesamt für Sicherheit in der Informationstechnik (BSI).
‘Adware’, software which delivers unwanted adverts, isn’t as scary as some malware, but ESET’s analysis of Win32/Boaxxe shows that ‘malicious’ adware is becoming increasingly hi-tech and stealthy. Our guide will help you clean your machine – and see fewer unwanted ads.
A Californian blogger was among victims of a malware attack which targeted critics of the communist state in Vietnam, as well as staff at U.S. privacy group Electronic Frontier Foundation.
In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.
Cisco claims in its report that cybercrime is now a global, professional industry – and there is a worldwide shortage of professionals able to defend against such attacks, with new technologies in malware meaning that there is a shortfall of a million IT professionals.
The computer giant announced the change of policy in an official blog post in which it said that although XP was no longer “a supported operating system”, security updates would continue until July 2015.
At CES 2014, the app was king – and more importantly, the appcessory – fridges, lights, appliances and gadgets built for app control. But with companies unveiling door locks controlled via app, should we applaud – or worry?
Computer users often feel bombarded by warnings about malware – particularly in internet browsers, which often repeatedly warn about risky sites – but tricks used by cybercriminals can help stop this, a new paper claims.
Malicious software was installed in tills in Target stores across the U.S. and went undetected for weeks, the chain has admitted, harvesting information from the magnetic stripes on customer cards during transactions.
Read how to protect yourself if you’ve been shopping with credit or debit cards (and who hasn’t?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.
This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive traffic to advertisement websites by using various click fraud techniques, and thus earn money from these websites as an “advertiser”.
A survey of 22,762 consumers conducted by the British government found that less than half took the most basic steps to protect themselves online, the government revealed as part of a new campaign aimed at consumers and small businesses.
Patrick Garratt is a 15-year veteran of the gaming industry, having been behind the launches of major news sites such as Eurogamer and VG247 – but in the DIY, anything-goes world of PC gaming, even he still falls for a scam or two. Is it REALLY his fault, though?
Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards themselves. The attack could be used to copy or steal data – and even modify sensitive data such as encryption keys.
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.
A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.
Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers – 75% of detections come from this region.