Interactive exploit kit redirection technique

The usual pattern we see when dealing with exploit kits starts with a legitimate website that gets compromised and used to automatically redirect its visitors to the actual malicious content.

Targeted attack against Vietnamese government: right on the MONRE

ESET researchers recently came across a targeted attack against the Vietnamese government’s Ministry of Natural Resources and Environment (MONRE).

Catch the ESET 2014 Mid-Year Threat Report broadcast

With the first half of the year almost over, it’s time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar, this one hour event will look at some of the more interesting pieces of malware and Internet security threats that have occurred during the first six months of the year.

Would you allow cybercriminals onto your computer for money?

Cybercriminals could buy their way into your computer for less than a dollar, a new study has found. The study, led by Nicolas Christin at Carnegie Mellon University, examined how much money they would have to offer home users to install software onto their computers or other devices.

Pinterest hit by weight loss spam

Picture-sharing social media site Pinterest appears to have been hacked, as multiple users reported weight-loss spam messages both on Pinterest itself and on Twitter.

Android malware: how to keep your device safe from filecoders (and everything else)

When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.

Posible vulnerabilidad afectaría el modo Secure Boot del UEFI

El evento de seguridad de la información Hack in the Box 2014 trajo noticias importantes sobre una posible vulnerabilidad en el mecanismo de seguridad Secure Boot del UEFI. UEFI (Interfaz Extensible del Firmware Unificada) fue desarrollada para reemplazar la interfaz del estándar BIOS (Sistema Básico de Entrada/Salida). Una de las características de la implementación de

Watch Dogs: How realistic is PS4 city-hack thriller?

In Ubisoft’s Watch Dogs, a man out for vengeance chooses an odd weapon – a smartphone. Loaded with deadly apps, he blows up power stations, wrecks cars and stops trains. But how close to reality is it?

Watch Dogs pirates hit by scurvy Bitcoin-mining malware

Pirates who have downloaded one of the most popular torrent files of this week’s big game release Watch Dogs – ironically, themed around computer hacking – found malware pilfering their virtual gold (well, Bitcoins).

Miniduke still duking it out

At the end of April Microsoft announced that a vulnerability in Word was actively being exploited. New variants of MiniDuke display interesting and novel features. Here, we take a closer look.

Smart TVs can be infected with spyware – just like smartphones

‘Smart’ televisions with built-in microphones could be used as bugging devices by corrupting the devices with malware, according to software specialists NCC Group, as reported by The Register.

Torrent site Demonoid blocked by Google for serving malware

The torrent site Demonoid was blocked by Google after tests by the search giant found that pages within the site contained banner adverts which were installing malware on users’ PCs.

Vulnerabilidad en protocolo DNS podría redirigirte a sitios falsos

El protocolo DNS (Domain Name Server) ha sido comprometido por un grupo de estudiantes del Technion de Israel. La falla que han podido encontrar permitiría a un atacante redirigir las peticiones a un sitio web falso, mientras que la víctima intenta visitar una web legítima. Esto sería posible forzando a los servidores DNS a conectar

Nuevos ransomware: el Virus de la Policía, ahora para Android

En 2012, el troyano conocido como “Virus de la Policía” afectó a cientos de usuarios en España, Europa y Latinoamérica, cuyas computadoras se bloqueaban al inicio mostrando un supuesto mensaje del Cuerpo Nacional de Policía; con la excusa de haber detectado accesos a páginas de pornografía infantil, solicitaba cierta cantidad de dinero para desbloquear el

Grandes compañías alojan malware según Cisco

Las 30 compañías evaluadas por Cisco durante 2013 alojaban malware en los equipos de sus redes, según el reporte anual publicado por la compañía. Tras analizar el tráfico, se descubrió que se comunicaban con sitios maliciosos, y, en el 96% de los casos, con servidores que habían sido comprometidos por cibercriminales. El estudio se basó

Network structure must change to resist cyber attacks, warns Dr. Eric Cole

Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.

Bad business: ALL major companies are hosting malware – Cisco

Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.

Lack of cyber risk insurance could lead to “global financial shock”

The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.

Cybercrime evolves as criminal gangs join forces with spies – report

Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.

Fake Facebook app attack can lead to your Android being spied upon, and your bank account being hacked

Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android smartphones.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar


Select month
Copyright © 2015 ESET, All Rights Reserved.